COVER
THEME
T
26
oday,
Issue 10
Vo l u m e 3
COVER
THEME
Issue 10
biggest local, national and global regulations,
information and emerging data privacy concerns.
security officers (CISOs) Above all, companies needed to put
face is to find the perfect in place a strong mobile security
balance
test
the
Vo l u m e 3
chief
between strategy. At the same time, focus on
watertight security and seamless user employee experience was picking
experience across all the endpoints up. Digital workspaces for users
in their network. This even as the with personalized enterprise app
traditional management of endpoints catalogue became imperative for
has undergone a sea change from a seamless user experience across
decade ago when all devices were devices. Enterprises had to build
on-premises. Present-day CISOs find capabilities
themselves in a quagmire as end- based on user behavior.
users access unprecedented number The need for the tools and resources
of devices and applications outside required to balance the benefits of
the premises. mobility with its associated risks
of
recommend
apps
led to the metamorphosis of Mobile
The quagmire of
devices and apps
Consumerization
to
Device
Management
Enterprise
Mobility
(MDM)
into
Management
(EMM). However, over the last couple
information of years, EMM solutions have lost
technology (IT) over the last few years relevance as manual assessment and
led to the rise of bring your own device remediation put businesses at risk.
(BYOD) processes on the enterprise
systems like Apple iOS, macOS, Traditional EMM losing
relevance
Google
side. Which means enterprises had
to contend with all major operating
Microsoft Conventional EMM was proving to be
Windows—and a host of applications
Android,
time-consuming, as IT was saddled
for platforms. On with mountains of endpoint data. The
the other hand, the proliferation of limited resources at disposal to solve
smartphones expanded the use cases limitless issues made it inefficient.
for businesses while also introducing For example, with EMM, IT managers
more security challenges. After all, while investigating potential malware
mobile data can inherently expose attacks had to manually assess and
them to countless risks stemming research
from its transmission, storage and threats, identify remediation methods
overall protection mechanisms. and manually resolve for each of
Apart from the above challenges, they the devices. In instances of new
also need to ensure compliance with regulations or legal ramifications,
these
various
and
the
potential
malware
they needed to talk to their legal
CISO MAG | November 2019
CISO MAG | November 2019
27