By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Q&A: Securing mobile apps and data is key to BYOD
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Mobile > Cellphones > Q&A: Securing mobile apps and data is key to BYOD
CellphonesEnterpriseMobileSoftwareTablets

Q&A: Securing mobile apps and data is key to BYOD

Aaron Tan
Last updated: June 13, 2014 at 5:04 PM
Aaron Tan
Published: October 21, 2012
9 Min Read
SHARE

Most IT head honchos would cringe at the prospect of allowing employees to use their own personal devices for work. After all, that means giving up the tight control that employers have always had over devices that connect to corporate networks, while facing the risk of corporate data falling into the wrong hands through lost or stolen devices.

Yet, more employees are yearning to use their own personal devices for work. A survey by VMware revealed that over 50 per cent of employees in Singapore already use their own devices for work-related purposes, whether their companies have a Bring Your Own Device (BYOD) policy or not.

While there is no doubt that BYOD policies improve employee productivity and offers more convenience – since there is only a single device to carry around for sending e-mail messages to co-workers and loved ones alike – enterprises are now faced with the challenge of securing a much wider pool of personal devices.

Typically, this is done through mobile device management (MDM) suites that provide many of the standard features in PC management software, as well as additional functionality that address the unique needs of mobile devices.

Increasingly, more companies are considering mobile application management (MAM) software that allows specific mobile apps to be managed, secured and distributed by IT departments through enhanced policies applied to individual applications.

As there is a growing need to manage both mobile devices and mobile applications, technology consultancy IDC said the market is forcing the merger of two previously distinct MDM and MAM markets into a new market called mobile enterprise management (MEM) software.

According to IDC, global MEM software revenue totaled US$444.6 million last year. This market, which includes products that offer standalone MDM, standalone MAM, or combined MDM-MAM suites, is expected rake in revenues worth US$1.8 billion by 2016.

In this month’s Q&A with Techgoondu, Jim Watson, vice president and corporate general manager at Good Technology in the Asia-Pacific region, argues that MDM is becoming a commodity, and that the future of enterprise mobility lies in MAM.

Q: With MAM, would you say that enterprises would no longer need to secure mobile devices as much as they did in the past?

A: MDM is becoming a commodity. We compare MDM to airbags in the car industry. When airbags first came out, they were cool – people had different airbags and when you bought a car, you actually paid extra for the airbags. Now, every car manufacturer has airbags.

From an MDM perspective, we do what everybody else does, but we call MDM mobile data management, so we are interested in managing the data. Locking down the device is not hard to do from a security perspective. Locking down the data is really the key issue. I think you’ll see a shakeout in the MDM industry. We’re seeing some MDM companies offer six to 12 months of free subscriptions, but how do you make money out of free?

“BYOD is bringing new nuances to the market with HR and legal issues.”

–Jim Watson, Good Technology Asia-Pacific vice president and corporate general manager

We’ve approached the mobile applications market from three perspectives. First, secure e-mail. The number one problem that we address is how do you secure non-BlackBerry devices? Good Technology is an 11-year-old company with very similar security to BlackBerry – we own over 70 patents around our security architecture.

Second, we’ve taken the underpinnings of our architecture and published that to third-party vendors through Good Dynamics. Today, an employee might take an attachment, send it to his personal e-mail, download that attachment and put it on Dropbox in the cloud, only to have that hacked when Dropbox gets compromised. With Good Dynamics, you can enforce how that employee manages that data so they can only open certain attachments and third-party applications.

Thirdly, we’re helping companies secure and manage their data and applications, create their own enterprise app stores and wrap their apps through AppCentral, which we just bought and are in the midst of integrating with Good Dynamics.

Q: What are your thoughts on BYOD? When does BYOD make sense to companies and when does it not make sense, especially among enterprises with existing enterprise mobility policies for corporate issued devices?

A: BYOD adoption ranges from zero to 100 per cent, and it really depends on the enterprises. First of all, they have to establish a strategy, in terms of what they will allow and what markets they are in. In heavily regulated markets, you’ll see less adoption of BYOD because of concerns over security. But we believe within six months, 50 per cent of enterprises will adopt some form of BYOD, and there are two reasons for that.

One, it has become expensive to manage these devices. We have clients with 10,000 BlackBerry devices that they’re managing through SingTel, and there’s a cost associated with that. Employers are also trying to get out of managing smartphones, whether it’s giving you a monthly allowance or paying for your device. Second, we believe it’s going to be the norm for employees to go from job to job, expecting to use their own personal devices.

Companies have to get their strategy and agreements in place, such as the legal and HR requirements in addition to the IT requirements. We have a client who is allowing his contractors to bring their own devices, but the contractors are now charging the client extra two hours a day because they’re checking e-mail at night. Also, what happens when you wipe out my photos on my device? BYOD is bringing new nuances to the market with HR and legal issues.

Q: Based on your interactions with customers, are the conversations around BYOD driven largely by C-level executives or from the ground-up?

A: It starts from the C-level but it’s the business units that are driving adoption because in order to attract and retain the best employees, they’ve got to be progressive. Then, it falls on IT to see how they’re going to do that securely.

Q: While more MDM vendors are moving into MAM, security vendors like Symantec, with their acquisition of Nukona, are also eyeing a slice of the pie. How do you see the market playing out?

A: When you see a company like Good Technology with the success we’ve been blessed with, we’re going to attract competitors, which is a compliment on what we’ve been doing. I think you’ll see security and infrastructure vendors enter the market either through acquisitions or organically. In the past couple of years, we’ve seen our trajectory increase dramatically, and we’ve got a pretty good head start. It’s much harder to enter a market that’s not your mainstream market, and our mainstream market is mobility management. The security vendors tend to be tied to infrastructure security rather than mobile security. We’ll definitely see some competition and hopefully that’ll help to raise everyone’s valuations in the marketplace.

StarHub launches Singapore’s first interactive commercial
Hands-on: BlackBerry Z10
S$5/mth for SingTel push mail on the Nokia E63
Free backup for phone contacts
Is latest Singtel re-organisation sufficient to improve its fortunes?
TAGGED:Q&A

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Previous Article Picking the right Windows 8 version and device
Next Article Oracle toolkit extends enterprise apps to mobile devices
1 Comment
  • Fairwind says:
    October 22, 2012 at 11:27 pm

    A bold and straight dialogue… I hope telcos will also embrace these changes and play a role to support this shift. Provide the ability to recognize application traffic and bill the organization accordingly. This would complete the equation which enterprises are looking for.

    Reply

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Promising speed and better coverage, Singtel 5G+ targets premium users
Mobile Telecom
May 15, 2025
Fujifilm GFX100RF review: Fun medium-format street photography camera
Imaging
May 14, 2025
Looks over AI? Samsung pitches slimmed-down Galaxy S25 Edge
Cellphones Mobile
May 13, 2025
Stunning AI advancements could transform healthcare, education and agriculture globally: Bill Gates
Internet
May 7, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?