Foreword

The sweep of mobile devices into our lives has transformed business IT in only a few short years. If you are holding this book in your hands, then you have no doubt encountered this massive change firsthand, and you are looking for answers. Looking out over the next few years, mobile devices will continue to transform the way that we do business.

New form factors such as tablets and “dockable” smartphones will allow users to replace laptops and desktops, DVRs, radios, DVD players, and many other “fixed” devices — untethering us completely. Ubiquitous network access through Wi-Fi, 3G, 4G/LTE, and beyond will allow us to do work anywhere, and at any time. Advances in peripherals and device-to-device interaction will integrate these devices into our lives much more seamlessly, no longer requiring us to remove them from our pockets.

All of this freedom, however, brings forth a huge challenge for corporate IT. It wasn’t that long ago when our IT departments required that users access corporate data and applications from a specific, corporate-issued device (typically a RIM BlackBerry).

Starting with the release of the Apple iPhone, however, users began to demand choice, ushering in a new era of consumerization that will forever change enterprise IT. Today’s users typically purchase their own mobile device of choice, and they find a way to connect it to the corporate network. Your challenge is to provide the flexibility that your users need, without sacrificing security, and this book, Mobile Device Security For Dummies, provides a complete look at the best practices for allowing you to meet that challenge. The authors are at the forefront of mobile device security strategy and product development, and are particularly well-suited to provide a balanced view of the current state of security concerns, and recommend ways to assuage those concerns. They regularly advise a range of customers across just about every domain and industry vertical, so chances are they have experience dealing with other organizations just like yours, with similar challenges.

The mobile world is evolving quickly — with new devices, operating systems, capabilities, and even threats emerging with every passing day. To meet the inexorable mobile changes, you’ll want best practices on how to manage these challenges while adapting the new truths of mobility in the enterprise. So go ahead: Ride the mobile wave safely with the best tools and practices available in the market.

Mark Bauhaus

Executive Vice President

Device and Network Systems Business Group

Juniper Networks

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset