MDM Essential for IT Success Skip to main content

Gartner Forecasts Security and Risk Management Spending in India to Grow 12% in 2024

  GenAI-Driven Attacks Require Changes to Application and Data Security Practices and User Monitoring End-user spending on security and risk management (SRM) in India is forecast to total $2.9 billion in 2024, an increase of 12.4% from 2023, according to a new forecast from Gartner, Inc. Indian organizations will continue to increase their security spending through 2024 due to legacy IT modernization using cloud technology, industry demand for digital platforms, updated regulatory environment, and continuous remote/hybrid work. “In 2024, chief information and security officers (CISOs) in India will prioritize their spending on SRM to improve organizational resilience and compliance,” said  Shailendra Upadhyay , Sr Principal at Gartner. “With the introduction of stringent government measures mandating security breach reporting and digital  data protection , CISOs are facing heightened responsibility in safeguarding critical assets against evolving cyber threats.” Gartner a...

MDM Essential for IT Success

Mobile device management (MDM) has become a crucial discipline for IT departments, given the increasing number of smartphones and media tablets used within organisations, says market analyst Gartner.  MDM
"The era of fully supporting company-owned devices is giving way to managed diversity in which tiered support for employee-owned, consumer-class devices is the norm," says Terrence Cosgrove, research director at Gartner.
With the unabated growth of consumerisation, IT leaders need to implement MDM to manage corporate- and employee-owned devices.
"Also, assign responsibilities inside IT departments for the service, application and security of all these devices," explains Cosgrove.
MDM requires coordination between security and operations. The measures firms take to implement mobile device security are mostly about ensuring device configurations match corporate policy.
For example, they check whether devices are protected by a compliant password and that the information they contain can be wiped, should circumstances call for this.

"Because of the complexity of the mobile device landscape, there must be a person or group responsible for monitoring and understanding users' demands for new types of device and the impact that new platforms have on applications," he adds.
"This person or group must work with the security team to address the impact that platform changes and demands for mobile services have on the organisation's security."

Corporations are moving from a single-standard approach to controlling mobility to a more flexible approach. Gartner calls this "managed diversity" — one that supports the variety of mobile devices found in the company.
“This is the only approach that helps IT leaders maintain control over mobility, and supports bring-your-own-device programs.”

The key to this strategy is to provide an appliance service that offers support for both personally owned devices (individually liable) and business-specific devices (corporate-liable).

The analyst firms adds that without managed diversity, corporations are likely to face increased costs for three reasons:
Reduced user productivity, if the IT standard does not suit users' needs; a perception on the part of users that the IT department has lost relevance, which prompts more users to support themselves and increases indirect costs; higher noncompliance costs incurred by users who circumvent IT standards.

Although some MDM vendors and products have been around a long time, MDM is a nascent market and growing rapidly.
Today, there are over 100 MDM vendors, with most offering on-premises or software-as-a-service tools. More mature managed services will emerge during the next three years to drive growth in the industry.

Gartner predicts pure MDM revenue (i.e., excluding revenue relating to messaging and security) will exceed US$500 million in 2012. Corporations have to decide whether a heavyweight (i.e., container-based) or lightweight (i.e., policy-based) approach is appropriate for them.
“A variety of factors come into play here, including device ownership (whether the user or the organization owns the device), security, compliance, application delivery and device usability,” says Cosgrove.

-----Gartner

Comments

Popular posts from this blog

Mobile Phones Sales Plummet

Details Published on Thursday, 16 August 2012 06:34 Worldwide sales of mobile phones reached 419 million units in the second quarter of 2012, a 2.3 percent decline from the second quarter of 2011, according to Gartner. Smartphone sales accounted for 36.7 percent of total mobile phone sales and grew 42.7 percent in the second quarter of 2012. "Demand slowed further in the second quarter of 2012," says Anshul Gupta, principal research analyst at Gartner. "The challenging economic environment and users postponing upgrades to take advantage of high-profile device launches and promotions available later in the year slowed demand across markets. Demand of feature phones continued to decline, weakening the overall mobile phone market. "High-profile smartphone launches from key manufacturers such as the anticipated Apple iPhone 5, along with Chinese manufacturers pushing 3G and preparing for major device launches in the second half of 2012, will drive the smartpho...

Now facebook hit with international class action privacy suit

An Austrian privacy activist has launched a wide-reaching class action suit against Facebook Ireland for breaching European data protection law. Anyone outside of the US and Canada can join activist and law student Max Schrems' suit via the website fbclaim.com, since they will have signed up to Facebook's terms and conditions via the Dublin-based European subsidiary. That amounts to around 82 percent of all Facebook users. After being live for just one hour, the site has collected 100 participants. The suit is seeking damages of €500 ($537) per user, and injunctions to be levied on the company for the following breaches:     Failing to get "effective consent" for using data     Implementing a legally invalid data use policy     Tracking users online outside of Facebook via "Like" buttons     Using big data to monitor users     Failing to make Graph Search opt-in     The unauthorized passing of use...

Cabling and Data Explosion

Details     Published on Tuesday, 13 November 2012 05:39 The explosion of 'big data' and the seemingly limitless demand for bandwidth are driving trends in today's IT-centric world. The 'faster, better, most cost effective' mentality has led enterprises of all sizes to closely scrutinize their communications networks and networking infrastructure. network-cables The need to deploy high speed network backbones that meet future requirements, while simultaneously reducing costs, present conflicting interests. With the need for higher bandwidth and flexibility for growth, organizations are looking at the network's physical layer and its overall life cycle as a capital investment that is essential to the business. Throw into this conundrum the increasing focus on sustainability and the task of designing a network high-performance, high-efficiency network seems almost insurmountable. Addressing efficiency at a physical infrastructure level has fueled the growing ado...