Today‘s smart phones and tablets boast computing and storage capabilities that surpass those of an entire data center a few decades ago. Throw in an „always on“ Internet connection, BYOD (Bring Your Own Device) and the blurred lines between personal and professional data and you have the possibility for not only 24x7 access but an ongoing risk of breach. This session will discuss the issues inherent with mobile devices, their connections to cloud services and how to address them.
Target Audience: English: Architects, Developers, Managers, Decision Makers
You will learn:
- Understand the threats present with mobile devices
- Develop a greater appreciation for the need for a holistic approach to security
It is not sufficient for developers simply to create useful features. Those features must also be secure against attack. Security is not something that can easily be added on at the end of the process but must be considered holistically throughout the development process. This consideration begins with understanding the risks that are inherent in device platforms and with the growth of mobile as a preferred type, security issues in that space have never been more important.