SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
Report ID:S5060612
Next
reports
BackingUpAndroid
AndiOSDevices
As more employees use their own tablets and smartphones for
work,IT teams need to figure out how to back up data created
while on the go.The answer:a smart mix of policies,cloud
services and mobile device management.We outline a data
protection plan that doesn’t depend on end users,because
“BYOD” shouldn’t mean “back up your own data.”
By Ben DuPont
Reports.InformationWeek.com J u n e 2 0 1 2 $ 9 9
Previous Next
reports
CO
NTENT
S
reports.informationweek.com
TABLE OF
June 2012 2
3 Author’s Bio
4 Executive Summary
5 Mobile Invasion
5 Figure 1:Policy on Personal Mobile Device
Use?
6 Figure 2:Storage of Corporate Data on
Mobile Devices
7 Figure 3:Mobile Device and Data Policies?
9 Consider Cloud
9 Figure 4:Cloud Storage Concerns
11 Encryption
11 Figure 5:Importance of Cloud Storage
Features
12 Figure 6:MBM Feature of Interest
13 Work in Progress
15 Related Reports
ABOUT US
InformationWeek Reports’ analysts arm
business technology decision-makers
with real-world perspective based on
qualitative and quantitative research,
business and technology assessment
and planning tools,and adoption best
practices gleaned from experience.To
contact us,write to managing director
ArtWittmann at awittmann@techweb.com,
content director Lorna Garey at
lgarey@techweb.com, editor-at-large Andrew
Conry-Murray at acmurray@techweb.com, and
research managing editor HeatherVallis at
hvallis@techweb.com. Find all of our
reports at reports.informationweek.com.
B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
June 2012 3
Previous Next
© 2012 InformationWeek,Reproduction Prohibited
reports
reports.informationweek.com
B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Ben DuPont is a software engineer in Green Bay,Wis.,and owner of Nebland
Software LLC.He can be reached at ben@nebland.com.
Ben DuPont
InformationWeekReports
Table of Contents
Follow
Follow
Follow
Follow
Want More?
Never Miss
a Report!
June 2012 4
Previous Next
Smartphones and tablets present new backup challenges for IT.First,IT has to wrestle
with a broad category of products that run on a variety of operating systems,which
complicates centralized management and backups.Second,many of these mobile
devices are owned by the employee,not the company,which limits IT’s control.At the
same time,these employee-owned devices access corporate applications and data,and IT
has an obligation to protect that data.
The result is that IT has to assemble a set of policies and technologies that rely on a
variety of products and services,including cloud-based backup,file synchronization and
mobile device management.A growing number of cloud backup and file synchronization
services offer administrative controls that allow IT to enforce policies,provision and
deprovision users,and monitor content such as Office files.At present,backup isn’t a
significant feature in mobile device management products,but that’s likely to change
over time as more and more end users bring personal mobile devices into the workplace.
At the same time,mobile device management helps ensure that data will be safe from
prying eyes in the event that a device gets lost or stolen.
EXECUTIVE
reports.informationweek.com
reports
SUMMARY
B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
June 2012 5
As smartphone and tablet use grows in the
enterprise, IT wrestles with how to back up
sensitive data that might reside on these plat-
forms.This task is complicated by the fact that
many mobile devices are the property of the
employee, not the employer. In fact, 86% of
respondents to InformationWeek’s 2012
Mobile Security Survey said they allow or plan
to allow employee-owned devices (Figure 1).
Unfortunately for IT, the devices users
choose aren’t the ones IT is most ready for.
While IT can manage BlackBerry devices with-
out much difficulty, users want Apple and
Android products.Our survey shows that 46%
of respondents allow employee-owned Apple
iOS devices to store corporate data, followed
by 42% that allow Android 3.x and 4.x devices,
and 28% that allow Android 2.x devices (Fig-
ure 2). Add BlackBerry at 41% and Windows
Phone at 26% to that list and you can see IT
has its work cut out for it when it comes to
backing up data on these devices.
If you allow user-owned devices to access
corporate applications or data,make sure your
mobile device policy clearly describes the
company’s requirements for allowing that
access. IT’s first reaction to the bring-your-
own-device phenomenon may be to write
separate policies for employee- and company-
issued devices. That’s the wrong approach,
says Michael Finneran, an independent con-
sultant and industry analyst. “Our job is to
make sure mobile users get access to the stuff
they need securely, regardless of who owns
the phone,” says Finneran. “What level of se-
Previous Next
Does your mobility policy allow employees to use personal mobile devices for work?
14%
62%
24%
Policy on Personal Mobile Device Use?
Yes
No,and we have no plans
to allow personal device use
No,but we’re developing a policy
Data: InformationWeek 2012 Mobile Security Survey of 322 business technology professionals, March 2012 R4720512/3
reports.informationweek.com
Mobile Invasion
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Figure 1
June 2012 6
curity is required is defined by the organiza-
tion, … and what users get access to is de-
fined by their role.”
Your policy should also be clear about
where IT’s responsibilities lie regarding back-
ups: IT has a right and an obligation to back
up company data, and to take steps to do so.
But IT doesn’t have any obligation to protect
a user’s personal information, files, applica-
tions and other information, such as photos
and videos.
Of course,separating personal and corporate
data is easier said than done.A mobile device
can quickly become a hodgepodge of busi-
ness and private information. For instance, a
phone’s contact list could have personal and
business contacts.Business documents saved
as PDFs may be loaded into an e-reader app.
Thus,your policy must make it clear that while
IT isn’t responsible for backing up your MP3
files or vacation photos, some personal data
may be intermingled with corporate backups.
Almost half of the respondents to our Infor-
mationWeek Mobile Device Management and
Security Survey have written policies and pro-
Previous Next
Windows
laptops/netbooks
BlackBerry
Apple
iOS
Android
3.x
and
4.x
Windows
Mobile
Android
2.x
Non-Windows
laptops/netbooks
(OS
X,
Linux)
Windows
Phone
WebOS
Symbian
Bada
On which of the following mobile device platforms does your organization permit corporate data to be stored?
Storage of Corporate Data on Mobile Devices
Data: InformationWeek 2012 Mobile Security Survey of 322 business technology professionals, March 2012 R4670512/35
Company-provided Personally owned
80%
41%
70%
41%
62%
46%
42%
36%
35%
25%
35%
28%
34%
23%
30%
26%
14%
10%
6%
7%
4%
4%
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Figure 2
FAST FACT
86%
of respondents to
InformationWeek’s 2012
Mobile Security Survey
said they allow or plan to
allow employee-owned
devices.
June 2012 7
Previous Next
