Forrester Research calls mobile-device management 'heavy-handed approach'

Forrester Research predicts that with the "bring your own device" (BYOD) trend expected to increasingly include laptops in addition to smartphones and tablets, the approach to managing those devices is in for some big changes.

In its 2013 "Mobile Security Predictions" report, Forrester says that "on-demand mobile virtualization will overtake mobile-device management" as a core technology that IT professionals will turn to as a way "to segregate business content and data from the personal environment" in mobile devices.

[ RELATED: HP launches free service to secure mobile, Web apps ]

Forrester analyst Chenxi Wang in the report calls mobile-device management (MDM) a "heavy-handed approach -- more and more IT professionals have told us that they don't want to manage employee-owned devices. ... For these reasons, technologies such as mobile VDI, containers, app wrapping, and device virtualization have emerged to deliver personal-to-corporate segregation." However, at the same time Wang concedes that today "many of these technologies diminish the user experience, which remains the single biggest barrier to adoption."

Seamless "mobile virtualization" which depends on policy-based control over corporate apps, and consequently the content and data, started appearing in earnest in the marketplace last year and will become more mainstream this year, Forester predicts.

VMware's device virtualization technology and options from vendors Enterproid and MobileSpaces are cited as examples of vendor-specific technologies, though these might still be considered to be in the early stages, according to the report. But Wang in her report sees mobile virtualization as an approach that potentially "can change how enterprises approach mobility."

Innovations in mobile virtualization are likely to "gradually pull budget away from device management," according to the report. The consultancy predicts MDM products won't go away but could expand to include mobile virtualization. The report suggests MDM vendors will fare best in the near term with small to midsize businesses and small enterprises, and need to partner with mobile operators to reach these customers. But in the long run, MDM vendors "risk losing relevance" if their platforms don't evolve, the report warns.

Hot for HTML5

Separately, Forrester also predicts in the report the rise of HTML5 in lieu of native app development (such as Apple iOS or Google Android) in the enterprise. Developers of mobile apps in the enterprise "will flock to HTML5" as the application-development mode of choice over native apps for the main reason that it will be simpler and cheaper, Forrester says. Forrester adds that native apps will continue to get the spotlight in the consumer market, though.

"With more HTML5 in the mix, enterprise applications will gradually move to be more cloud-based," Forrester predicts. In terms of provisioning of core security capabilities, Forrester predicts the rise of mobile-cloud service providers for whom security and privacy "will become a differentiator."

The privacy implications of mobile devices are accelerating in a dark way. Forrester says the "creepy factor" for end users of mobile devices is growing as it's become possible to collect massive amounts of data via consumer apps that can share it with third parties for advertising and data-mining services.

"If we're not careful, the number of devices and sensors around us could soon bring about user activity monitoring 24x7 -- something akin to an Orwellian world," the report warns. "The privacy regulatory landscape is not expected to change drastically in 2013, and the increased business pressure to collect mobile data, coupled with the lack of industry standards and regulatory controls, suggests the risk of abuse is high." Forrester says the full implications of what's been unleashed simply aren't yet fully grasped.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: @MessmerE. Email:

Read more about anti-malware in Network World's Anti-malware section.

Join the CSO newsletter!

Error: Please check your email address.

Tags MDMmobile device management vs mobile virtualizationNetworkingwirelessmobile securityForrester ResearchIT managementconsumerization of ITHPBYODhtml5security

More about AppleForrester ResearchGoogleHPIDGVMware AustraliaWang

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Ellen Messmer

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts