Four mobile security predictions to help CIOs plan for the future
- 15 April, 2013 22:00
Few things can keep CIOs up at night these days like mobility, particularly bring your own device (BYOD). After all, mobile, consumerisation of IT and bring-your-own-device (BYOD) are turning enterprise security models on their heads.
Privacy implications--let alone the potential for data loss and data leakage--are enough to make a CIO break out in a cold sweat.
Both hope and new challenges both are on the way, says Forrester Research Analyst Chenxi Wang, Ph.D., who has identified four trends that she says she believes will affect the future of consumer- and enterprise-facing mobile security.
"These trends paint a picture of seamless, smart-device security capabilities that are embedded in increasingly sophisticated mobile-cloud services, as well as those that are able to integrate with business models enabled by pervasive mobility," she says.
The majority of organisations are already wrestling with the implications of BYOD, says Wang. According to Forrester's Forrsights Workforce Employee Survey, Q4 2012, 70 percent of organisations have adopted some form of BYOD program, and 62 percent of people who use a smartphone for work and 56 percent of those who use a tablet for work purchased those devices themselves.
Mobile Prediction 1: Personal Devices Will Become the Norm
While BYOD has largely been a smartphone and tablet story, Wang predicts that will begin to change in 2013 and beyond. Currently, 39 percent of laptops used for work are owned by an employee while 47 percent are owned by the company.
"However, more and more personally owned laptops are entering the work environment as IT organisations become more flexible with the BYOD culture," Wang says. "For 2013, we see the BYOD trend expanding to include not only post-PC devices but personally owned computers."
As personally owned devices become a common fixture in the enterprise, Wang says IT organisations will have to act rather than react. The demand for more mobile access to company resources and data will have three consequences.
"IT will need to make investments to expand remote access to corporate content and data that traditionally live behind the firewall, including investments in wireless infrastructure, wireless services and mobile security measures," she says.
"organisations will need to reevaluate their application architectures to include more SaaS and more platform-agnostic applications, which will bring about a significant shift in how organisations acquire applications; the days of on-premises client/server deployments are fading and the days of cloud-hosted, service-driven deployments are ascending.
Organisations will need to reduce spending on wired/fixed communication services while they increase investments in wireless hardware and services."
Mobile Prediction 2: Seamless, On-Demand Mobile 'virtualisation' Will Overtake MDM
Many organisations that embrace (or at least accept) BYOD have turned to mobile device management (MDM) technologies to help them enforce corporate policies on users' devices. But MDM is often considered a heavy-handed approach, and Wang says more and more IT professionals just don't want to manage employee-owned devices.
This has resulted in the rise of mobile VDI, containers, app wrapping and device virtualisation as alternative methods to segregate personal data from corporate data on a personally owned device. The downside, of course, is that these methods often adversely affect the user experience, creating a barrier to adoption. But advances in mobile virtualisation technology are likely to turn that around in 2013.
"In 2012, we started to see glimpses of technologies that could eventually lead to seamless "mobile virtualisation" wherein policy-based control over corporate apps (and consequently content and data) is enforced on-demand and with little interference to user experience," Wang says. "Some examples include VMware's device virtualisation technology and exciting options from innovators such as Enterproid and MobileSpaces."
Wang says that these technologies remain at an early stage today, but show great potential to completely change how enterprises approach mobility if they can fulfill their promise to dynamically insert policies in flight without changing the app first.
"Key to making mobile virtualisation work are whole-app workflows and mashups that are easily controllable," she says. "We're excited to see technologies that extend policy controls to an entire workflow of apps, so that any app invoked by the corporate app is treated with the same policy, as opposed to wrapping and containing a standalone app. This capability will help preserve user experience and further enable mobilization of enterprise resources. Ultimately, technology innovations in this area may render BYOD a nonissue."