cedures regarding the handling of mobile
data (Figure 3).If you haven’t yet developed a
mobile policy, make sure you get input from
multiple sources, including HR, security, legal
and users themselves.
Backup Challenges
Your IT organization probably has mecha-
nisms in place to back up users’ laptops and
PCs.A typical plan calls for backing up every-
thing on the device, including the OS, appli-
cations and files such as Office documents.
Full backups, including the OS, are possible
on mobile platforms, but not without some
challenges. The operating systems for Apple
and Android phones and tablets run applica-
tions in a sandbox that don’t permit apps to
see data generated by other apps, which
means a traditional backup agent like the
kind that runs on a PC wouldn’t be able to
capture all the data on a mobile device.
Organizations that want to perform a full
backup will have to use workarounds.
Apple requires the use of its iTunes service
to activate iPhones and iPads.The iTunes ser-
vice is also used to update the devices and re-
install the OS, if necessary.Apple phones and
tablets have to sync with iTunes to back up
data. IT can deploy iTunes software to em-
ployees’ work computers using desktop man-
agement tools. If users sync their Apple
phones or tablets to their work computers,
then iTunes will automatically back up the
mobile device and store that backup on the
work computer,which gives IT some measure
2012 State of
Mobile Security
With 62% already allowing
personal devices at work,IT’s
juggling laptop policies and Wi-Fi
policies and BYOD policies—and
that means security gaps big
enough to drive a semi through.
Most,80%,require only
passwords for mobile devices
that access enterprise data/-
networks,yet just 14% require
hardware encryption,no
exceptions.Let’s be clear:Mobile
security is data security,and we
must do better.
Download
Download
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
2011 2010
Does your organization currently have written policies or procedures pertaining specifically to mobile/portable
devices or the handling of mobile data?
Mobile Device and Data Polices?
Yes;written policies and procedures
Yes;written policies only
Yes;written procedures only
No,but policies are being considered or are under development
No
Base: 323 respondents in August 2011 and 307 in March 2010
Data: InformationWeek Mobile Device Management and Security Survey of business technology professionals
R3321011/19
49%
52%
18%
19%
6%
4%
21%
22%
6%
3%
Figure 3
June 2012 8
of control over the data. Apple’s manual for
enterprise deployments has more informa-
tion on backing up Apple mobile devices.
Apple also allows for different data types to
be synced to different computers. For exam-
ple,music files can be synced to a home com-
puter and contacts to a work computer. If IT
activates the tablet or phone for the
employee via iTunes, the service can be pre-
configured to enforce this separation of data,
so that information important to the com-
pany is synced and
backed up to a corpo-
rate PC, while personal
data stays with a user’s
computer.
However, given that
many Apple devices are
purchased by employees,there’s a strong like-
lihood that they would activate and sync their
mobile devices to iTunes running on a per-
sonal computer,which may put backups out-
side of IT’s control.
Android devices aren’t much better when
it comes to a full backup of the OS and all
data; the Android OS doesn’t provide hooks
needed for a full device backup. A backup
manager API is built in to the Android plat-
form, but each Android device vendor, such
as Samsung and Motorola,must create a cus-
tomized backup transport that user applica-
tions can communicate with through the
API.The upshot is that each individual appli-
cation on the device must have backup sup-
port built in by the application vendor, and
IT cannot necessarily control where the
backup lands.
Some third-party services, such as MyBack-
upPro, will back up just about everything on
an Android device except the OS,but the An-
droid device has to be rooted to enable this.
A device is rooted when the user subverts sys-
tem controls placed by the device manufac-
turer so that the user can get “root,” or
administrator, access to the device. Many
organizations don’t want rooted devices con-
necting to corporate networks because of the
potential security dangers.
While users root their devices to gain more
control,they also expose themselves to more
risks.Rooted devices have a greater potential
of exposing private data to malware,because
malware on the device can take advantage of
root privileges.And users with rooted phones
may also have the ability to disable security
features enabled by mobile device manage-
ment software,such as the password strength
policy and autolock. Users can also install
apps that would otherwise be blacklisted by
MDM software. For these reasons, many or-
ganizations don’t allow rooted mobile devices
onto the corporate network.
Most Android smartphones come with a
card slot into which the user can plug an
external storage device, such as an SD Card.
The Android device can be configured to save
data to this external device,providing another
backup option for IT,but again this requires a
diligent user who knows enough to back up
the data and then either save the data to a PC
that IT regularly backs up or deliver the re-
movable card to IT for backup. Some backup
agents can also back up data on an SD Card.
If you store corporate data on an SD Card, be
aware that the data will not be encrypted by
Previous Next
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Your policy should also be clear
about where IT’s responsibilities
lie regarding backups.
June 2012 9
device encryption and the data will be read-
able by any application on the device.
While backup for most mobile device data is
challenging,email is the exception,particularly
for companies that use Microsoft Exchange.Mi-
crosoft offers an ActiveSync agent that syn-
chronizes email and attachments between the
Exchange server and mobile devices.The data
remains on the Exchange server so it can be
synced among multiple devices (laptop, desk-
top, mobile phone, etc.). Exchange servers are
already part of a company’s centralized backup
program, so corporate email doesn’t need to
be backed up on individual mobile devices.
Consider Cloud
Android and iOS devices do support backups
of certain user data,such as device settings,cal-
endar and contacts, photos, and SMS, but
there’s no easy way for an enterprise to back up
that information to a central location—unless
IT is willing to consider cloud-based backup.
One option is a company called Druva,which
provides a variety of services, including
backup,for laptops and mobile devices.IT can
have backups stored on premises or in Druva’s
cloud.Druva’s application,inSync,provides ad-
ministrator-controlled backup for Apple and
Android devices. On iOS and Android plat-
forms,administrators can schedule backups of
contacts, pictures, videos, text messages and
Previous Next
2012 2011
What are your main concerns about using cloud storage services?
Cloud Storage Concerns
Security
Reliability and availability
Performance
Cost
Regulatory concerns
