7 Hot Mobile Trends for 2012: Page 3

Privacy concerns and location-based services will lead the way, yet a host of other mobile trends will shape this booming market.


You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

Posted December 14, 2011

Jeff Vance

(Page 3 of 3)

6. MDM evolves into MRM

As IT managers and CIOs struggle with (BYOD) initiatives, the quickest fix is to adopt a Mobile Device Management (MDM) solution. (See our MDM buying guide for guidance.)

Several mobile industry insiders, though, beg to differ, and many have been pitching me lately on the idea that MDM is a passing fad. Some think it should be integrated as a feature in security suites or infrastructure management software. Others believe it will be integrated into some sort of cloud-based app management tool. Still others believe that when RIM opened up BES to other OSes, it was pretty much game over for other MDM vendors.

The most interesting take is that MDM will start to refocus around risk. Startup Fixmo believes that MDM, as is, approaches things with a faulty premise.

According to Rick Segal, CEO of Fixmo, on the topic of MDM asks, Where is the device? What does our inventory look like? Can we remotely wipe it? What apps will it get access to? Mobile Risk Management, on the other hand, checks to see if the device is in an acceptable, uncompromised state, with antivirus turned on, with authentication enforced and with privileges restricted if, say, you try to access corporate assets over public WiFi.

Fixmo recently surveyed four airlines, Air Canada, Delta, American, and British Air, asking them about lost devices. “Lost phones outnumbered lost laptops 50 to 1,” Segal said. “Tablets were also frequently lost, usually just left in the seat pocket.”

The problem with MDM is that someone could find the lost tablet and access sensitive data before it is ever reported as lost or stolen. Or, let’s say it is reported as lost; if the device is in airplane mode, someone could still pilfer anything stored locally on the device, because it wouldn’t wipe until it connected to a network. And while MDM might enforce password protection, someone sitting next to you could easily see that you’ve entered “8345” or drawn a “z” to access your phone.

“This is such a huge risk that I wouldn’t be surprised if someday a lawyer who loses a poorly secured tablet is disbarred,” Segal said. With MRM in place, the lost tablet wouldn’t grant access to any sensitive data without a secure wireless connection, which would then give the MRM back-end engine the ability to check on the state of the device and lock down the device, wipe it or request a higher level of authentication if a suspicious behavior is noticed.

7. Mobile wallets and NFC challenge paper money and, perhaps, banks

Google Wallet launched in May of 2011, prompting retailers around the country to accept NFC (Near Field Communications) payments at select locations. However, to access those terminals, users needed to have NFC technologies built into their smartphones or be able to augment their current phones with technologies from third-party providers, such as Device Fidelity.

2012 will see far more phones shipped with built-in NFC technologies, and many more retailers (and banks) will line up to reap some of the profits. However, are customers going to line up and go “paper money-less” in the coming months? Or will simply pulling out a credit card seem simpler?

“Besides the convenience aspect of using your smartphone vs. utilizing your credit card, the integration of location-based services and online coupons alongside NFC will also motivate users to begin to adopt this technology,” said Tom Kemp, CEO of Centrify, a provider of security and compliance solutions.

Another concern will be security, but with companies like MasterCard, Citi, and most of the big mobile carriers poised to support NFC’s expansion, making consumers feel secure should be a priority.

One interesting possibility is that carriers could try to supplant banks as major lenders. Consumers probably won’t care much one way or another. Banks are widely loathed today, but carriers aren’t exactly loved by consumers.

5 Trends that just missed the cut:

1. Mobile malware. We all know this is a never-ending issue, so it’s not so much a trend as an ongoing disappointment.

2. RIM threatens MDM vendors with Mobile Fusion. This would have been a great move two years ago. Now, it very well could be too late.

3. Tablets. Yes, adoption will continue to rise, but the status quo has been pretty well covered in pretty much every tech and even consumer pub under the sun. Until somebody really challenges the iPad, there’s nothing new here.

4. Overtaxed bandwidth. Yes, a proliferation of devices in the enterprise will tax corporate bandwidth. Yet isn’t bandwidth always overburdened, especially in the U.S. where carrier monopolies mean that even in major metro areas, few of us have access to fiber-optic broadband connections?

5. M2M takes off. I’d argue this trend is already well under way, but the fact that GE announced that it plans to build an “industrial Internet,” which will mostly consist of machines talking to one another, could mean I’ll be revisiting this topic soon in 2012.

Do your mobile predictions differ from the ones above? Let us know in the comment section below.

Page 3 of 3

Previous Page
1 2 3

Tags: mobile, privacy, sms, location services

0 Comments (click to add your comment)
Comment and Contribute


(Maximum characters: 1200). You have characters left.



IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.