How important are data protection and security for mobile devices today? Is this still an overlooked area?
The importance of data protection and security for mobile devices has long been underestimated in IT shops. At one time, mobile device security and data protection were almost nonexistent. In the past, mobile devices weren't very powerful and there wasn't really an effective way of managing them. Because it was primarily high-level managers or tech-savvy employees who were using the mobile devices, IT tended to look the other way with regard to mobile device security and data protection.
Obviously, things are a lot different today. Mobile devices are much more powerful than they were in the past, and modern devices have a relatively large storage capacity. Furthermore, mobile devices have gone from being obscure novelties to becoming mainstream technologies. Many users own several mobile devices.
As far as whether or not security and data protection for mobile devices are overlooked today, the answer is that it varies from one organization to another. Larger organizations seem to be taking mobile devices very seriously. In these types of environments, mobile users are no longer given free reign of the network. Instead, mobile devices are managed by specialized software that enforces mobile device security. Even the Windows Server operating system is now mobile device-aware. Windows Server 2012 R2 makes it possible to connect a mobile device to a domain by way of the Workplace Join feature.
In spite of the progress that has been made surrounding mobile device security, there are still organizations that do not take mobile devices seriously. In some (primarily smaller) organizations the attitude seems to be that if other companies are allowing users to work from personal mobile devices then it must be okay. The underlying assumption is that the devices are secure by default and that there is no need to provide extra security. Thankfully, however, most organizations do seem to be taking mobile device security much more seriously than might have been the case a few years ago.
Mobile data protection, security a growing concern
SMB corporate laptop data protection and security
Choosing an off-site backup vendor
Dig Deeper on Data backup security
Related Q&A from Brien Posey
Hyper-converged architectures let users scale easily by adding nodes as needed, but it's important to be aware of vendor- and hypervisor-specific ...continue reading
Virtual desktop infrastructure environments are complex and have to work with many variables. A hyper-converged infrastructure can reduce costs and ...continue reading
It's possible to design hyper-converged hardware to run several hypervisors at the same time, but various factors make this a scenario we're unlikely...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.