Other
Note: Multiple responses allowed
Base: 313 respondents in January 2012 and 377 in November 2010
Data: InformationWeek State of Storage Survey of business technology professionals
R4190212/23
79%
79%
52%
55%
49%
51%
39%
48%
38%
34%
3%
5%
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Figure 4
June 2012 10
call history.When it comes to Office-type files,
the user can manually share files with inSync
and inSync will back them up.
Asigra also offers a cloud-based backup
service that supports mobile devices. On the
Android platform, Asigra’s DS-Mobile Client
can back up contacts, calendar, call logs, set-
tings, apps and Office files. On iOS, the client
can back up contacts, calendars, photos and
video.Many cloud backup vendors also resell
Asigra’s client to support mobile device
backup for their customers.
Business contacts and SMS data are impor-
tant to IT, but Office files are likely to be the
most sensitive corporate information that
gets used on mobile devices—think of an
executive working on spreadsheets while
waiting to catch a connection at the airport,
or a salesperson updating a presentation for
a new customer.
If IT is concerned about Office files, it may
want to consider cloud-based synchroniza-
tion services such as Box and Dropbox.While
not technically a backup, these file synchro-
nization services do store copies of files, in-
cluding updates and changes, in the cloud. If
a mobile device is lost or wiped,users can still
recover their files. In addition, many of these
services support some form of centralized
management for IT,such as being able to cre-
ate and monitor corporate accounts for users.
While IT may be uncomfortable with putting
corporate data into the cloud (security was
the No.1 concern of cloud storage in Informa-
tionWeek’s 2012 State of Storage Survey), the
fact is, users are flocking to these offerings
with or without IT’s approval (Figure 4).IT may
be better served by getting out in front of the
problem by offering a version to users that al-
lows some measure of administrative control.
For instance, in May, Box announced new se-
curity and administration features to make it
easier for IT to manage users and files. Mean-
while, Dropbox launched a Teams version of
its service that includes administrative func-
tions such as the ability to add and remove
users from the service.
Similar options include Syncplicity,a file syn-
chronization and sharing platform designed
for enterprise use that supports mobile
devices.On the Android platform,users can up-
date existing files and create new ones, and
have them synced via the service to be avail-
able elsewhere.Apple iPhone users can upload
and view files,but can’t create new files.Sync-
plicity, which was recently acquired by EMC,
supports administrative controls such as revok-
ing user accounts and setting and resetting
passwords.Other products that combine cloud
synchronization with administrative controls
includeTrend Micro SafeSync and Mezeo.
Other options include services from Egnyte
and SugarSync, both of which offer cloud-
based file synchronization and storage
for mobile platforms. Both companies
enable mobile access to files, and both can
synchronize and save new files that are
created on a mobile device, or changes that
have been made to existing files (assuming
that the mobile platform offers file creation or
editing capabilities).
All of these services ensure that documents
and files will remain available to IT and busi-
ness users even if the mobile device is lost or
damaged.
Previous Next
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
June 2012 11
Encryption
When using a cloud-based service, data
should be encrypted both in transit and at rest.
Respondents to the InformationWeek’s Public
Cloud Storage Survey rated data encryption as
the third-most-important feature of a cloud
storage system,just behind the ability to move
data between cloud and on-premises storage,
and on-demand access (Figure 5).
Most cloud backup and synchronization
services support encryption in transit—the
procedures and protocols for encrypting data
as it travels over networks are well estab-
lished. Many cloud storage and file synchro-
nization services also encrypt the data stored
on their systems. For instance, SugarSync
encrypts all stored files using 128-bit AES,and
Box encrypts data at rest using 256-bit AES.
The question then becomes one of trust. If
the provider manages decryption keys,
which potentially opens the door to unau-
thorized access to your information by a
rogue employee or outside attacker. The
probability of such an occurrence is low, but
if it represents a risk you don’t want to take,
Previous Next
How important are the following features when using or evaluating a cloud storage service?
Please use a scale of 1 to 5,where 1 is“not important”and 5 is“very important.”
Importance of Cloud Storage Features
Note: Mean average ratings
Base: 229 respondents at organizations using, planning to adopt or assessing public cloud storage services
Data: InformationWeek Public Cloud Storage Survey of 363 business technology professionals, April 2011
R2750511/7
Ability
to
move
data
between
cloud
and
on-premises
storage
On-demand
access
Data
encryption
Ability
to
establish/enforce
retention
policy
Network
encryption
Monitoring
tools
Compatibility
with
legacy
systems/processes,
e.g.,
Active
Directory
SLAs
Reporting
(usage
and
compliance)
Geographic
redundancy
Wide
support
for
transfer
protocols
(SCP,
FTP,
SAMBA/CIFS,
RSYNC)
Native
file
system
support
(mount
point)
Instant
scalability
Integrity
policy
reporting
Data
compression
Deduplication
Limitless
scalability
4.4
4.3
4.3
4.3
4.2
4.1
4.1
4.1
4.0
3.9
3.9
3.9
3.8
3.8
3.7
3.7
3.6
1
Not
at
all
concerned
Very
concerned
5
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Figure 5
Like This Report?
Rate It!
Something we could do
better? Let us know.
Rate
Rate
June 2012 12
you can look for a vendor that supports a dis-
tributed key management system, such as
Druva. In Druva’s approach, neither the
company nor the customer has direct access
to the encryption key; part of the key is
encrypted with the user’s password, and
the key can only be recovered when a user
logs in.
Mobile Device Management
MDM systems are available to help IT get a
measure of control over smartphones and
tablets,including user-owned devices.We rec-
ommend the use of MDM products as part of
your overall mobility strategy. Unfortunately,
only a handful of MDM platforms address
backup: Of 11 products in the Information-
Week Mobile Device Management Buyer’s
Guide, just three support remote backup:
Fiberlink, Sybase and Wyse. However, we an-
ticipate that more MDM vendors will offer
some form of backup service or partner with
a provider.
However, it’s also clear that IT isn’t looking
to MDM vendors for backup capabilities. In
our 2011 Mobile Device Management and Se-
curity Survey, only 11% of respondents listed
“scheduled backup and restore” as a feature
of interest. Twelve other features ranked
higher, including security-centric features
such as compliance and policy settings,policy
enforcement and remote wipes (Figure 6).
That attitude may change as smartphones
