Enterprise security professionals point to problems with integration, scale, and support for various mobile device types Now that it’s February, the entire security industry (sans a few noble protesters) is gearing up for this month’s RSA Conference in San Francisco. Once again, I anticipate a lot of buzz around all-things mobile computing security this year just as there was in 2013. MDM/MAM is sure to come up too – what with Citrix’s buying Zenprise last year, IBM’s purchase of Fiberlink, and VMware’s recent acquisition of AirWatch. Yup, everyone will be talking MDM, MAM, mobile business processes, mobile development, and so on. They’ll be pointing out killer applications, wonderfully productive use cases, and burgeoning application development trends as well. Great story, but the fact remains that most of the market is still only toe-dipping in this area. Soon-to-be-published ESG research indicates that less than half (48%) of enterprise organizations (i.e. more than 1,000 employees) have even deployed an MDM solution. What’s more, only 43% of those organizations that have deployed MDM have selected one product as an enterprise standard (i.e. so .48 x .43 = 21% of enterprises that have deployed MDM and have selected on product as an enterprise standard). In aggregate, most enterprise are just getting started or deploying products tactically at a departmental level.ESG also asked enterprise security and IT pros working at organizations that have deployed MDM to comment on the challenges they’ve had with MDM thus far. Here are some examples of their issues:• 38% say that MDM is difficult to integrate with other security technologies• 35% say that they have experienced scalability problems with MDM as far as supporting a large number of mobile devices• 30% say that MDM features and functionality work differently on different types of mobile devices• 30% say that MDM is more difficult to use than they anticipated• 29% say that they have experienced difficulty with MDM implementationIn my humble opinion, this data is yet another indicator of market immaturity. Enterprise organizations are finding it cumbersome to deploy, operate, integrate, and scale MDM which reinforces that MDM is still in the “point tools” phase of its lifecycle. Compare this to just about any enterprise-class product that is built for scale, integration, central command-and-control, and formal IT operations processes. See what I mean?Of course, this data is representative of the entire enterprise market and there are certainly advanced organizations who are far ahead. I’ve heard some compelling use cased from customers of Good Technology and MobileIron who’ve progressed well beyond basic MDM implementation and usage and are doing incredible things with mobile computing overall. Nevertheless, these firms represent the leading-edge of the market – a small percentage of the total.To be clear, I understand the vision here. The fact is that mobile computing (and a cloud back-end) represents the future of application development which translates into the future of IT. While most organizations are racing toward mobile computing Nirvana, the majority of enterprises remain closer to the starting line than the finish line, and pacing themselves for the long road ahead. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe