Mobile devices present new challenges for backing up data as more employees use their personal smartphones and tablets for work. IT needs to implement a smart mix of policies, cloud services, and mobile device management to address these challenges. Specifically, the policy should clearly define the company's requirements for accessing corporate data on personal devices and clarify IT's responsibilities for backing up corporate versus personal data. The cloud can help with backups, but full device backups are difficult due to limitations of mobile operating systems.
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Backing up Android and iOs devices
1. Report ID:S5060612
Next
reports
BackingUpAndroid
AndiOSDevices
As more employees use their own tablets and smartphones for
work,IT teams need to figure out how to back up data created
while on the go.The answer:a smart mix of policies,cloud
services and mobile device management.We outline a data
protection plan that doesn’t depend on end users,because
“BYOD” shouldn’t mean “back up your own data.”
By Ben DuPont
Reports.InformationWeek.com J u n e 2 0 1 2 $ 9 9
2. Previous Next
reports
CO
NTENT
S
reports.informationweek.com
TABLE OF
June 2012 2
3 Author’s Bio
4 Executive Summary
5 Mobile Invasion
5 Figure 1:Policy on Personal Mobile Device
Use?
6 Figure 2:Storage of Corporate Data on
Mobile Devices
7 Figure 3:Mobile Device and Data Policies?
9 Consider Cloud
9 Figure 4:Cloud Storage Concerns
11 Encryption
11 Figure 5:Importance of Cloud Storage
Features
12 Figure 6:MBM Feature of Interest
13 Work in Progress
15 Related Reports
ABOUT US
InformationWeek Reports’ analysts arm
business technology decision-makers
with real-world perspective based on
qualitative and quantitative research,
business and technology assessment
and planning tools,and adoption best
practices gleaned from experience.To
contact us,write to managing director
ArtWittmann at awittmann@techweb.com,
content director Lorna Garey at
lgarey@techweb.com, editor-at-large Andrew
Conry-Murray at acmurray@techweb.com, and
research managing editor HeatherVallis at
hvallis@techweb.com. Find all of our
reports at reports.informationweek.com.
B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
4. June 2012 4
Previous Next
Smartphones and tablets present new backup challenges for IT.First,IT has to wrestle
with a broad category of products that run on a variety of operating systems,which
complicates centralized management and backups.Second,many of these mobile
devices are owned by the employee,not the company,which limits IT’s control.At the
same time,these employee-owned devices access corporate applications and data,and IT
has an obligation to protect that data.
The result is that IT has to assemble a set of policies and technologies that rely on a
variety of products and services,including cloud-based backup,file synchronization and
mobile device management.A growing number of cloud backup and file synchronization
services offer administrative controls that allow IT to enforce policies,provision and
deprovision users,and monitor content such as Office files.At present,backup isn’t a
significant feature in mobile device management products,but that’s likely to change
over time as more and more end users bring personal mobile devices into the workplace.
At the same time,mobile device management helps ensure that data will be safe from
prying eyes in the event that a device gets lost or stolen.
EXECUTIVE
reports.informationweek.com
reports
SUMMARY
B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
5. June 2012 5
As smartphone and tablet use grows in the
enterprise, IT wrestles with how to back up
sensitive data that might reside on these plat-
forms.This task is complicated by the fact that
many mobile devices are the property of the
employee, not the employer. In fact, 86% of
respondents to InformationWeek’s 2012
Mobile Security Survey said they allow or plan
to allow employee-owned devices (Figure 1).
Unfortunately for IT, the devices users
choose aren’t the ones IT is most ready for.
While IT can manage BlackBerry devices with-
out much difficulty, users want Apple and
Android products.Our survey shows that 46%
of respondents allow employee-owned Apple
iOS devices to store corporate data, followed
by 42% that allow Android 3.x and 4.x devices,
and 28% that allow Android 2.x devices (Fig-
ure 2). Add BlackBerry at 41% and Windows
Phone at 26% to that list and you can see IT
has its work cut out for it when it comes to
backing up data on these devices.
If you allow user-owned devices to access
corporate applications or data,make sure your
mobile device policy clearly describes the
company’s requirements for allowing that
access. IT’s first reaction to the bring-your-
own-device phenomenon may be to write
separate policies for employee- and company-
issued devices. That’s the wrong approach,
says Michael Finneran, an independent con-
sultant and industry analyst. “Our job is to
make sure mobile users get access to the stuff
they need securely, regardless of who owns
the phone,” says Finneran. “What level of se-
Previous Next
Does your mobility policy allow employees to use personal mobile devices for work?
14%
62%
24%
Policy on Personal Mobile Device Use?
Yes
No,and we have no plans
to allow personal device use
No,but we’re developing a policy
Data: InformationWeek 2012 Mobile Security Survey of 322 business technology professionals, March 2012 R4720512/3
reports.informationweek.com
Mobile Invasion
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Figure 1
6. June 2012 6
curity is required is defined by the organiza-
tion, … and what users get access to is de-
fined by their role.”
Your policy should also be clear about
where IT’s responsibilities lie regarding back-
ups: IT has a right and an obligation to back
up company data, and to take steps to do so.
But IT doesn’t have any obligation to protect
a user’s personal information, files, applica-
tions and other information, such as photos
and videos.
Of course,separating personal and corporate
data is easier said than done.A mobile device
can quickly become a hodgepodge of busi-
ness and private information. For instance, a
phone’s contact list could have personal and
business contacts.Business documents saved
as PDFs may be loaded into an e-reader app.
Thus,your policy must make it clear that while
IT isn’t responsible for backing up your MP3
files or vacation photos, some personal data
may be intermingled with corporate backups.
Almost half of the respondents to our Infor-
mationWeek Mobile Device Management and
Security Survey have written policies and pro-
Previous Next
Windows
laptops/netbooks
BlackBerry
Apple
iOS
Android
3.x
and
4.x
Windows
Mobile
Android
2.x
Non-Windows
laptops/netbooks
(OS
X,
Linux)
Windows
Phone
WebOS
Symbian
Bada
On which of the following mobile device platforms does your organization permit corporate data to be stored?
Storage of Corporate Data on Mobile Devices
Data: InformationWeek 2012 Mobile Security Survey of 322 business technology professionals, March 2012 R4670512/35
Company-provided Personally owned
80%
41%
70%
41%
62%
46%
42%
36%
35%
25%
35%
28%
34%
23%
30%
26%
14%
10%
6%
7%
4%
4%
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Figure 2
FAST FACT
86%
of respondents to
InformationWeek’s 2012
Mobile Security Survey
said they allow or plan to
allow employee-owned
devices.
7. June 2012 7
Previous Next
cedures regarding the handling of mobile
data (Figure 3).If you haven’t yet developed a
mobile policy, make sure you get input from
multiple sources, including HR, security, legal
and users themselves.
Backup Challenges
Your IT organization probably has mecha-
nisms in place to back up users’ laptops and
PCs.A typical plan calls for backing up every-
thing on the device, including the OS, appli-
cations and files such as Office documents.
Full backups, including the OS, are possible
on mobile platforms, but not without some
challenges. The operating systems for Apple
and Android phones and tablets run applica-
tions in a sandbox that don’t permit apps to
see data generated by other apps, which
means a traditional backup agent like the
kind that runs on a PC wouldn’t be able to
capture all the data on a mobile device.
Organizations that want to perform a full
backup will have to use workarounds.
Apple requires the use of its iTunes service
to activate iPhones and iPads.The iTunes ser-
vice is also used to update the devices and re-
install the OS, if necessary.Apple phones and
tablets have to sync with iTunes to back up
data. IT can deploy iTunes software to em-
ployees’ work computers using desktop man-
agement tools. If users sync their Apple
phones or tablets to their work computers,
then iTunes will automatically back up the
mobile device and store that backup on the
work computer,which gives IT some measure
2012 State of
Mobile Security
With 62% already allowing
personal devices at work,IT’s
juggling laptop policies and Wi-Fi
policies and BYOD policies—and
that means security gaps big
enough to drive a semi through.
Most,80%,require only
passwords for mobile devices
that access enterprise data/-
networks,yet just 14% require
hardware encryption,no
exceptions.Let’s be clear:Mobile
security is data security,and we
must do better.
Download
Download
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
2011 2010
Does your organization currently have written policies or procedures pertaining specifically to mobile/portable
devices or the handling of mobile data?