and tablets become more ingrained in corpo-
Previous Next
Whether or not you have a mobile device management (MDM) system for controlling tablets and smartphones,which centrally controlled features
are of greatest interest to you?
MDM Features of Interest
Compliance/policy
setting
Policy
enforcement
Device
updates
Management
of
physical
devices
Auditing
Remote
selective
data
wipe
Remote
full
data
wipe
Support
for
multiple
device
types
Over-the-air
provisioning
and
updates
Application
whitelisting
Remote
troubleshooting
Jailbreak/rooting
detection
Schedule
backup
and
restore
Vulnerability
remediation
Role-based
policies
Private
app
store
Sandboxing
capabilities
RSS/Web
browsing
Other
Note: Five responses allowed
Data: InformationWeek 2011 Mobile Device Management and Security Survey of 323 business technology professionals, August 2011
R3321011/27
53%
51%
44%
40%
34%
34%
30%
29%
26%
21%
20%
18%
11%
11%
9%
8%
8%
5%
2%
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Figure 6
June 2012 13
rate workflow, and as the devices’ ability to
create content improves.In the meantime,the
lack of backup in an MDM platform doesn’t
detract from MDM’s other capabilities.
As you evaluate MDM products, ask the
vendors where backup sits on their road maps.
And in the meantime,there are a few other pro-
tection mechanisms you should ensure are
available today.
The first line of defense is a strong password.
However,users are notorious for selecting sim-
ple passwords, so you can fortify the mobile
device with an autolock feature. Autolock
makes the device inaccessible if a person fails
to enter the correct password after a predeter-
mined number of tries.However,while lockout
features will slow down an attacker,the lockout
mechanism is only effective if the device is at-
tacked through the UI.If an attacker can get di-
rect access to the content on the device,
whether through an OS exploit or by getting
physical control of the device and prying out
the memory chip,the lockout won’t help.That’s
why encryption is the next line of defense.
Most MDM platforms support full device en-
cryption,which IT may find comforting in case
a device is lost or stolen.However,note that en-
cryption isn’t guaranteed protection because
recovery of the encryption key is possible,
though difficult. For a device to encrypt and
decrypt data,it needs a key that must be stored
somewhere on the device.Android and iOS de-
vices solve this problem by encrypting the en-
cryption key with the user’s password.The mo-
bile device prompts the user for the password,
decrypts the encryption key,and can then en-
crypt and decrypt data.
However, if an attacker gains direct access
to the flash memory on the device, the
attacker can carry out a brute-force attack
against the encrypted key. If the password is
simple,the key can be recovered quickly.
Other features to look for include device
tracking and remote wipe.Device tracking will
allow you to confirm the location of a user’s
device. If it seems that the probability of
recovering a device is low, remote wipe will
ensure that no one can recover the data.
Of course, a remote wipe is tricky with a
device owned by the employee—you’ll
prevent sensitive information from being
leaked, but you’ll also destroy whatever per-
sonal information was stored on the
device.This might not be a problem if the
device couldn't be recovered, but it will be an
issue if the employee leaves the company.Look
for an MDM product that can differentiate
between private and company-owned data.
For instance, Symantec says its MDM product,
Symantec Mobile Management,can keep per-
sonal and corporate data separate.We also rec-
ommend that your policy address the issue of
remote wiping for employee-owned devices.If
your policy requires that a device be wiped,and
you allow the use of personal devices, make
sure employees understand the potential to
have personal data eliminated.
Other MDM features to look for include
application blacklisting or whitelisting,
detection of rooted phones, and the ability
to host a corporate app store with apps
sanctioned by the company.
Work in Progress
Enterprise backup schemes for Android and
Previous Next
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Like
Like Tweet
Tweet
Tweet
Share
Share
Like This Report?
Share it!
June 2012 14
iOS devices are still in their infancy, which
means IT may have to take a variety of
approaches to protect corporate data on these
devices. First and foremost, IT needs to have a
mobile device policy that describes its role and
responsibility for data backups. That policy
should be created with input from a variety of
stakeholders,not just the IT department.
IT should also consider cloud services for
backing up and synchronizing files; while IT
may be reluctant to embrace cloud storage,
such services can be a sensible alternative to
traditional, premises-based backup products
for mobile devices.
Finally, deploy an MDM product that sup-
ports full device encryption, strong pass-
words,autolock and remote wipe.These steps
will go a long way to protecting corporate
data.
Previous Next
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Subscribe
Subscribe
Newsletter
Want to stay current on all new
InformationWeek Reports?
Subscribe to our weekly
newsletter and never miss
a beat.
June 2012 15
Previous
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
MORE
LIKE THIS
Want More Like This?
InformationWeek creates more than 150 reports like this each year,and they’re all free to registered users.We’ll help
you sort through vendor claims,justify IT projects and implement new systems by providing analysis and advice from
IT professionals.Right now on our site you’ll find:
Buyer’s Guide:Cloud Storage,Backup and Synchronization: The cloud is displacing local physical storage for
applications as diverse as file sharing,backup and cross-device data synchronization.Both business users and IT are
adopting cloud services because of their convenience and low costs.We examine the market landscape and present
detailed features and pricing from14 providers,including Carbonite,Dropbox and Nirvanix.
Mobile App Development: Smartphones and tablets are everywhere.If you need to reach your customers or
employees on these devices,now’s the time to start developing mobile apps.We provide essential information to help
you get started,including development basics for Apple iOS,Google Android,RIM BlackBerry and Microsoft Windows.
We also look at the pros and cons of cross-platform development and discuss how to build secure apps from the get-go.
Enterprise Buyer’s Guide:Tablets: We profile five contenders for your business.Key differentiators for enterprise IT:the
ability to connect to corporate VPNs,native device security and authentication,and amenability to centralized
management.We also touch on Intel’s master plan to challenge purveyors of smartphone silicon.Clearly,2012 will
see Android OEMs up their games and the Wintel combo reunite to finally take a serious stab at the tablet market.
How will you manage the onslaught?
PLUS: Find signature reports,such as the InformationWeek Salary Survey,InformationWeek 500 and the annual State of
Security report; full issues; and much more.
Table of Contents

