Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

IBM Launches Secure Mobile Device Management Solution

IBM Moves to Secure Mobile devices with New Endpoint Manager Suite, Announces Aquisition of Mobile Software Firm Worklight 

IBM, on Tuesday, announced a new endpoint management suite aimed at mobile devices, in addition to hinting at further R&D in the segment thanks to a recent acquisition. The new software is one of the first to leverage the technology portfolio obtained after Big Blue purchased BigFix software in 2010.

IBM Moves to Secure Mobile devices with New Endpoint Manager Suite, Announces Aquisition of Mobile Software Firm Worklight 

IBM, on Tuesday, announced a new endpoint management suite aimed at mobile devices, in addition to hinting at further R&D in the segment thanks to a recent acquisition. The new software is one of the first to leverage the technology portfolio obtained after Big Blue purchased BigFix software in 2010.

IBM’s Endpoint Manager for Mobile Devices, covers tablets and smartphones running iOS, Android, Nokia Symbian, Windows Mobile, or Windows Phone. Essentially, if a mobile device is on your network, and IBM can work to protect it and the data it stores. The mobile-centric suite from IBM also works hand-in-hand with their other Endpoint Management offerings.

IBM LogoIBM’s solution is somewhat standard and offers similar features as other mobile device management solutions. Endpoint Management for Mobile Devices will allow for selective remote wipe, should the device be lost or stolen, password enforcement policies, encryption, and VPN. In addition, it includes NAC abilities, which will force devices not in compliance with a given policy or rule to align as expected, or be denied access to things such as email or network resources.

It seems that IBM is going for unification, given that the technology from BigFix software will allow them to integrate all of the Endpoint Management offerings under one roof, offering Enterprise customers the ability to manage everything from desktop systems and servers, to the phone in your pocket.

When it comes to the future of IBM’s Endpoint Manager, particularly in the mobile environment, Big Blue offered a hint with the announcement that they’ve purchased a privately held Israeli-based provider of mobile software.

The Worklight acquisition will enable IBM customers and their own engineers with the ability to create and run hybrid and native applications for mobile devices. If done right, then IBM can use the acquired extensible integrated development environment (IDE), mobile middleware, and management and analytics technologies, to grow right alongside the market as it expands in the coming years.

At the end of 2011, almost half of mobile devices used in the workplace were employee owned according to IDC. This “Bring Your Own Device” (BYOD) trend raises additional concerns about managing security risks, IBM said.

Advertisement. Scroll to continue reading.

“As the BYOD movement accelerates, it presents new opportunities and challenges for organizations. In order for them to take advantage of this trend, it is important that organizations have mobile security and management policies in place,” said Bob Sutor, vice president, IBM Mobile Platform.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

The February 2023 security updates for Android patch 40 vulnerabilities, including multiple high-severity escalation of privilege bugs.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Cybercrime

A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.