Mobile Device and Data Polices?
Yes;written policies and procedures
Yes;written policies only
Yes;written procedures only
No,but policies are being considered or are under development
No
Base: 323 respondents in August 2011 and 307 in March 2010
Data: InformationWeek Mobile Device Management and Security Survey of business technology professionals
R3321011/19
49%
52%
18%
19%
6%
4%
21%
22%
6%
3%
Figure 3
8. June 2012 8
of control over the data. Apple’s manual for
enterprise deployments has more informa-
tion on backing up Apple mobile devices.
Apple also allows for different data types to
be synced to different computers. For exam-
ple,music files can be synced to a home com-
puter and contacts to a work computer. If IT
activates the tablet or phone for the
employee via iTunes, the service can be pre-
configured to enforce this separation of data,
so that information important to the com-
pany is synced and
backed up to a corpo-
rate PC, while personal
data stays with a user’s
computer.
However, given that
many Apple devices are
purchased by employees,there’s a strong like-
lihood that they would activate and sync their
mobile devices to iTunes running on a per-
sonal computer,which may put backups out-
side of IT’s control.
Android devices aren’t much better when
it comes to a full backup of the OS and all
data; the Android OS doesn’t provide hooks
needed for a full device backup. A backup
manager API is built in to the Android plat-
form, but each Android device vendor, such
as Samsung and Motorola,must create a cus-
tomized backup transport that user applica-
tions can communicate with through the
API.The upshot is that each individual appli-
cation on the device must have backup sup-
port built in by the application vendor, and
IT cannot necessarily control where the
backup lands.
Some third-party services, such as MyBack-
upPro, will back up just about everything on
an Android device except the OS,but the An-
droid device has to be rooted to enable this.
A device is rooted when the user subverts sys-
tem controls placed by the device manufac-
turer so that the user can get “root,” or
administrator, access to the device. Many
organizations don’t want rooted devices con-
necting to corporate networks because of the
potential security dangers.
While users root their devices to gain more
control,they also expose themselves to more
risks.Rooted devices have a greater potential
of exposing private data to malware,because
malware on the device can take advantage of
root privileges.And users with rooted phones
may also have the ability to disable security
features enabled by mobile device manage-
ment software,such as the password strength
policy and autolock. Users can also install
apps that would otherwise be blacklisted by
MDM software. For these reasons, many or-
ganizations don’t allow rooted mobile devices
onto the corporate network.
Most Android smartphones come with a
card slot into which the user can plug an
external storage device, such as an SD Card.
The Android device can be configured to save
data to this external device,providing another
backup option for IT,but again this requires a
diligent user who knows enough to back up
the data and then either save the data to a PC
that IT regularly backs up or deliver the re-
movable card to IT for backup. Some backup
agents can also back up data on an SD Card.
If you store corporate data on an SD Card, be
aware that the data will not be encrypted by
Previous Next
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Your policy should also be clear
about where IT’s responsibilities
lie regarding backups.
9. June 2012 9
device encryption and the data will be read-
able by any application on the device.
While backup for most mobile device data is
challenging,email is the exception,particularly
for companies that use Microsoft Exchange.Mi-
crosoft offers an ActiveSync agent that syn-
chronizes email and attachments between the
Exchange server and mobile devices.The data
remains on the Exchange server so it can be
synced among multiple devices (laptop, desk-
top, mobile phone, etc.). Exchange servers are
already part of a company’s centralized backup
program, so corporate email doesn’t need to
be backed up on individual mobile devices.
Consider Cloud
Android and iOS devices do support backups
of certain user data,such as device settings,cal-
endar and contacts, photos, and SMS, but
there’s no easy way for an enterprise to back up
that information to a central location—unless
IT is willing to consider cloud-based backup.
One option is a company called Druva,which
provides a variety of services, including
backup,for laptops and mobile devices.IT can
have backups stored on premises or in Druva’s
cloud.Druva’s application,inSync,provides ad-
ministrator-controlled backup for Apple and
Android devices. On iOS and Android plat-
forms,administrators can schedule backups of
contacts, pictures, videos, text messages and
Previous Next
2012 2011
What are your main concerns about using cloud storage services?
