Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

2015 Security Predictions – Have They Held True So Far?

As 2014 came to a close, industry experts weighed in with their predictions for 2015. A number of these predictions focused on mobile devices in the enterprise, wearables and bring your own device (BYOD) policies. Nearly three months into 2015, how are these predictions holding up?

Say goodbye to EMM and MDM

As 2014 came to a close, industry experts weighed in with their predictions for 2015. A number of these predictions focused on mobile devices in the enterprise, wearables and bring your own device (BYOD) policies. Nearly three months into 2015, how are these predictions holding up?

Say goodbye to EMM and MDM

Gartner’s Top 10 Strategic Technology Trends for 2015 claims that, “As mobile devices continue to proliferate, Gartner predicts an increased emphasis on serving the needs of the mobile user in diverse contexts and environments, as opposed to focusing on devices alone.”

While mobile security remains at the top of every CISO’s priority list this year, enterprises have quickly begun to realize that mobile device management (MDM) and enterprise mobility management (EMM) are not enough to keep data safe. Moreover, they do not provide much return on investment. With mobile security now a board-level discussion, the latter is increasingly important.

According to a recent Forrester blog by Tyler Shields, “It took just a few years for core MDM functionality to commoditize to a $0 price tag.” In my opinion, if you’re paying more than $0 for your MDM, you’re paying too much. Instead, follow Gartner’s best of breed technology recommendations. More organizations are doubling-down on application-level security — adopting a data-centric approach, rather than a device-centric one — to achieve better insight, visibility and security of their data.

BYOD is here to stay

Businesses are increasingly realizing the benefits of BYOD, including improved employee productivity and reduced management overhead. This explains why, despite predictions that BYOD would plateau in the New Year, BYOD adoption has continued to gain momentum in the past six months. Which means it will be crucial for organizations to protect corporate data on user-owned mobile devices. In a 2014 study, Bluebox Labs discovered that several Android tablets for sale during the holiday season shipped with vulnerabilities, security misconfigurations and even security backdoors. These devices could be in your organization today, accessing corporate Wi-Fi or VPNs and putting corporate data at risk. We can no longer prevent employees from bringing mobile devices into our organizations, so instead of trusting these devices, we must empower apps to detect and defend themselves to protect data, even when accessed on a compromised device.

Privacy concerns, specifically in Europe, have prompted businesses to loosen the reigns on device management and focus on what really matters – data security and application control. When enterprises are no longer responsible for managing employee mobile devices, IT teams have fewer security concerns to consider.

Advertisement. Scroll to continue reading.

Don’t worry about wearables

As the 2014 holiday season approached, analysts and industry experts made predictions about the emergence of wearables and the potential impact on the enterprise. However, not unlike Y2K, this hype was nothing more than fodder for headlines. The holidays came and went, and employees did not return to work wearing a slew of new connected devices.

Three months in, wearables still don’t appear to be a consideration in most organization’s security strategies this year. Enterprise security teams will not have to worry about securing IoT in the enterprise anytime soon and can instead focus on securing corporate data to avoid becoming the next breach in media headlines.

Predictions for the remainder of 2015

While many of the 2015 predictions are holding true, others may have simply been a bit premature. What is evident is that we are seeing a change in enterprise mobile security strategies. Mobile security breaches hit 68 percent of businesses in the last year alone, an increase from 45 percent in 2013, according to InformationWeek’s 2013 Mobile Security Survey. This year security teams are preparing and seeking out security solutions that enable mobile business and secure corporate data in an employee-friendly way.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.