<img alt="dcsimg" id="dcsimg" width="1" height="1" src="//www.qsstats.com/dcs8krshw00000cpvecvkz0uc_4g4q/njs.gif?dcsuri=/index.php/c/a/Business-Intelligence/How-To-Secure-Mobile-Devices/3&amp;WT.js=No&amp;WT.tv=10.4.1&amp;dcssip=www.baselinemag.com&amp;WT.qs_dlk=Xa9OaF@ouk0Ih4NYRNj26wAAAB4&amp;">

Mobile Security

By Darrell Dunn  |  Posted 2007-08-14 Print this article Print

As mobile devices get smaller, become more widespread and harbor an increasing amount of business data, I.T. executives are using new strategies and software tools to keep these devices secure.

: Setting the Standard">

Mobile Security: Setting the Standard

What It Is:
Enterprise-class mobile security strategies need to encompass both anti-malware and antivirus capability, but the ability to securely manage, distribute and protect applications and sensitive corporate and customer data has grown in importance as the information moves from the data center to mobile computing and communications equipment, and external storage devices.

Key Players:
Check Point, Citrix, ClearCube, Credant, Entrust, Microsoft, McAfee, Symantec, Utimaco Safeware

What's Happening:
The highly publicized loss of personal data by government agencies and businesses over the past few years has led to a push to better protect medical, financial and other personal records. Established and startup vendors have designed products aimed at securing data, encrypting data and managing security platforms.

Market Size:
6.8 million seats sold for mobile data protection in 2005 (Gartner)

eWeek eWeek

Have the latest technology news and resources emailed to you everyday.