In The Mobile Security Bout Of The Year, App Wrapping Beats Containerization On Points
Containerization Throws Some Solid Punches But Can't Overcome The Challenges Of A Negative Employee Experience
July 7, 2014
Why Read This Report
As enterprise mobility strategies have shifted from simple bring-your-own-device (BYOD) support to the rapid enablement of a digital workforce, mobile security strategies have naturally shifted from a focus on securing the device itself to securing the sanctioned and unsanctioned mobile applications that employees use to best win, serve, and retain customers. Today, an effective mobile security strategy must prioritize the security of the dozens, even hundreds of mobile applications in use in the enterprise. Two of the most popular solutions, application wrapping and containerization, provide different approaches to mobile application security, and they each offer very different employee experiences and results. In this report, we assess the mobile application security technology choices available to the enterprise today and help security and risk (S&R) professionals make the right choice given their organizational requirements and the ever changing solution landscape.
Already a Client?
Log in to read this document.
Become a Forrester Client
Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Table of Contents
- The Mobile Bout Of The Decade: App Wrapping Versus Containerization
- Picking The Winner: The Tale Of The Tape
- It's OK To Bet On A Different Fighter
- Related Research Documents
Four Ways To Make Mobile Security A Competitive Differentiator
March 28, 2016 | Christopher McClean
Address The Top 10 Nontechnical Security Risks In Mobile App Development
January 20, 2016 | Tyler Shields
Build A Cross-Functional Mobile Security Team
November 17, 2015 | Chris Sherman