Feeds

Mobile device mayhem, or...

Who decides?

SANS - Survey on application security programs

In our recent mobile state of the nation survey, we asked you about what was important in a mobile device. In many respects, the results were pretty predictable in that, surprise surprise, battery life and decent voice capability were top of the list:

Quite a few then highlighted the importance of high-speed data access, whether WiFi or cellular based, with a fairly consistent shout beyond this for a reasonably sized display and basics such as integrated Bluetooth support.

As you work your way down the list, however, you get to features and functionality such as QWERTY keyboards, Wireless VoIP, etc, that appeal to some, with others not being that fussed. Then at the bottom we have a couple of items that not only appeal to a minority, but are actively not wanted by some people. Indeed, there are more people that definitely don’t want an integrated camera than want one, though the majority can’t get worked up either way.

This variation in demand for features begs the question of how organisations decide which of their mobile users are issued with which types of device – or even, whether the organisation decides at all, as there is clearly the option of leaving the decision in the hands of users themselves.

Against this background, we'd like to know how it works in your organisation. Which way do you lean on the freedom versus control thing and why? If you like to lock everything down, how do you decide which users get which devices? If you try to stike a balance, then what approach do you use - standard range of devices from which the user can chooose, or anything so long as it conforms to a certain spec or list of criteria? And how easy is it to enforce whatever policies you have in place given that users often think of their device as something very personal?

We know a lot of you have had to tackle the issues in this whole area, so tell us your experiences, good or bad, below:

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.