Cloud Storage Concerns
Security
Reliability and availability
Performance
Cost
Regulatory concerns
Other
Note: Multiple responses allowed
Base: 313 respondents in January 2012 and 377 in November 2010
Data: InformationWeek State of Storage Survey of business technology professionals
R4190212/23
79%
79%
52%
55%
49%
51%
39%
48%
38%
34%
3%
5%
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Figure 4
10. June 2012 10
call history.When it comes to Office-type files,
the user can manually share files with inSync
and inSync will back them up.
Asigra also offers a cloud-based backup
service that supports mobile devices. On the
Android platform, Asigra’s DS-Mobile Client
can back up contacts, calendar, call logs, set-
tings, apps and Office files. On iOS, the client
can back up contacts, calendars, photos and
video.Many cloud backup vendors also resell
Asigra’s client to support mobile device
backup for their customers.
Business contacts and SMS data are impor-
tant to IT, but Office files are likely to be the
most sensitive corporate information that
gets used on mobile devices—think of an
executive working on spreadsheets while
waiting to catch a connection at the airport,
or a salesperson updating a presentation for
a new customer.
If IT is concerned about Office files, it may
want to consider cloud-based synchroniza-
tion services such as Box and Dropbox.While
not technically a backup, these file synchro-
nization services do store copies of files, in-
cluding updates and changes, in the cloud. If
a mobile device is lost or wiped,users can still
recover their files. In addition, many of these
services support some form of centralized
management for IT,such as being able to cre-
ate and monitor corporate accounts for users.
While IT may be uncomfortable with putting
corporate data into the cloud (security was
the No.1 concern of cloud storage in Informa-
tionWeek’s 2012 State of Storage Survey), the
fact is, users are flocking to these offerings
with or without IT’s approval (Figure 4).IT may
be better served by getting out in front of the
problem by offering a version to users that al-
lows some measure of administrative control.
For instance, in May, Box announced new se-
curity and administration features to make it
easier for IT to manage users and files. Mean-
while, Dropbox launched a Teams version of
its service that includes administrative func-
tions such as the ability to add and remove
users from the service.
Similar options include Syncplicity,a file syn-
chronization and sharing platform designed
for enterprise use that supports mobile
devices.On the Android platform,users can up-
date existing files and create new ones, and
have them synced via the service to be avail-
able elsewhere.Apple iPhone users can upload
and view files,but can’t create new files.Sync-
plicity, which was recently acquired by EMC,
supports administrative controls such as revok-
ing user accounts and setting and resetting
passwords.Other products that combine cloud
synchronization with administrative controls
includeTrend Micro SafeSync and Mezeo.
Other options include services from Egnyte
and SugarSync, both of which offer cloud-
based file synchronization and storage
for mobile platforms. Both companies
enable mobile access to files, and both can
synchronize and save new files that are
created on a mobile device, or changes that
have been made to existing files (assuming
that the mobile platform offers file creation or
editing capabilities).
All of these services ensure that documents
and files will remain available to IT and busi-
ness users even if the mobile device is lost or
damaged.
Previous Next
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
11. June 2012 11
Encryption
When using a cloud-based service, data
should be encrypted both in transit and at rest.
Respondents to the InformationWeek’s Public
Cloud Storage Survey rated data encryption as
the third-most-important feature of a cloud
storage system,just behind the ability to move
data between cloud and on-premises storage,
and on-demand access (Figure 5).
Most cloud backup and synchronization
services support encryption in transit—the
procedures and protocols for encrypting data
as it travels over networks are well estab-
lished. Many cloud storage and file synchro-
nization services also encrypt the data stored
on their systems. For instance, SugarSync
encrypts all stored files using 128-bit AES,and
Box encrypts data at rest using 256-bit AES.
The question then becomes one of trust. If
the provider manages decryption keys,
which potentially opens the door to unau-
thorized access to your information by a
rogue employee or outside attacker. The
probability of such an occurrence is low, but
if it represents a risk you don’t want to take,
Previous Next
How important are the following features when using or evaluating a cloud storage service?
Please use a scale of 1 to 5,where 1 is“not important”and 5 is“very important.”
