Cybersecurity , Data Breach , Risk Management

Securing Mobile Devices IBM MaaS360's Stephen McCormack on MDM Challenges and Solutions
Securing Mobile Devices
Stephen McCormack, IBM MaaS360

Given the breadth of mobile devices and operating systems, a mobile device management solution seems a no-brainer for most organizations. But many challenges to deploying an effective solution exist, including:

  • Cost;
  • Scalability;
  • Integration with other security solutions.

An MDM solution that can properly secure employee-owned mobile devices and the sensitive corporate data contained on them while maintaining privacy for those users is essential. Stephen McCormack of IBM MaaS360 explains that a good MDM solution can "containerize" areas of the device so that employees can work unimpeded without having to rely on less secure "shadow IT" workarounds like Dropbox and Gmail.

In this exclusive interview, McCormack also discusses:

  • The types of controls needed in an effective MDM solution;
  • The ways in which an MDM solution like IBM MaaS360 stops both types of insider threats;
  • How IBM MaaS360 prepares its customers in securing their mobile devices.

As an IBM MaaS360 specialist, McCormack leverages more than 12 years' experience in IT to help his clients address their MDM strategies, enabling them to maximize the productivity of their mobile devices while ensuring the highest levels of security. In particular, McCormack helps with the often thorny areas of BYOD strategy, mobile device security planning and integration of mobile devices with other IT infrastructure.




Around the Network