Mobile Prediction 3: HTML5 Enterprise Apps Will Proliferate
Wang says that HTML5 apps, rather than native apps, will become the preferred way of delivering enterprise apps. The argument goes like this: Efforts by the U.S. Federal Communication Commission (FCC) to free up additional wireless spectrum will begin to bear fruit in late 2013. That means cheaper and more reliable connectivity. As connectivity becomes more pervasive, Wang says online rather than offline communications models will become the norm.
"This paves the way for more HTML5 deliveries," Wang says. "HTML5 applications are attractive for a number of reasons, the chief being simpler and cheaper development and maintenance costs. Native apps will still take the spotlight in the consumer market, but for enterprise apps, we will see an acceleration of HTML5 development efforts in 2013 and beyond."
In turn, that means enterprise apps will increasingly move from the device to the cloud, Wang says.
"This represents a tangible way enterprise application portfolios will change from the predominantly client/server model to platform-independent SaaS delivery," Wang says. "In the near term, enterprises will increase spending on cloud-hosted and -delivered applications. As a result, mobile browsers will increasingly become a critical control point on the device; we believe 2013 will bring innovations in secure mobile browser technologies to deliver much-needed controls for security and privacy on the device."
However, she says that getting those secure browsers onto devices will prove a challenge--one that organisations with enterprise app stores may face with more aplomb than those without.
Prediction 4: Identity-based Mobile Services Will Put Privacy in the Spotlight
Mobile devices are enabling new and potentially powerful business models that draw upon a user's preferences and activity history. But the nature of the devices makes it easier than ever before to connect one's actual identity with one's digital presence. This is not without its consequences. Mobile data collection will become ever more pervasive, Wang says, and there may well be a backlash.
"If we're not careful, the number of devices and sensors around us could soon bring about user activity monitoring 24x7--something akin to an Orwellian world," Wang says. "Privacy advocates have long voiced concerns about the lack of clear regulatory controls over consumer mobile data. The privacy regulatory landscape is not expected to change drastically in 2013, and the increased business pressure to collect mobile data, coupled with the lack of industry standards and regulatory controls, suggests that the risk of abuse is high. Few have grasped the full implications of mobile privacy and what is yet to come in the brave new world of mobile and smart environments."
She notes that it's unlikely regulators will move to tighten laws and regulations on user privacy in the mobile ecosystem in the short term, but consumers themselves will increase their awareness of mobile and big data privacy.
"2013 will see an increasing number of mobile services built on real-time user analytics, enabling innovative business models," she says. "The year will likely bring high-profile litigation cases on mobile privacy, and court decisions will set precedence and influence the privacy debate."
Follow CIO on
Download CIO for your tablet here.
Click here to subscribe to CIO.
Sign up to receive free CIO newsletters.
Send news tips to email@example.com
Rethinking the worst case
The brand called CIO
Motorola turns to the Moto G's price to reserve its smartphone fortunes
Virtual desktop computing service: The next cloud disruptor?
Google app translation service now available to Android developers
Managing Web Security in an Increasingly Challenging Threat Landscape
Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons. Download to find out why and what you can do to protect yourself.
Leveraging DCIM Software
Business executives are challenging their IT staffs to convert costly data centres into producers of business value. Only with higher visibility, more control and improved automation of reporting systems can help deliver on this commitment. Holistic management capabilities available today can enable data centre professionals to maximize their capacity to control their energy costs and to advise the business on how to utilize IT assets more effectively. This paper demonstrates how data centre infrastructure management (DCIM) software tools can simplify operational processes, cut costs, and speed up information delivery.
Eight Simple Steps to Boost Campaign Results Using Predictive Modelling
Marketers today are consumed by big data, struggling to find meaning and under pressure to use that meaningful data in smart ways to boost results. But many organizations are reluctant to try and use predictive modelling in their campaigns, due to unfamiliarity and the dependence on complex tools – yet with modern, marketing-friendly modelling tools, integrated with campaign management, it is easier than you think. This whitepaper demonstrates how predictive modelling plays a critical role in streamlining the selection process.