Importance of Cloud Storage Features
Note: Mean average ratings
Base: 229 respondents at organizations using, planning to adopt or assessing public cloud storage services
Data: InformationWeek Public Cloud Storage Survey of 363 business technology professionals, April 2011
R2750511/7
Ability
to
move
data
between
cloud
and
on-premises
storage
On-demand
access
Data
encryption
Ability
to
establish/enforce
retention
policy
Network
encryption
Monitoring
tools
Compatibility
with
legacy
systems/processes,
e.g.,
Active
Directory
SLAs
Reporting
(usage
and
compliance)
Geographic
redundancy
Wide
support
for
transfer
protocols
(SCP,
FTP,
SAMBA/CIFS,
RSYNC)
Native
file
system
support
(mount
point)
Instant
scalability
Integrity
policy
reporting
Data
compression
Deduplication
Limitless
scalability
4.4
4.3
4.3
4.3
4.2
4.1
4.1
4.1
4.0
3.9
3.9
3.9
3.8
3.8
3.7
3.7
3.6
1
Not
at
all
concerned
Very
concerned
5
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Figure 5
Like This Report?
Rate It!
Something we could do
better? Let us know.
Rate
Rate
12. June 2012 12
you can look for a vendor that supports a dis-
tributed key management system, such as
Druva. In Druva’s approach, neither the
company nor the customer has direct access
to the encryption key; part of the key is
encrypted with the user’s password, and
the key can only be recovered when a user
logs in.
Mobile Device Management
MDM systems are available to help IT get a
measure of control over smartphones and
tablets,including user-owned devices.We rec-
ommend the use of MDM products as part of
your overall mobility strategy. Unfortunately,
only a handful of MDM platforms address
backup: Of 11 products in the Information-
Week Mobile Device Management Buyer’s
Guide, just three support remote backup:
Fiberlink, Sybase and Wyse. However, we an-
ticipate that more MDM vendors will offer
some form of backup service or partner with
a provider.
However, it’s also clear that IT isn’t looking
to MDM vendors for backup capabilities. In
our 2011 Mobile Device Management and Se-
curity Survey, only 11% of respondents listed
“scheduled backup and restore” as a feature
of interest. Twelve other features ranked
higher, including security-centric features
such as compliance and policy settings,policy
enforcement and remote wipes (Figure 6).
That attitude may change as smartphones
and tablets become more ingrained in corpo-
Previous Next
Whether or not you have a mobile device management (MDM) system for controlling tablets and smartphones,which centrally controlled features
are of greatest interest to you?
MDM Features of Interest
Compliance/policy
setting
Policy
enforcement
Device
updates
Management
of
physical
devices
Auditing
Remote
selective
data
wipe
Remote
full
data
wipe
Support
for
multiple
device
types
Over-the-air
provisioning
and
updates
Application
whitelisting
Remote
troubleshooting
Jailbreak/rooting
detection
Schedule
backup
and
restore
Vulnerability
remediation
Role-based
policies
Private
app
store
Sandboxing
capabilities
RSS/Web
browsing
Other
Note: Five responses allowed
Data: InformationWeek 2011 Mobile Device Management and Security Survey of 323 business technology professionals, August 2011
R3321011/27
53%
51%
44%
40%
34%
34%
30%
29%
26%
21%
20%
18%
11%
11%
9%
8%
8%
5%
2%
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Figure 6
13. June 2012 13
rate workflow, and as the devices’ ability to
create content improves.In the meantime,the
lack of backup in an MDM platform doesn’t
detract from MDM’s other capabilities.
As you evaluate MDM products, ask the
vendors where backup sits on their road maps.
And in the meantime,there are a few other pro-
tection mechanisms you should ensure are
available today.
The first line of defense is a strong password.
However,users are notorious for selecting sim-
ple passwords, so you can fortify the mobile
device with an autolock feature. Autolock
makes the device inaccessible if a person fails
to enter the correct password after a predeter-
mined number of tries.However,while lockout
features will slow down an attacker,the lockout
mechanism is only effective if the device is at-
tacked through the UI.If an attacker can get di-
rect access to the content on the device,
whether through an OS exploit or by getting
physical control of the device and prying out
the memory chip,the lockout won’t help.That’s
why encryption is the next line of defense.