Más contenido relacionado

La actualidad más candente

Security that works
Security that worksSecurity that works
Security that works
James1280
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
IBM Software India
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
BlackBerry
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
Caston Thomas
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
Jim Sutter
 

La actualidad más candente (18)

Security that works
Security that worksSecurity that works
Security that works
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global Perspective
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articles
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Dell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCDell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDC
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928
 
The Digital Universe in 2020
The Digital Universe in 2020The Digital Universe in 2020
The Digital Universe in 2020
 
The Diverse and Exploding Digital Universe
The Diverse and Exploding Digital UniverseThe Diverse and Exploding Digital Universe
The Diverse and Exploding Digital Universe
 

Similar a Backing up Android and iOs devices

Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Raúl Castañón Martínez
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
IBM Software India
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
SelectedPresentations
 
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
lverb
 

Similar a Backing up Android and iOs devices (20)

BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014The Future of Enterprise Mobility: Predictions for 2014
The Future of Enterprise Mobility: Predictions for 2014
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise Communications
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Top 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdfTop 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdf
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
7 major changes in big data security in 2021
7 major changes in big data security in 20217 major changes in big data security in 2021
7 major changes in big data security in 2021
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
 

Más de iSSAL

Rlm presentation information kit
Rlm presentation information kit Rlm presentation information kit
Rlm presentation information kit
iSSAL
 
Efficiently protect virtual machines with our cloud backup service powered by...
Efficiently protect virtual machines with our cloud backup service powered by...Efficiently protect virtual machines with our cloud backup service powered by...
Efficiently protect virtual machines with our cloud backup service powered by...
iSSAL
 

Más de iSSAL (8)

LMC CARE - le cloud
LMC CARE - le cloudLMC CARE - le cloud
LMC CARE - le cloud
 
Rlm presentation information kit
Rlm presentation information kit Rlm presentation information kit
Rlm presentation information kit
 
Efficiently protect virtual machines with our cloud backup service powered by...
Efficiently protect virtual machines with our cloud backup service powered by...Efficiently protect virtual machines with our cloud backup service powered by...
Efficiently protect virtual machines with our cloud backup service powered by...
 
DISASTER RECOVERY, les vraies questions
DISASTER RECOVERY, les vraies questionsDISASTER RECOVERY, les vraies questions
DISASTER RECOVERY, les vraies questions
 
iSV, notre solution de Cloud Backup
iSV, notre solution de Cloud BackupiSV, notre solution de Cloud Backup
iSV, notre solution de Cloud Backup
 
Infographie - Le Cloud Backup rencontre l'Entreprise
Infographie - Le Cloud Backup rencontre l'EntrepriseInfographie - Le Cloud Backup rencontre l'Entreprise
Infographie - Le Cloud Backup rencontre l'Entreprise
 
Issal | 3 raisons pour lesquelles votre société n’a toujours pas évolué...
Issal | 3 raisons pour lesquelles votre société n’a toujours pas évolué...Issal | 3 raisons pour lesquelles votre société n’a toujours pas évolué...
Issal | 3 raisons pour lesquelles votre société n’a toujours pas évolué...
 
Flame, un virus espion d'etat
Flame, un virus espion d'etatFlame, un virus espion d'etat
Flame, un virus espion d'etat
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Backing up Android and iOs devices

