Future smartphones will come pre-loaded with anti-virus software clients to prevent the loss of data and services to malware. And mobile banking and person-to-person payments will be authenticated by fingerprint sensors on the handset.
"Although malware has been seen in mobile handsets, in the past it has not done much damage," says ABI Research vice president Stan Schatt.
"But smartphones have access to more sensitive data every year, and security must be tightened to prevent the theft or loss of important business information."The solution: security client software loaded on a mobile terminal, and a service to remotely lock a handset, erase its data, or locate it.
According to a new study by ABI Research, the number of smartphones protected by advanced security software will increase fivefold over the next five years.Enterprises with mobile workforces have growing concerns about lost and stolen handsets, due to the increasing amount of data stored on a typical smartphone.
Apple's iPhone, for example, includes a Find My iPhone feature that allows MobileMe customers to track their iPhone remotely via a Web interface and see its location displayed on a Google Map. It can also be used to display messages on the iPhone's screen remotely, have the iPhone play a sound, and even remotely wipe its contents should all attempts to retrieve it prove futile.
Large enterprises will buy mobile device management platforms to use within their IT departments, and smaller enterprises or even consumers will use managed security services, as wireless carriers increasingly offer security services to their customers.
Strong enterprise demand for data security is driving rapid growth in mobile device management services.
In addition, organizations that deal with financial data, healthcare information, or personal identification such as social security numbers have to comply with several regulatory requirements (such as HIPAA, GISRA, and SEC) for protecting data, wherever it is stored.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.