IBM Unveils Mobile Security Service to Protect Sensitive Corporate Data

IBM is unveiling a new service to help businesses secure the exploding number of mobile devices with access to corporate data. The new IBM Hosted Mobile Device Security Management service extends the company's existing mobility portfolio to include a security application for smartphones and tablets, along with managed services including policy management and user compliance monitoring.

The service helps organizations protect against data loss and other risks caused by device theft, unauthorized access, malware, spyware, and inappropriate applications. It is designed to help mitigate security risks associated with the increasing number of employee-owned and corporate-liable mobile devices accessing sensitive business data. Delivered as a hosted, managed service, clients can put these controls into action without the need to deploy and manage systems or to make a major investment of in-house personnel and technology.

Increasingly, businesses want to provide employees the option of using a personal device as a way to reduce cost and allow them to work wherever or whenever they need to, but doing so requires diligence in protecting corporate data. In this era of "Bring Your Own Device" (BYOD), with employees using their own mobile devices for business and personal activity, organizations are now tasked with supporting the new social, virtual, and mobile employee and the applications they access. With mobile threats on the rise, complex IT environments, security risks, maintaining policies, and helping companies control cost are top of mind concerns for many CIOs and security and risk professionals.

With this new service, IBM provides the right security controls and ongoing monitoring for each device as a managed service, allowing IT departments to support a broad range of personal devices. Unlike other services focused on device management or unmanaged technology, IBM is focused on the protection of the device, regardless of the business applications used by employees today or in the future.

• Capabilities in the new mobile device security management service include:
• Configuring employee devices to comply with security policies and actively monitoring to help ensure compliance over time
• Securing data in the event that a device is lost or stolen
• Helping to find a lost or stolen device - wherever it is
• Protecting against spyware and viruses
• Detecting and removing malicious and unapproved applications
• Monitoring and tracking user activity
• Enabling more secure connectivity


"The BYOD trend creates real opportunity for employees to become more productive, but it also carries risk unless it is managed properly," said Marisa Viveros, vice president, IBM Security Services. "The new service from IBM helps organizations protect their enterprise data while allowing employees to have the flexibility needed for today's work environment."

The IBM Hosted Mobile Device Security Management service coupled with our strong data loss prevention expertise assists clients in securing access, data, and applications. It also further enhances IBM's broad portfolio of mobile solutions for enterprise clients. IBM's managed security services support leading third-party technologies in addition to its own. The company is working with Juniper Networks on this mobile security service for the underlying protection and device management technology for leading platforms such as Apple iOS, Google Android, BlackBerry, Symbian and Microsoft Windows Mobile through the Juniper Networks Junos Pulse Mobile Security Suite.

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3

  • Camden Door Controls Application Spec Guide

    Camden Door Controls Application Spec Guide

    Camden Door Controls, an industry-leading provider of innovative, high quality door activation and locking products, has published a new application spec guide for specification writers designing a wireless barrier-free restroom control system. 3

  • Genetec Security Center

    Genetec Security Center

    This major new release allows more system components to run in the cloud, reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex, specialized integrations. 3