Emerging Technologies & Mobile Devices Essay

In the modern world, the popularity of various mobile and portable devices is increasing. This trend creates a number of risks for companies. As employees tend to bring own devices to work and access corporate networks, the chances that corporate sensitive data are stolen or disclosed increase. According to the survey of IT security professionals, mobile devices present the highest risks for business security (Marston, 2015). Security concerns for mobile devices include device theft, data theft or data sniffing, presence of malware in mobile apps, trespassers’ unauthorized access to mobile devices, etc. (Marston, 2015).  

The emerging technology that will have the biggest effect on telecommunications is Virtual Mobile Infrastructure (VMI). This approach addresses the problem of business risks associated with the use of mobile phones. VMI technology is based on hosting a mobile operating system in a remote location (i.e. in the cloud or in a data center). Devices establish a remote access to VMI and execute mobile apps remotely. The data transmission is performed using special protocols for optimizing mobile display. This technology allows organizations to ensure that mobile devices operate in a secure environment, to prevent data loss or data theft associated with the device, and to streamline mobile-related IT processes (Marston, 2015). Currently VMI has several disadvantages that should be addressed in the future: significant resource consumption and bandwidth consumption, performance issues on weaker devices.

Another security-solution for mobile devices is app wrapping, also referred to as app virtualization. This technology allows wrapping individual apps instead of hosting the whole operating system remotely (as VMI does) (Marston, 2015). App wrapping allows securing data transmission and data storage for specific apps. It also helps to accelerate development of mobile applications, reduces risks of data loss or theft, and prevents man-in-the-middle attacks (Marston, 2015). However, app wrapping is still vulnerable to insecure user behaviors such as weak password, unauthorized access of third parties to the device, etc.

References

Marston, J. (2015). Virtual Mobile Infrastructure: secure the data and apps, in lieu of the device. Network World. Retrieved from http://www.networkworld.com/article/2937789/mobile-security/virtual-mobile-infrastructure-secure-the-data-and-apps-in-lieu-of-the-device.html

The terms offer and acceptance. (2016, May 17). Retrieved from

[Accessed: March 28, 2024]

"The terms offer and acceptance." freeessays.club, 17 May 2016.

[Accessed: March 28, 2024]

freeessays.club (2016) The terms offer and acceptance [Online].
Available at:

[Accessed: March 28, 2024]

"The terms offer and acceptance." freeessays.club, 17 May 2016

[Accessed: March 28, 2024]

"The terms offer and acceptance." freeessays.club, 17 May 2016

[Accessed: March 28, 2024]

"The terms offer and acceptance." freeessays.club, 17 May 2016

[Accessed: March 28, 2024]

"The terms offer and acceptance." freeessays.club, 17 May 2016

[Accessed: March 28, 2024]
close
Haven't found the right essay?
Get an expert to write you the one you need!
print

Professional writers and researchers

quotes

Sources and citation are provided

clock

3 hour delivery

person