Mobile Endpoint Security

Archived Published: 12 April 2012 ID: G00231048


Not a Gartner Client?

Want more research like this?
Learn the benefits of becoming a Gartner client.

contact us online


Securing mobile endpoints (including notebooks, tablets and smartphones) is a requirement for most organizations. The controls needed on the mobile endpoint depend on the information to be stored on the device (if any is to be stored at all), the ownership of the mobile endpoint device and the mobile application architecture. This Decision Point examines the architectural decisions for mobile endpoint controls and shows the relationship between security controls, the mobile application architecture, network connectivity and mobile device management.

Table of Contents

  • Decision Point
  • Decision Context
    • Business Scenario
    • Architectural Context
    • Related Decisions
  • Evaluation Criteria
    • Requirements and Constraints
      • Offline Versus Online Access
      • Storage of Information on the Device
      • Type of Device
      • Endpoint Ownership
    • Principles
  • Alternatives
    • Unmanaged Mobile Endpoint Devices
    • Moderately Managed Mobile Endpoint Devices
    • Heavily Managed Mobile Endpoint Devices
    • Managed Containers
  • Future Developments
  • Decision Tool
    • Controls on the Endpoint Device Position
      • No Controls Are Necessary on the Device to Protect the Stored Data
      • Controls Are Necessary on the Device
    • Type of Endpoint Controls Position
      • Risk Is Not Appropriate to Accept
      • Take Control of the Mobile Device, Heavily Manage It and Properly Configure the Mobile Device
      • Take Control of the Fixed Device, Control Physical and Logical Access to It, Heavily Manage It and Properly Configure the Fixed Device
      • Put Data Into a Managed Container With Appropriate Controls or Moderately Manage the Mobile Device
      • Use a Managed Container to Separate and Protect Enterprise Data
      • Moderately Manage the Device
      • Require Authentication to the Mobile Device, Consider the Ability to Wipe the Device and Provide Security Awareness to the User on How to Protect the Mobile Device
      • Provide Security Awareness to the User on How to Protect the Mobile Device
    • Configuration and Policy Compliance Position
      • Utilize an Appropriate Agent on the Mobile Endpoint Device and Use It to Verify Endpoint Configurations
      • Do Not Utilize an Agent
    • Anti-malware Position
      • Utilize Anti-malware Controls on the Mobile Endpoint Device
      • Do Not Utilize Anti-malware Controls on the Mobile Endpoint Device
  • Recommended Reading
© 2012 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartners research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.

Free Research

Discover what 12,000 CIOs and Senior IT leaders already know.

Free Access

Why Gartner

Gartner delivers the technology-related insight you need to make the right decisions, every day.

Find out more

Call +1 855-515-4486 or contact us

to become a Gartner client.