The Wall Street Journal Reported Monday that one more manufacturer of mobile phones is upping their game when it comes to going after the lucrative business market.
Christy Wyatt, who runs software and services product management for Motorola, acknowledges that the recent formation of a new business unit (Motorola Mobility) is designed to address the specific concerns of corporate chief information officers is a direct attempt at taking market share from BlackBerry/RIMM.
Today, handset manufacturers – from Apple to Windows to Motorola are recognizing that creating consumer-specific devices isn't sufficient – consumers are also business professionals – and they want one device to manage both their personal and business lives.
Driven by that need or just by better and better products, prices, and promotions (some of my 4 P’s from my Marketing 101 class) we’ve seen an explosion in the smartphone market.
Late last year Nielsen revealed that 28% of wireless users currently have smartphones while various industry forecasts project that 50% of all wireless users will have a smartphone by year’s end. Both numbers are giant leaps forward from the 11% penetration cited by ComScore in April, 2009. The pioneer of consumer smartphones, the iPhone, is even seeing major movement into the business environment as AT&T reports that 40% of iPhone subscribers were enterprise customers.
While all of this is fascinating and allows me to embrace my inner numbers geek, the real implications for you are – how do I keep all of these diverse devices secure?
I’m sure that your internal clients are no different than most organizations – you have some easy-going employees who will use whatever mobile device you provide them with… while others… you couldn’t pry their iPhone, Droid, or Windows Phone out of their cold dead hand. And with the phenomenon of the decentralized office, do we really want to make the choice for everyone regarding what device is best for their needs?
So it comes down to you and your department to make sure that the devices, and the network it is attaching to – is secure. Defending against threats to a wide range of mobile devices requires sound security strategies and solutions. Secure Endpoint services from CSS include policies and procedures for “locking down” endpoints – servers, computers, and mobile devices, no matter where they may reside or what type. Don’t leave your network open to the path of least resistance for intruders – the endpoint.
To attend a Webcast covering how to protect all of your endpoints, click here.