Most MDM platforms support full device en-
cryption,which IT may find comforting in case
a device is lost or stolen.However,note that en-
cryption isn’t guaranteed protection because
recovery of the encryption key is possible,
though difficult. For a device to encrypt and
decrypt data,it needs a key that must be stored
somewhere on the device.Android and iOS de-
vices solve this problem by encrypting the en-
cryption key with the user’s password.The mo-
bile device prompts the user for the password,
decrypts the encryption key,and can then en-
crypt and decrypt data.
However, if an attacker gains direct access
to the flash memory on the device, the
attacker can carry out a brute-force attack
against the encrypted key. If the password is
simple,the key can be recovered quickly.
Other features to look for include device
tracking and remote wipe.Device tracking will
allow you to confirm the location of a user’s
device. If it seems that the probability of
recovering a device is low, remote wipe will
ensure that no one can recover the data.
Of course, a remote wipe is tricky with a
device owned by the employee—you’ll
prevent sensitive information from being
leaked, but you’ll also destroy whatever per-
sonal information was stored on the
device.This might not be a problem if the
device couldn't be recovered, but it will be an
issue if the employee leaves the company.Look
for an MDM product that can differentiate
between private and company-owned data.
For instance, Symantec says its MDM product,
Symantec Mobile Management,can keep per-
sonal and corporate data separate.We also rec-
ommend that your policy address the issue of
remote wiping for employee-owned devices.If
your policy requires that a device be wiped,and
you allow the use of personal devices, make
sure employees understand the potential to
have personal data eliminated.
Other MDM features to look for include
application blacklisting or whitelisting,
detection of rooted phones, and the ability
to host a corporate app store with apps
sanctioned by the company.
Work in Progress
Enterprise backup schemes for Android and
Previous Next
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
Like
Like Tweet
Tweet
Tweet
Share
Share
Like This Report?
Share it!
14. June 2012 14
iOS devices are still in their infancy, which
means IT may have to take a variety of
approaches to protect corporate data on these
devices. First and foremost, IT needs to have a
mobile device policy that describes its role and
responsibility for data backups. That policy
should be created with input from a variety of
stakeholders,not just the IT department.
IT should also consider cloud services for
backing up and synchronizing files; while IT
may be reluctant to embrace cloud storage,
such services can be a sensible alternative to
traditional, premises-based backup products
for mobile devices.
Finally, deploy an MDM product that sup-
ports full device encryption, strong pass-
words,autolock and remote wipe.These steps
will go a long way to protecting corporate
data.
Previous Next
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
Table of Contents
15. Subscribe
Subscribe
Newsletter
Want to stay current on all new
InformationWeek Reports?
Subscribe to our weekly
newsletter and never miss
a beat.
June 2012 15
Previous
reports.informationweek.com
reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s
MORE
LIKE THIS
Want More Like This?
InformationWeek creates more than 150 reports like this each year,and they’re all free to registered users.We’ll help
you sort through vendor claims,justify IT projects and implement new systems by providing analysis and advice from
IT professionals.Right now on our site you’ll find:
Buyer’s Guide:Cloud Storage,Backup and Synchronization: The cloud is displacing local physical storage for
applications as diverse as file sharing,backup and cross-device data synchronization.Both business users and IT are
adopting cloud services because of their convenience and low costs.We examine the market landscape and present
detailed features and pricing from14 providers,including Carbonite,Dropbox and Nirvanix.
Mobile App Development: Smartphones and tablets are everywhere.If you need to reach your customers or
employees on these devices,now’s the time to start developing mobile apps.We provide essential information to help
you get started,including development basics for Apple iOS,Google Android,RIM BlackBerry and Microsoft Windows.
We also look at the pros and cons of cross-platform development and discuss how to build secure apps from the get-go.
Enterprise Buyer’s Guide:Tablets: We profile five contenders for your business.Key differentiators for enterprise IT:the
ability to connect to corporate VPNs,native device security and authentication,and amenability to centralized
management.We also touch on Intel’s master plan to challenge purveyors of smartphone silicon.Clearly,2012 will
see Android OEMs up their games and the Wintel combo reunite to finally take a serious stab at the tablet market.
How will you manage the onslaught?
PLUS: Find signature reports,such as the InformationWeek Salary Survey,InformationWeek 500 and the annual State of
Security report; full issues; and much more.
Table of Contents