Published: 20 July 2017
Summary
This Hype Cycle focuses on technologies that protect enterprise data, while enabling mobility. Security and risk management leaders must define their mobile security strategies now, focusing on effectiveness and usability, and avoiding unviable technologies.
Included in Full Research
- What You Need to Know
- The Hype Cycle
- The Priority Matrix
- Off the Hype Cycle
- On the Rise
- API Threat Protection
- Bring Your Own Thing
- At the Peak
- Data Backup Tools for Mobile Devices
- Digital Security
- DLP for Mobile Devices
- Mobile Threat Defense
- Unified Endpoint Management
- Workspace Aggregators
- Virtual Mobile Infrastructure
- Sliding Into the Trough
- Trusted Mobile Environments
- Protected Mobile Browsers
- Enterprise Mobile App Stores
- Secure Instant Communications
- Application Shielding
- Mobile Virtual Private Networks
- Cloud Access Security Brokers
- Mobile SSO
- Microsegmentation (Software-Defined Segmentation)
- Climbing the Slope
- Content Collaboration Platforms
- Mobile Application Security Testing
- EMM Security
- Consumer Mobile Security Apps
- Data Disposal Tools for Mobile Devices
- Biometric Authentication Methods
- BYOD
- Trusted Portable Storage Security
- Appendixes
- Hype Cycle Phases, Benefit Ratings and Maturity Levels