News Stay informed about the latest enterprise technology news and product updates.

Mobile security is top priority for 2017

This blog post is part of our Essential Guide: Essential guide to laptop, desktop PC and mobile device strategy

With the rise of multifactor authentication and updates to Apple iOS security, there is a lot to look forward to next year. Four experts gaze into the enterprise mobility crystal ball.

Patrick Moorhead
President and principal analyst, Moor Insights and Strategy

What I am expecting to see is a lot more implementation of multifactor, hardware-based biometric authentication. The ability to use my phone as a second or third factor in authentication is huge. It’s baked into Windows, and it’s now baked into iOS and MacOS. You can only get into your PC if it’s authenticated with your phone and the phone knows your location. And it’s being authenticated with a third-generation biometric like a fingerprint or an iris scan.

Moorhead

Moorhead

I think we’ll see a Surface Phone. In the end, ironically, it’s what a lot of enterprises are asking for. They’re tired of having two or three different programming elements and two or three different ways to manage devices.

Jack Narcotta
Senior analyst, Technology Business Research

Be prepared for a deluge of applications that require a degree of cross-platform interoperability. There’s still a degree of complexity in that kind of conversion, whether it’s Android to iOS or even BlackBerry. For example, for those working with IBM, it’s sort of a natural extension to start working with Apple. Making sure the user experience … is as consistent as possible [is going to be important].

Narcotta

Narcotta

We are going to see diversity of applications. There’s going to be a lot of innovation in markets that are already pretty dynamic—finance, healthcare or logistics. It’s almost like the more complex an industry is, the more exciting the application development will be. They have some unique application requirements too.

Doug Grosfield
President and CEO, Five Nines IT Solutions

Grosfield

Grosfield

We’re going to see a focus on security in iOS and Android. Android has long been the hacker’s playground and an inherently insecure operating system with few options for securing it. All the major endpoint protection software vendors are creating very sophisticated options for Android, but Apple is remaining steadfast in its ostrich mentality, not allowing antivirus protection software to be installed on iOS devices. We will probably see a change in that. Apple has already made some steps in that direction by opening the doors and offering people rewards and incentives for identifying vulnerabilities in their operating systems, especially in iOS.

Michael Finneran
Principal, dBrn Associates

We might finally get mobile [unified communications (UC)] people actually use. UC vendors have tried [to create] cloud-based services and mobile apps that are accessible from pretty much every mobile device … but it has been a total failure. People want to make business calls the same way they make personal calls.

Finneran

Finneran

[Apple’s] CallKit will finally allow third-party applications to access the native dialer in the iPhone. Microsoft announced a similar feature in Skype for Business. My guess is that it’ll be out first quarter next year. [With] Verizon’s One Talk, you can get a business telephone number for your cell phone. You can have it mirrored to your desk phone. It’s the first time we’ve really seen a mobile operator come out with a service specifically designed for enterprise customers. We will still have to see if this is enough to move the needle.

This post originally appeared in the November/December 2016 issue of the Modern Mobility e-zine.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

I would love to know new upcoming ideas on how to manage mobile device usage, what applications are available for the same.
What other strategy do we have apart from BYOD
Cancel

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close