6. Conclusion
Mobile device security is a fast-moving field. Today, perceived security seems more accomplished in Apple environments, at the price of a lack of transparency and a policy of controlling the single Apple Store application store.
In contrast, the Android model offers few security functions by default, and requires a more global approach to the applications to be installed in order to make the terminal more secure. On the other hand, when it comes to managing corporate fleets of terminals, the situation is becoming more balanced thanks to the growing maturity of MDM solutions, and the security functions on offer ensure equivalent protection for both competitors.
Companies also need to learn how to integrate these terminals into their mobility management strategy. The challenge will be to avoid a multiplication of management and supervision...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Conclusion
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Also in our database
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!