Security

BYOD? But of course!

What do security programs for mobile devices need to be able to do? At CeBIT’s "Business Security" cluster the latest apps for smartphone, etc. will be showcased. Concrete tips will be discussed on several stages.

14 Jan. 2016
Arbeitsplatz der Zukunft

Across the board, mobility is gaining in importance. According to the "Key Technology Trends 2015/2016" report by the European IT Observatory (EITO) almost every second company in Western Europe (47 percent) rates apps from mobile devices as very important. Two years ago, not even every fourth company thought that.

"Employees require mobility, users demand it, and market competition is also putting on the pressure," says EITO boss Dr. Axel Pols, who also heads market research at BITKOM. The number of devices that enable access to company systems and information has grown exponentially in the past five to ten years. "Every organization must allow for a mobile strategy for every facet of its IT infrastructure and application landscape," says Pols.

The security questions that need to be answered for mobile strategy will be addressed at the "Business Security" cluster at CeBIT 2016. Among other things, the "Business Security Forum" organized by SecuMedia Verlag will deliver practical information on apps and on the encryption of mobile data.

The Bring Your Own Device (BYOD) trend presents special challenges to security providers. However, various solutions are promising. "We want to create security without taking away usability," says Secusmart boss Hans-Christoph Quelle. This German company, which was purchased by Blackberry in 2015, encrypts the German Federal Government’s smartphones and has recently begun to offer a user-friendly tablet application that will be presented in Hall 6 at CeBIT.

Answers to mobile questions can also be found at CeBIT’s Public Sector Parc (Hall 7). The Bundesdruckerei will showcase its "trust-me" technology for Android smartphones and tablets. With this, several virtual smartphones can be installed on one device and can be used independently of each another – privately and professionally. By entering a PIN, the user can switch between them. "Within the business area, employees can access the company network along with sensitive data such as e-mail, contact information and calendars," explains Ulrich Hamann, Chairman of the Managing Board of Bundesdruckerei. "Apps which are installed in the private area, on the other hand, have no access to professional data."

"If we want to facilitate further development of technology and digital economy, we need to challenge our thinking again. It’s time for another revolution, a Trust Revolution," says Gary Kovacz, CEO of AVG. He has been very successful in positioning his company on the mobile market in the past years. The AVG AntiVirus PRO, a theft protection program for Android, enables users to find their device, disable it remotely, delete saved data, back-up the applications and even take a photo of the thief. Gary Kovacz is one of the keynote speakers at CeBIT Global Conferences 2016.

Security CEBIT RSS Feed