Users want better data security and integrated solutions Great article by Tim Greene on endpoint security (http://www.networkworld.com/news/2010/040110-endpoint-security.html?hpg1=bn).One of Tim’s points was with regard to mobile device security. Large organizations now realize that endpoint security (and management) extends beyond PCs to mobile devices like Blackberrys, Droids, iPhones, iPads (author’s note: just had to get in an iPad reference today), etc.So which security technologies are most important for mobile device protection? According to a recent ESG Research survey, here are the top 5:1. Device encryption (51% of respondents rated this as “very important, 34% rated this as “important”)2. Device firewall (48% of respondents rated this as “very important, 37% rated this as “important”)3. Strong authentication (46% of respondents rated this as “very important, 41% rated this as “important”)4. Antivirus/Anti-spam (45% of respondents rated this as “very important, 37% rated this as “important”)5. Device locking (44% of respondents rated this as “very important, 41% rated this as “important”)Tim also interviewed several organizations looking to manage mobile device and PC/laptop security with common tools and processes. These folks are not alone — 70% of the organizations’ surveyed by ESG said that mobile devices and PC/laptop security is managed by the same group within IT, so it is safe to assume that these folks want to address new security concerns with established tools and processes rather than start over again with new ones. In my humble opinion, mobile device security is one of those areas that should get more attention. My guess is that this topic will remain buried — until a lost or stolen iPhone leads to a visible and costly security breach. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe