Managing The Security And Risk Challenges Of Personal Devices In The Workplace
An Empowered Report: Security Pros Must Work Inside And Outside Of IT To Address The Challenges
April 13, 2011
Why Read This Report
Amid the rising trend of personally owned smartphone and tablet use in the workplace, security professionals face the tough question of how to properly manage and secure these devices. Secure processes such as remote wipe, pin-based entry, and centralized management will satisfy many of the security requirements of your organization. However, when the mobile actions of the user conflict with the interests of the enterprise, this raises notable legal issues surrounding the adoption of personal devices in the workplace. To address the often conflicting legal, privacy, and security requirements, security professionals must work with a general counsel, chief privacy officer, and an IT ops lead to develop a robust mobile policy baseline. For a successful mobile implementation, you must also balance the security requirements of the enterprise with the user's device experience.
Already a Client?
Log in to read this document.
Become a Forrester Client
Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Table of Contents
- Security Cannot Ignore The Proliferation Of Personal Devices In The Workplace
- You Must Understand The Security And Legal Challenges Of Personal Devices
- Your Mobile Policy Baseline For Personal Devices
- Use Mobile Security Infrastructure Checklists To Collaborate With IT Ops
- Personal Devices Are An Oncoming Train; Are You Ready?
- Related Research Documents
Tackling The Cultural Challenges Of Agile And DevOps Transformations
September 1, 2016 | John R. Rymer
Four Ways Cybercriminals Exploit Social Media
May 16, 2016 | Nick Hayes
Cybersecurity Budgets Remain Strong, Skills Lag In 2016
March 24, 2016 | Martin Whitworth