Mobile Security

Blog

Mobile Device Management: It will grow – but should it?

Some weeks ago I stumbled upon an article, which said that the MDM (Mobile Device Management) market will grow massively within the next five years. I don’t doubt that the market will grow. However I’d raise the question whether it should grow that much – or, in other words, whether MDM is…

Executive View

Snapshot: Oracle Mobile and Social Access Management - 70724

As part of its recently announced 11g R2 release of Oracle Identity and Access Management, Oracle also released a new component called Oracle Access Management Mobile and Social. This solution significantly enhances the scope of the current OAM (Oracle Access Manager) platform, adding…

Blog

BYOD: Just a symptom of a bigger evolution. Don’t worry about BYOD – solve the challenges of the Computing Troika.

BYOD (Bring Your Own Device) is one of the hot topics of today’s IT. Many vendors promise to solve the BYOD challenges, with MDM (Mobile Device Management), MAM (Mobile Application Management), or other technologies. Most of these technologies fix some of the problems. But all of them fail…

Webcast

BYOD, Social Networking, Cloud - sicher und kalkulierbar

KuppingerCole Webinar recording

Webcast

Preparing Your Enterprise for the Generation Y: BYOD & Mobile Device Management

KuppingerCole Webinar recording

Webinar

Sep 19, 2012: BYOD, Social Networking, Cloud - sicher und kalkulierbar

Die Einbindung mobiler Endgeräte, seien Sie im Eigentum des Mitarbeiters oder des Unternehmens, die Nutzung von Social Media im Unternehmen und der vielfältige Einsatz von Cloud-Anwendungen - all dies ist Alltag geworden und stellt IT-Professionals in den Unternehmen jeden Tag vor neue…

Webcast

Preparing Your Enterprise for the Generation Y: BYOD & Mobile Device Management

KuppingerCole Webinar recording

Blog

Doing BYOD right – it’s all about information security

A recent article in Network World online  had the title “For BYOD Best Practices, Secure Data, Not Devices”. I fully agree with that title. However when reading it I struggled somewhat with the solutions proposed therein, which were mainly about “mobile device virtualization” and MAM (Mobile…

Webinar

Sep 18, 2012: Preparing your Enterprise for the Generation Y: BYOD & Mobile Device Management

A plethora of mobile devices are invading the enterprise at incredible speed, raising issues in areas like access control, policy enforcement, security of confidential data on users’ devices, and many others. Practices of “bring your own device,” (BYOD) and “company owned, personally…

Webinar

Aug 07, 2012: Preparing your Enterprise for the Generation Y: BYOD & Mobile Device Management

A phletora of mobile devices are invading the enterprise at incredible speed, raising issues in areas like access control, policy enforcement, security of confidential data on users’ devices, and many others. Practices of “bring your own device,” (BYOD) and “company owned, personally…

Advisory Note

Advisory Note: Dealing with privacy risks in mobile environments - 70224

The ongoing trend of IT consumerization and deperimeterization has a profound effect on modern society. Mobile devices are becoming increasingly sophisticated and their numbers are growing exponentially. Social networking has made sharing information all too easy and controlling its spread…

Webcast

EIC 2012 Keynote: What About Bring your own Device?

Dr. Barbara Mandl, Senior Manager, Daimler AG April 17, 2012 18:10

Advisory Note

Best Practice: European Identity Award 2012: Swisscom - 70705

Special Award 2012 for „Mobile Security”: Swisscom MobileID – secure and easy authentication using the mobile phone with minimal impact on hardware based on ETSI Mobile Signature Standard.

Blog

15% of CIOs ban private devices – the Don Quixote approach on BYOD

I read news this morning quoting a survey by Coleman Parkes, an UK-based research company, saying that 15% of CIOs ban private devices to mitigate the BYOD risks. I personally don’t believe in that approach because it is just too likely to fail. It is like Don Quixote tilting at windmills,…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

Discover KuppingerCole

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

Blog

Blog

Leading IDaaS Supplier OneLogin Aiming for the Top

OneLogin is among the leading vendors in the overall, product, innovation and market leadership ratings in KuppingerCole’s latest Leadership Compass Report on IDaaS Access Management, but is aiming to move even further up the ranks. In a media and analyst briefing, OneLogin representatives talked through key and recent product features and capabilities in an ongoing effort improve the completeness of products. Innovation is a key capability in IT market segments, and unsurprisingly this [...]