Advisory Note: Dealing with privacy risks in mobile environments - 70224

Report Details

The ongoing trend of IT consumerization and deperimeterization has a profound effect on modern society. Mobile devices are becoming increasingly sophisticated and their numbers are growing exponentially. Social networking has made sharing information all too easy and controlling its spread nearly impossible. Growing adoption of cloud-based services, while having obvious advantages, means that more and more sensitive information is now stored and managed by third parties, and users are no longer in direct control over it.

Combined with the inconsistency and largely reactive nature of current regulations, all this has led to a significant erosion of the public expectation of privacy and opened many opportunities for abuse. Some have even gone as far as to claim that privacy is no longer relevant. But is it really so?

This paper presents an analysis of privacy-related challenges consumers and businesses are currently facing, especially those specific to mobile platforms...

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
May 09, 2012

Advisory Note: Dealing with privacy risks in mobile environments - 70224

The ongoing trend of IT consumerization and deperimeterization has a profound effect on modern society. Mobile devices are becoming increasingly sophisticated and their numbers are growing exponentially. Social networking has made sharing information all too easy and controlling its spread…

€495.00 Get Access
Mastercard Visa PayPal INVOICE

Latest Related Reports

Executive View

Executive View: STEALTHbits® Products Overview - 70270

Securely governing access is increasingly important to ensure compliance as well as to defend against cyber-crime. STEALTHbits’ products provide a comprehensive set of solutions to address IT security risks covering Active Directory, Data Access Governance, Privileged Access…

Executive View

Executive View: VeriClouds CredVerify™ - 72567

Securely authenticating users remains a thorny problem and VeriClouds CredVerify service can provide a useful additional level of assurance.  There are many approaches, products and services for user authentication however, the CredVerify service is unique in what it offers.  

Executive View

Executive View: Telekom Magenta Security - 70342

Unter der Bezeichnung Magenta Security werden alle Angebote für  Dienstleistungen und Managed Services des Telekom - Konzerns gebündelt. Magenta Security liefert ein sehr umfassendes Portfolio an Dienstleistungen und  zählt damit zu den ersten Adressen für…

Executive View

Executive View: Signicat - 72537

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. Recently, their portfolio has been expanded to include a mobile authentication product to help customers meet PSD2 requirements.

Executive View

Executive View: IdentityX® from Daon - 71312

Daon’s IdentityX® authentication platform is a universal mobile authentication framework that combines modern standard-based biometric technologies with broad support for legacy authentication systems to provide a flexible, frictionless and future-proof solution for managing risk,…

Leadership Brief

Leadership Brief: Cloud Provider Codes of Conduct and GDPR - 70276

Codes of Conduct  can help organizations choose between suppliers.   This report  compares two recently announced codes for cloud service providers and how  these relate to GDPR .

Leadership Compass

Leadership Compass: CIAM Platforms - 70305

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service…

Leadership Brief

Leadership Brief: Mobile Connect - 71518

Strong authentication via smartphones is available today in many countries. GSMA’s Mobile Connect specification can improve security and help banks and third party providers comply with the EU’s Revised Payment Service Directiv e (PSD2).  

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision  of all…

Executive View

Executive View: Microsoft Security Suite - 72541

A comprehensive approach to data protection – one that combines all aspects of computing infrastructure– rather than the point products that comprise many organization’s cybersecurity environment, is a decided plus, provided the overall goal is achieved.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Not Just Another Buzzword: Cyber Risk Governance

Today, companies are increasingly operating on the basis of IT systems and are thus dependant on them. Cyber risks must therefore be understood as business risks. The detection and prevention of cyber security threats and appropriate responses to them are among the most important activities to [...]

Latest Insights

Hot Topics

Spotlight

Privacy & the European Data Protection Regulation Learn more

Privacy & the European Data Protection Regulation

The EU GDPR (General Data Protection Regulation), becoming effective May 25, 2018, will have a global impact not only on data privacy, but on the interaction between businesses and their customers and consumers. Organizations must not restrict their GDPR initiatives to technical changes in consent management or PII protection, but need to review how they onboard customers and consumers and how to convince these of giving consent, but also review the amount and purposes of PII they collect. The impact of GDPR on businesses will be far bigger than most currently expect. [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00