Gartner Research

Enterprise Strategies for Managing the Risks of Tablets

Published: 10 September 2013

ID: G00249523

Analyst(s): Phil Schacter

Summary

Most enterprises are coping with the influx of tablets and the rapid expansion in their use. This document considers strategies for managing the risks posed by tablets that are used for both personal and work-related activities. The most common configurations and risk scenarios are re-examined.

Table Of Contents

Summary of Findings

Analysis

  • Tablet Computing Background and Trends
    • Tablet Ecosystem
    • Tablet Market Trends
    • Trends in Enterprise Programs for Supporting Tablets
  • Most Common Use Cases
    • Tablets for Communicating With Other Employees
    • Tablets for Portable Decision Support
    • Tablets for Access to LOB Applications
    • Unmanaged Tablets for Occasional or Guest Use
    • Tablets for Remote Work and Work at Home
  • Risk Scenarios for Tablets
    • Loss and/or Theft
    • Uncertain App Stores and Apps Containing Malware
    • A New Platform for Malware
    • Insider Fraud and Theft of Intellectual Property
    • Use on Unsecured Home Networks and Wireless Hot Spots
    • Loss of Accountability When Tablets Are Shared
  • Policies That Are Related to the Use of Tablets
    • Acceptable Use
    • Information Access and Storage
    • Device Security Configuration
    • Certified App Store Policy
    • Access to Business Email
    • Access to Business Applications
    • Access to the Network
    • A Lost or Stolen Tablet
  • Risk Mitigation Strategies
    • User Authentication
    • Identifying the Unmanaged Device
    • Remote Wipe
    • Encrypting Local Data
    • MDM and the Sandbox/Container on the Tablet
    • Securing Data in Transit
    • Keeping the Data at the Data Center
    • Leveraging Endpoint Virtualization
    • Virtualization on the Tablet
  • Strengths
  • Weaknesses
  • Understand What the Business and the Users Want to Do
  • Review and Extend Current Endpoint Policies
  • Learn How the Technologies and Controls Work
  • Establish Workable Controls That Fit Each Use Case
  • Assess the Impact on IT Service Delivery Systems
  • Be Prepared for the Consequences of Success

Recommended Reading

©2020 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.