You are the CMO or the head of marketing for your company, and you’ve just finalized your social media plans for 2011 at the request of the CEO. Despite the unknowns out there, you are comfortable with your target audience, your message, your content plan, and the platforms you will use. You’ve even got a great candidate who loves the brand and wants to be the evangelist. But last week, your social media evangelist brought you an iPad to try out. You take it home for the weekend, you use it nonstop, and now you are thinking, “Where does this fit in my plans for next year?” While 2011 will see huge growth in spending on mobile advertising, and the display and search markets are back on track from the semi-slump of 2009, where does the iPad and other tablets to be announced from Google, Dell, Nokia, and others fit into your plans?
From a marketer’s perspective, the Web browser is pretty well understood — targeted banner ads that ideally would be integrated into content so as not to be intrusive. Mobile is getting cooler, and the ad platform to support visible ads on small screens is in the hands of the two (now) most popular smartphone platforms, Apple and Android. But this tablet segment seems to be gaining traction as a platform for what marketers dream of:
Greetings. Here at Forrester, we are encouraged to think Deep Thoughts about Matters of Great Importance. Looking across the broader landscape of IT — of which security and risk is just a small part — we can see that one of the biggest and more important matters today is the influx of consumer-grade mobile gear into the workplace. Whether you call it Tech Populism (a favorite Forrester term) or Executive Bling (a favorite term of mine), it is no secret that enterprise CIOs are receiving lots of pressure to support unsanctioned devices like the iPhone and iPad in the workplace.
Today, Forrester published my report “Apple’s iPhone And iPad: Secure Enough For Business?” In it, we describe how the capabilities of Apple’s iOS 4 make these devices secure enough for many businesses to use safely. We define seven security policies every enterprise should implement to keep its email and corporate information safe on Apple mobile devices, whether or not the enterprise owns them. We also define additional security "high-water marks" — policies and processes you can implement — based on your risk profile and regulatory exposure. I hope you’ll read the report, and I welcome your comments and questions.
Greetings everyone. My name is Andrew Jaquith, and I serve security and risk professionals. Normally I blog over on the S&R analyst team blog. But because Forrester has been receiving so many inquiries about the security of iPhone and iPad devices, I thought it would make sense to let you know that my new report, “Apple’s iPhone And iPad: Secure Enough For Business?” is now live on the Forrester website and available to Forrester subscribers.
ZDNet's Larry Dignan nicely summarizes my report here. But for the impatient, here is the executive summary:
Apple’s iPhone and the iPad have become increasingly popular. In 2007, IT dismissed the iPhone as insecure and unsuitable for enterprises. Three years later, the iPhone (and iPad) gives enterprises enough security options to enable them to say “yes” instead of “no.” In this report, Forrester defines seven security policies every enterprise should implement to keep its email and corporate information safe on Apple mobile devices, whether or not the enterprise owns them. We also define additional security “high-water marks” — policies and processes you can implement — based on your risk profile and regulatory exposure. Finally, we acknowledge that while most enterprises can use Apple mobile devices securely, some require higher levels of authentication assurance, resistance to attack, manageability, and logging than the iPad or iPhone can provide. For these customers, Research In Motion’s BlackBerry still rules the roost.