Mobile Threat Management: Vendor Analysis Breaks New Ground in Mobile Domain

Posted: October 5, 2017 in Executive Corner, Mobility, Uncategorized
Tags: , , , , , , ,

Republished from IDC Community

Enterprise Mobility Management (EMM) has become a mainstay of mobile deployments today and is recognized as a must for any enterpricyberse company. While EMM handles the basics of securing mobile devices and protecting corporate data and assets, it falls short in several areas, included Man-in-the-Middle attacks, Malware, phishing attacks and modified devices (jailbreaking, etc.). For this reason, a new security add-on has taken shape in the industry: Mobile Threat Management (MTM) software. This cutting-edge technology in the mobile space is just now coming into its own and being recognized as a key need by enterprise executives, augmenting EMM to fully secure devices.

IDC sees the mobile threat management market gaining momentum as more enterprises decide that EMM/MDM and native sandboxing and segmentation on mobile operating systems (OSs) are not enough to meet overall mobile threat management needs. According to IDC’s 2017 U.S. Enterprise Mobility Decision Maker Survey, half of U.S. enterprises and SMBs have deployed some form of mobile device security solution — mobile antimalware, mobile threat management, or mobile app scanning. An additional one-third of U.S. businesses not using MTM today plan to deploy this technology in the future.

Essential Guidance for Enterprise Leaders

Since this is a new technology, potential buyers should consider a number of factors as they make their buyer decision:

  • Current capabilities. Customers should be aware that there are necessary baseline capabilities that ensure that the product goes beyond device management or simple virus scanning to provide true threat management that is not cumbersome to the user.
  • Evolving product road map. The road map extends past basic product functionality and looks to accommodate current mobile device offerings and is future looking to position the company and product to be a leader in the industry.
  • Customer assessment of vendor. No matter how many features a product has or how long it’s been on the market, if it is does not meet the needs of the customer or if it is cumbersome for the customer to install, support, or use, it will not be adopted.
  • Support. As MTM is still a relatively new area for most enterprises, it is important that support is easily accessible to the IT organization.
  • Intellectual property. To be a true leader in MTM, it is important for the product to go beyond just basic capabilities to incorporate advanced technologies like machine learning and AI capabilities.

You can find full assessment and analysis of the following vendors in IDC’s latest report on mobility, IDC MarketScape: Worldwide Mobile Threat Management Security Software 2017 Vendor Assessment (Document #US42373417). For a full abstract on this report, click here.

  •  Appthority
  • Better Mobile Security
  • Check Point
  • Kaspersky
  • Lookout
  • Symantec
  • Wandera
  • Zimperium
  • Zscaler
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s