Previous Page  45 / 164 Next Page
Show Menu
Previous Page 45 / 164 Next Page
Page Background


will satisfy the needs of end users within syn-

chronisation features.

Even with all these synchronisation possibili-

ties, cloud storage and rights management ser-

vices, there is still a need to secure the endpoint

device. With mobile devices, there’s a danger that

malware, lack of remote control, personal games

and apps may interfere with corporate workloads.

Anti-malware solutions, corporate data encryp-

tion and workload separation on endpoints are

important parts of any secure mobility strategy. In

the next few years, mobile application containeri-

sation will become a big theme in mobile security.

Remote management is another important

item in your strategy. Whether you are using a

remote management and monitoring solution,

or a mobile device management solution in-

house, you need a solution that assists end users

remotely and solves potential problems.

With the difficulties of corporate IT in con-

trolling mobile devices and getting the data

within the corporate walls, endpoint backup is

becoming more relevant. A solution that can of-

fer full protection and allow for a quick restore

for an entire device will close the remaining gaps

in company’s endpoint security strategy.

Mobility concepts such as bring your own

device or choose your own device are here to

stay, and the demand from end users to access

workloads and data any time, anywhere and

from any device will continue to grow. IT is

facing more and more pressure to deliver on

those demands. While the IT industry is re-

sponding to the modern requirements with

comprehensive technical solutions to make

them work for business, IT departments need

to change their mindset, break down silos and

develop a total strategy that incorporates mul-

tiple security enabling layers.

Mike Resseler is a product strategy specialist

at Veeam Software