Enterprise Mobility Management / BYOD

Developing a Comprehensive Mobile Security Strategy

Michael Covington of Wandera Discusses Key Steps
Michael Covington, vice president of product, Wandera

Organizations need to go far beyond putting security software on mobile devices and develop a broader mobile security strategy, says Michael Covington of Wandera.

See Also: The Operationalization of Threat Intelligence Programs

"We've got mobile devices and applications that are now outside the perimeter that we need to look at holistically; we need to think end-to-end," he says.

In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Covington discusses:

  • End-to-end mobile security;
  • Top mobile security trends;
  • Recommendations for making mobile security an enabler.

Covington, Ph.D., is vice president of product for Wandera, which specializes in mobile security and data management. He previously held leadership roles at Intel Labs, Cisco Security and Juniper Networks. With a diverse background as a published computer science researcher and an IT professional, Covington has experienced technology from all sides, and he specializes in bringing innovations to market in the areas of mobility and connectivity.

About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.