  • 1. Report ID:S5060612 Next reports BackingUpAndroid AndiOSDevices As more employees use their own tablets and smartphones for work,IT teams need to figure out how to back up data created while on the go.The answer:a smart mix of policies,cloud services and mobile device management.We outline a data protection plan that doesn’t depend on end users,because “BYOD” shouldn’t mean “back up your own data.” By Ben DuPont Reports.InformationWeek.com J u n e 2 0 1 2 $ 9 9
  • 2. Previous Next reports CO NTENT S reports.informationweek.com TABLE OF June 2012 2 3 Author’s Bio 4 Executive Summary 5 Mobile Invasion 5 Figure 1:Policy on Personal Mobile Device Use? 6 Figure 2:Storage of Corporate Data on Mobile Devices 7 Figure 3:Mobile Device and Data Policies? 9 Consider Cloud 9 Figure 4:Cloud Storage Concerns 11 Encryption 11 Figure 5:Importance of Cloud Storage Features 12 Figure 6:MBM Feature of Interest 13 Work in Progress 15 Related Reports ABOUT US InformationWeek Reports’ analysts arm business technology decision-makers with real-world perspective based on qualitative and quantitative research, business and technology assessment and planning tools,and adoption best practices gleaned from experience.To contact us,write to managing director ArtWittmann at awittmann@techweb.com, content director Lorna Garey at lgarey@techweb.com, editor-at-large Andrew Conry-Murray at acmurray@techweb.com, and research managing editor HeatherVallis at hvallis@techweb.com. Find all of our reports at reports.informationweek.com. B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
  • 3. June 2012 3 Previous Next © 2012 InformationWeek,Reproduction Prohibited reports reports.informationweek.com B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Ben DuPont is a software engineer in Green Bay,Wis.,and owner of Nebland Software LLC.He can be reached at ben@nebland.com. Ben DuPont InformationWeekReports Table of Contents Follow Follow Follow Follow Want More? Never Miss a Report!
  • 4. June 2012 4 Previous Next Smartphones and tablets present new backup challenges for IT.First,IT has to wrestle with a broad category of products that run on a variety of operating systems,which complicates centralized management and backups.Second,many of these mobile devices are owned by the employee,not the company,which limits IT’s control.At the same time,these employee-owned devices access corporate applications and data,and IT has an obligation to protect that data. The result is that IT has to assemble a set of policies and technologies that rely on a variety of products and services,including cloud-based backup,file synchronization and mobile device management.A growing number of cloud backup and file synchronization services offer administrative controls that allow IT to enforce policies,provision and deprovision users,and monitor content such as Office files.At present,backup isn’t a significant feature in mobile device management products,but that’s likely to change over time as more and more end users bring personal mobile devices into the workplace. At the same time,mobile device management helps ensure that data will be safe from prying eyes in the event that a device gets lost or stolen. EXECUTIVE reports.informationweek.com reports SUMMARY B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents
  • 5. June 2012 5 As smartphone and tablet use grows in the enterprise, IT wrestles with how to back up sensitive data that might reside on these plat- forms.This task is complicated by the fact that many mobile devices are the property of the employee, not the employer. In fact, 86% of respondents to InformationWeek’s 2012 Mobile Security Survey said they allow or plan to allow employee-owned devices (Figure 1). Unfortunately for IT, the devices users choose aren’t the ones IT is most ready for. While IT can manage BlackBerry devices with- out much difficulty, users want Apple and Android products.Our survey shows that 46% of respondents allow employee-owned Apple iOS devices to store corporate data, followed by 42% that allow Android 3.x and 4.x devices, and 28% that allow Android 2.x devices (Fig- ure 2). Add BlackBerry at 41% and Windows Phone at 26% to that list and you can see IT has its work cut out for it when it comes to backing up data on these devices. If you allow user-owned devices to access corporate applications or data,make sure your mobile device policy clearly describes the company’s requirements for allowing that access. IT’s first reaction to the bring-your- own-device phenomenon may be to write separate policies for employee- and company- issued devices. That’s the wrong approach, says Michael Finneran, an independent con- sultant and industry analyst. “Our job is to make sure mobile users get access to the stuff they need securely, regardless of who owns the phone,” says Finneran. “What level of se- Previous Next Does your mobility policy allow employees to use personal mobile devices for work? 14% 62% 24% Policy on Personal Mobile Device Use? Yes No,and we have no plans to allow personal device use No,but we’re developing a policy Data: InformationWeek 2012 Mobile Security Survey of 322 business technology professionals, March 2012 R4720512/3 reports.informationweek.com Mobile Invasion reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents Figure 1
  • 6. June 2012 6 curity is required is defined by the organiza- tion, … and what users get access to is de- fined by their role.” Your policy should also be clear about where IT’s responsibilities lie regarding back- ups: IT has a right and an obligation to back up company data, and to take steps to do so. But IT doesn’t have any obligation to protect a user’s personal information, files, applica- tions and other information, such as photos and videos. Of course,separating personal and corporate data is easier said than done.A mobile device can quickly become a hodgepodge of busi- ness and private information. For instance, a phone’s contact list could have personal and business contacts.Business documents saved as PDFs may be loaded into an e-reader app. Thus,your policy must make it clear that while IT isn’t responsible for backing up your MP3 files or vacation photos, some personal data may be intermingled with corporate backups. Almost half of the respondents to our Infor- mationWeek Mobile Device Management and Security Survey have written policies and pro- Previous Next Windows laptops/netbooks BlackBerry Apple iOS Android 3.x and 4.x Windows Mobile Android 2.x Non-Windows laptops/netbooks (OS X, Linux) Windows Phone WebOS Symbian Bada On which of the following mobile device platforms does your organization permit corporate data to be stored? Storage of Corporate Data on Mobile Devices Data: InformationWeek 2012 Mobile Security Survey of 322 business technology professionals, March 2012 R4670512/35 Company-provided Personally owned 80% 41% 70% 41% 62% 46% 42% 36% 35% 25% 35% 28% 34% 23% 30% 26% 14% 10% 6% 7% 4% 4% reports.informationweek.com reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents Figure 2 FAST FACT 86% of respondents to InformationWeek’s 2012 Mobile Security Survey said they allow or plan to allow employee-owned devices.
  • 7. June 2012 7 Previous Next cedures regarding the handling of mobile data (Figure 3).If you haven’t yet developed a mobile policy, make sure you get input from multiple sources, including HR, security, legal and users themselves. Backup Challenges Your IT organization probably has mecha- nisms in place to back up users’ laptops and PCs.A typical plan calls for backing up every- thing on the device, including the OS, appli- cations and files such as Office documents. Full backups, including the OS, are possible on mobile platforms, but not without some challenges. The operating systems for Apple and Android phones and tablets run applica- tions in a sandbox that don’t permit apps to see data generated by other apps, which means a traditional backup agent like the kind that runs on a PC wouldn’t be able to capture all the data on a mobile device. Organizations that want to perform a full backup will have to use workarounds. Apple requires the use of its iTunes service to activate iPhones and iPads.The iTunes ser- vice is also used to update the devices and re- install the OS, if necessary.Apple phones and tablets have to sync with iTunes to back up data. IT can deploy iTunes software to em- ployees’ work computers using desktop man- agement tools. If users sync their Apple phones or tablets to their work computers, then iTunes will automatically back up the mobile device and store that backup on the work computer,which gives IT some measure 2012 State of Mobile Security With 62% already allowing personal devices at work,IT’s juggling laptop policies and Wi-Fi policies and BYOD policies—and that means security gaps big enough to drive a semi through. Most,80%,require only passwords for mobile devices that access enterprise data/- networks,yet just 14% require hardware encryption,no exceptions.Let’s be clear:Mobile security is data security,and we must do better. Download Download reports.informationweek.com reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents 2011 2010 Does your organization currently have written policies or procedures pertaining specifically to mobile/portable devices or the handling of mobile data? Mobile Device and Data Polices? Yes;written policies and procedures Yes;written policies only Yes;written procedures only No,but policies are being considered or are under development No Base: 323 respondents in August 2011 and 307 in March 2010 Data: InformationWeek Mobile Device Management and Security Survey of business technology professionals R3321011/19 49% 52% 18% 19% 6% 4% 21% 22% 6% 3% Figure 3
