Vision Report

Security In The Post-PC Era: Controlled Chaos

An Empowered Report: Securing And Enabling The Mobile Workforce

Andrew Jaquith
 and  four contributors
Oct 14, 2010

Summary

This year, the number of post-PC devices, such as tablets, eReaders, and Internet-capable mobile phones, will eclipse PC devices, such as desktops, laptops, and netbooks. The surge in post-PC devices that do less but do it in more places means that security and risk (S&R) professionals no longer have the authority to veto the use of mobile devices or limit use to a specific brand. But these devices increase the risks enterprises face, with the prospect of increased theft and rogue apps and questions about data ownership. On the other hand, post-PC devices are safer to use than traditional PCs and require less security aftermarket products as a result. S&R professionals should aim to bring a measure of control to an increasingly chaotic environment but not stifle employee flexibility and innovation. To be successful, enterprises must let device capabilities, not brands, drive support decisions; build a multidevice management infrastructure; set up a company app store; and use thin clients to keep sensitive data off of endpoint devices.

Log in to continue reading
Client log in
Welcome back. Log in to your account to continue reading this research.
Become a client
Become a client today for these benefits:
  • Stay ahead of changing market and customer dynamics with the latest insights.
  • Partner with expert analysts to make progress on your top initiatives.
  • Get answers from trusted research using Izola, Forrester's genAI tool.
Purchase this report
This report is available for individual purchase ($1495).