Top 4 New Network technologies in 2012

Regional and international experts discuss new network technologies, such as governance, risk and compliance and mobile application management, and what they mean for enterprises

Tags: Dell CorporationEMC CorporationGartner IncorporationSonicWALL IncorporatedSony Corporation
  • E-Mail
Top 4 New Network technologies in 2012 Firewalls are a key defence mechanism in cloud security, according to Dell SonicWALL.
By  Georgina Enzer Published  November 11, 2012

3. Mobile application management

Mobile application management is an essential tool if an enterprise is to allow BYOD.

Mobile application management is generically the ability for administrators to manage mobile applications on mobile devices including install/uninstall, configure and support and has recently been used with solutions such as Apperian, AppCentral which was just acquired by Good Technologies, and RAPsphere which was acquired by AppSense.

In general, employees at companies that use such solutions, will find that their personal mobile devices are not locked down at a device level, but instead, enterprise email and other enterprise apps are secured by the mobile application managment solution.

“An enterprise app may be wrapped at a binary level, or the app may be integrated to a mobile application managment SDK and recompiled.  In both cases, the enterprise app is now containerised.  When the resulting app is launched, a complex password might be needed, app data is stored encrypted, and there is data leakage prevention – text cannot be copied to an app outside the enterprise container, or enterprise email attachments cannot be saved to Dropbox which is outside the container,” states Song Chuang, research director at international technology research firm, Gartner.

Bring your own device

Mobile application managment features are very applicable and useful for bring your own device environments since they do not require a personal device to be completely locked down – instead, the enterprise stuff is locked down and isolated from the rest of the phone.  Employees are likely to prefer such a managment solution.

Implementing bring your own device without the proper tools is unsafe and puts the entire organisation at risk, but with the right solutions the secure use of user-owned mobile devices in companies without hindering users experience with those devices can become a reality.


With mobile application managment controls such as authentication, encryption and expiration – applications and data can be manually expired or set to automatically remove themselves from personal devices based on perimeters established by the network administrators.

In addition, mobile application managment solutions provide app portals tailored to each user to deliver the appropriate corporate apps to individual user-owned devices.

In this way, the user experience of downloading necessary corporate resources is as simple as visiting a public app store, but enterprises can ensure that users are only being given access to the resources they have permission to download.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code