  • 8. June 2012 8 of control over the data. Apple’s manual for enterprise deployments has more informa- tion on backing up Apple mobile devices. Apple also allows for different data types to be synced to different computers. For exam- ple,music files can be synced to a home com- puter and contacts to a work computer. If IT activates the tablet or phone for the employee via iTunes, the service can be pre- configured to enforce this separation of data, so that information important to the com- pany is synced and backed up to a corpo- rate PC, while personal data stays with a user’s computer. However, given that many Apple devices are purchased by employees,there’s a strong like- lihood that they would activate and sync their mobile devices to iTunes running on a per- sonal computer,which may put backups out- side of IT’s control. Android devices aren’t much better when it comes to a full backup of the OS and all data; the Android OS doesn’t provide hooks needed for a full device backup. A backup manager API is built in to the Android plat- form, but each Android device vendor, such as Samsung and Motorola,must create a cus- tomized backup transport that user applica- tions can communicate with through the API.The upshot is that each individual appli- cation on the device must have backup sup- port built in by the application vendor, and IT cannot necessarily control where the backup lands. Some third-party services, such as MyBack- upPro, will back up just about everything on an Android device except the OS,but the An- droid device has to be rooted to enable this. A device is rooted when the user subverts sys- tem controls placed by the device manufac- turer so that the user can get “root,” or administrator, access to the device. Many organizations don’t want rooted devices con- necting to corporate networks because of the potential security dangers. While users root their devices to gain more control,they also expose themselves to more risks.Rooted devices have a greater potential of exposing private data to malware,because malware on the device can take advantage of root privileges.And users with rooted phones may also have the ability to disable security features enabled by mobile device manage- ment software,such as the password strength policy and autolock. Users can also install apps that would otherwise be blacklisted by MDM software. For these reasons, many or- ganizations don’t allow rooted mobile devices onto the corporate network. Most Android smartphones come with a card slot into which the user can plug an external storage device, such as an SD Card. The Android device can be configured to save data to this external device,providing another backup option for IT,but again this requires a diligent user who knows enough to back up the data and then either save the data to a PC that IT regularly backs up or deliver the re- movable card to IT for backup. Some backup agents can also back up data on an SD Card. If you store corporate data on an SD Card, be aware that the data will not be encrypted by Previous Next reports.informationweek.com reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents Your policy should also be clear about where IT’s responsibilities lie regarding backups.
  • 9. June 2012 9 device encryption and the data will be read- able by any application on the device. While backup for most mobile device data is challenging,email is the exception,particularly for companies that use Microsoft Exchange.Mi- crosoft offers an ActiveSync agent that syn- chronizes email and attachments between the Exchange server and mobile devices.The data remains on the Exchange server so it can be synced among multiple devices (laptop, desk- top, mobile phone, etc.). Exchange servers are already part of a company’s centralized backup program, so corporate email doesn’t need to be backed up on individual mobile devices. Consider Cloud Android and iOS devices do support backups of certain user data,such as device settings,cal- endar and contacts, photos, and SMS, but there’s no easy way for an enterprise to back up that information to a central location—unless IT is willing to consider cloud-based backup. One option is a company called Druva,which provides a variety of services, including backup,for laptops and mobile devices.IT can have backups stored on premises or in Druva’s cloud.Druva’s application,inSync,provides ad- ministrator-controlled backup for Apple and Android devices. On iOS and Android plat- forms,administrators can schedule backups of contacts, pictures, videos, text messages and Previous Next 2012 2011 What are your main concerns about using cloud storage services? Cloud Storage Concerns Security Reliability and availability Performance Cost Regulatory concerns Other Note: Multiple responses allowed Base: 313 respondents in January 2012 and 377 in November 2010 Data: InformationWeek State of Storage Survey of business technology professionals R4190212/23 79% 79% 52% 55% 49% 51% 39% 48% 38% 34% 3% 5% reports.informationweek.com reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents Figure 4
  • 10. June 2012 10 call history.When it comes to Office-type files, the user can manually share files with inSync and inSync will back them up. Asigra also offers a cloud-based backup service that supports mobile devices. On the Android platform, Asigra’s DS-Mobile Client can back up contacts, calendar, call logs, set- tings, apps and Office files. On iOS, the client can back up contacts, calendars, photos and video.Many cloud backup vendors also resell Asigra’s client to support mobile device backup for their customers. Business contacts and SMS data are impor- tant to IT, but Office files are likely to be the most sensitive corporate information that gets used on mobile devices—think of an executive working on spreadsheets while waiting to catch a connection at the airport, or a salesperson updating a presentation for a new customer. If IT is concerned about Office files, it may want to consider cloud-based synchroniza- tion services such as Box and Dropbox.While not technically a backup, these file synchro- nization services do store copies of files, in- cluding updates and changes, in the cloud. If a mobile device is lost or wiped,users can still recover their files. In addition, many of these services support some form of centralized management for IT,such as being able to cre- ate and monitor corporate accounts for users. While IT may be uncomfortable with putting corporate data into the cloud (security was the No.1 concern of cloud storage in Informa- tionWeek’s 2012 State of Storage Survey), the fact is, users are flocking to these offerings with or without IT’s approval (Figure 4).IT may be better served by getting out in front of the problem by offering a version to users that al- lows some measure of administrative control. For instance, in May, Box announced new se- curity and administration features to make it easier for IT to manage users and files. Mean- while, Dropbox launched a Teams version of its service that includes administrative func- tions such as the ability to add and remove users from the service. Similar options include Syncplicity,a file syn- chronization and sharing platform designed for enterprise use that supports mobile devices.On the Android platform,users can up- date existing files and create new ones, and have them synced via the service to be avail- able elsewhere.Apple iPhone users can upload and view files,but can’t create new files.Sync- plicity, which was recently acquired by EMC, supports administrative controls such as revok- ing user accounts and setting and resetting passwords.Other products that combine cloud synchronization with administrative controls includeTrend Micro SafeSync and Mezeo. Other options include services from Egnyte and SugarSync, both of which offer cloud- based file synchronization and storage for mobile platforms. Both companies enable mobile access to files, and both can synchronize and save new files that are created on a mobile device, or changes that have been made to existing files (assuming that the mobile platform offers file creation or editing capabilities). All of these services ensure that documents and files will remain available to IT and busi- ness users even if the mobile device is lost or damaged. Previous Next reports.informationweek.com reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents
  • 11. June 2012 11 Encryption When using a cloud-based service, data should be encrypted both in transit and at rest. Respondents to the InformationWeek’s Public Cloud Storage Survey rated data encryption as the third-most-important feature of a cloud storage system,just behind the ability to move data between cloud and on-premises storage, and on-demand access (Figure 5). Most cloud backup and synchronization services support encryption in transit—the procedures and protocols for encrypting data as it travels over networks are well estab- lished. Many cloud storage and file synchro- nization services also encrypt the data stored on their systems. For instance, SugarSync encrypts all stored files using 128-bit AES,and Box encrypts data at rest using 256-bit AES. The question then becomes one of trust. If the provider manages decryption keys, which potentially opens the door to unau- thorized access to your information by a rogue employee or outside attacker. The probability of such an occurrence is low, but if it represents a risk you don’t want to take, Previous Next How important are the following features when using or evaluating a cloud storage service? Please use a scale of 1 to 5,where 1 is“not important”and 5 is“very important.” Importance of Cloud Storage Features Note: Mean average ratings Base: 229 respondents at organizations using, planning to adopt or assessing public cloud storage services Data: InformationWeek Public Cloud Storage Survey of 363 business technology professionals, April 2011 R2750511/7 Ability to move data between cloud and on-premises storage On-demand access Data encryption Ability to establish/enforce retention policy Network encryption Monitoring tools Compatibility with legacy systems/processes, e.g., Active Directory SLAs Reporting (usage and compliance) Geographic redundancy Wide support for transfer protocols (SCP, FTP, SAMBA/CIFS, RSYNC) Native file system support (mount point) Instant scalability Integrity policy reporting Data compression Deduplication Limitless scalability 4.4 4.3 4.3 4.3 4.2 4.1 4.1 4.1 4.0 3.9 3.9 3.9 3.8 3.8 3.7 3.7 3.6 1 Not at all concerned Very concerned 5 reports.informationweek.com reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents Figure 5 Like This Report? Rate It! Something we could do better? Let us know. Rate Rate
  • 12. June 2012 12 you can look for a vendor that supports a dis- tributed key management system, such as Druva. In Druva’s approach, neither the company nor the customer has direct access to the encryption key; part of the key is encrypted with the user’s password, and the key can only be recovered when a user logs in. Mobile Device Management MDM systems are available to help IT get a measure of control over smartphones and tablets,including user-owned devices.We rec- ommend the use of MDM products as part of your overall mobility strategy. Unfortunately, only a handful of MDM platforms address backup: Of 11 products in the Information- Week Mobile Device Management Buyer’s Guide, just three support remote backup: Fiberlink, Sybase and Wyse. However, we an- ticipate that more MDM vendors will offer some form of backup service or partner with a provider. However, it’s also clear that IT isn’t looking to MDM vendors for backup capabilities. In our 2011 Mobile Device Management and Se- curity Survey, only 11% of respondents listed “scheduled backup and restore” as a feature of interest. Twelve other features ranked higher, including security-centric features such as compliance and policy settings,policy enforcement and remote wipes (Figure 6). That attitude may change as smartphones and tablets become more ingrained in corpo- Previous Next Whether or not you have a mobile device management (MDM) system for controlling tablets and smartphones,which centrally controlled features are of greatest interest to you? MDM Features of Interest Compliance/policy setting Policy enforcement Device updates Management of physical devices Auditing Remote selective data wipe Remote full data wipe Support for multiple device types Over-the-air provisioning and updates Application whitelisting Remote troubleshooting Jailbreak/rooting detection Schedule backup and restore Vulnerability remediation Role-based policies Private app store Sandboxing capabilities RSS/Web browsing Other Note: Five responses allowed Data: InformationWeek 2011 Mobile Device Management and Security Survey of 323 business technology professionals, August 2011 R3321011/27 53% 51% 44% 40% 34% 34% 30% 29% 26% 21% 20% 18% 11% 11% 9% 8% 8% 5% 2% reports.informationweek.com reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents Figure 6
  • 13. June 2012 13 rate workflow, and as the devices’ ability to create content improves.In the meantime,the lack of backup in an MDM platform doesn’t detract from MDM’s other capabilities. As you evaluate MDM products, ask the vendors where backup sits on their road maps. And in the meantime,there are a few other pro- tection mechanisms you should ensure are available today. The first line of defense is a strong password. However,users are notorious for selecting sim- ple passwords, so you can fortify the mobile device with an autolock feature. Autolock makes the device inaccessible if a person fails to enter the correct password after a predeter- mined number of tries.However,while lockout features will slow down an attacker,the lockout mechanism is only effective if the device is at- tacked through the UI.If an attacker can get di- rect access to the content on the device, whether through an OS exploit or by getting physical control of the device and prying out the memory chip,the lockout won’t help.That’s why encryption is the next line of defense. Most MDM platforms support full device en- cryption,which IT may find comforting in case a device is lost or stolen.However,note that en- cryption isn’t guaranteed protection because recovery of the encryption key is possible, though difficult. For a device to encrypt and decrypt data,it needs a key that must be stored somewhere on the device.Android and iOS de- vices solve this problem by encrypting the en- cryption key with the user’s password.The mo- bile device prompts the user for the password, decrypts the encryption key,and can then en- crypt and decrypt data. However, if an attacker gains direct access to the flash memory on the device, the attacker can carry out a brute-force attack against the encrypted key. If the password is simple,the key can be recovered quickly. Other features to look for include device tracking and remote wipe.Device tracking will allow you to confirm the location of a user’s device. If it seems that the probability of recovering a device is low, remote wipe will ensure that no one can recover the data. Of course, a remote wipe is tricky with a device owned by the employee—you’ll prevent sensitive information from being leaked, but you’ll also destroy whatever per- sonal information was stored on the device.This might not be a problem if the device couldn't be recovered, but it will be an issue if the employee leaves the company.Look for an MDM product that can differentiate between private and company-owned data. For instance, Symantec says its MDM product, Symantec Mobile Management,can keep per- sonal and corporate data separate.We also rec- ommend that your policy address the issue of remote wiping for employee-owned devices.If your policy requires that a device be wiped,and you allow the use of personal devices, make sure employees understand the potential to have personal data eliminated. Other MDM features to look for include application blacklisting or whitelisting, detection of rooted phones, and the ability to host a corporate app store with apps sanctioned by the company. Work in Progress Enterprise backup schemes for Android and Previous Next reports.informationweek.com reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents Like Like Tweet Tweet Tweet Share Share Like This Report? Share it!
  • 14. June 2012 14 iOS devices are still in their infancy, which means IT may have to take a variety of approaches to protect corporate data on these devices. First and foremost, IT needs to have a mobile device policy that describes its role and responsibility for data backups. That policy should be created with input from a variety of stakeholders,not just the IT department. IT should also consider cloud services for backing up and synchronizing files; while IT may be reluctant to embrace cloud storage, such services can be a sensible alternative to traditional, premises-based backup products for mobile devices. Finally, deploy an MDM product that sup- ports full device encryption, strong pass- words,autolock and remote wipe.These steps will go a long way to protecting corporate data. Previous Next reports.informationweek.com reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents
  • 15. Subscribe Subscribe Newsletter Want to stay current on all new InformationWeek Reports? Subscribe to our weekly newsletter and never miss a beat. June 2012 15 Previous reports.informationweek.com reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s MORE LIKE THIS Want More Like This? InformationWeek creates more than 150 reports like this each year,and they’re all free to registered users.We’ll help you sort through vendor claims,justify IT projects and implement new systems by providing analysis and advice from IT professionals.Right now on our site you’ll find: Buyer’s Guide:Cloud Storage,Backup and Synchronization: The cloud is displacing local physical storage for applications as diverse as file sharing,backup and cross-device data synchronization.Both business users and IT are adopting cloud services because of their convenience and low costs.We examine the market landscape and present detailed features and pricing from14 providers,including Carbonite,Dropbox and Nirvanix. Mobile App Development: Smartphones and tablets are everywhere.If you need to reach your customers or employees on these devices,now’s the time to start developing mobile apps.We provide essential information to help you get started,including development basics for Apple iOS,Google Android,RIM BlackBerry and Microsoft Windows. We also look at the pros and cons of cross-platform development and discuss how to build secure apps from the get-go. Enterprise Buyer’s Guide:Tablets: We profile five contenders for your business.Key differentiators for enterprise IT:the ability to connect to corporate VPNs,native device security and authentication,and amenability to centralized management.We also touch on Intel’s master plan to challenge purveyors of smartphone silicon.Clearly,2012 will see Android OEMs up their games and the Wintel combo reunite to finally take a serious stab at the tablet market. How will you manage the onslaught? PLUS: Find signature reports,such as the InformationWeek Salary Survey,InformationWeek 500 and the annual State of Security report; full issues; and much more. Table of Contents