Transcript
Page 1: Backing up Android and iOs devices

Report ID: S5060612

Next

reports

Backing Up AndroidAnd iOS DevicesAs more employees use their own tablets and smartphones for

work, IT teams need to figure out how to back up data created

while on the go. The answer: a smart mix of policies, cloud

services and mobile device management. We outline a data

protection plan that doesn’t depend on end users, because

“BYOD” shouldn’t mean “back up your own data.”

By Ben DuPont

Reports. InformationWeek.com J u n e 2 0 1 2 $ 9 9

Page 2: Backing up Android and iOs devices

Previous Next

reports

CONT

ENTS

reports.informationweek.com

TABLE OF

June 2012 2

3 Author’s Bio

4 Executive Summary

5 Mobile Invasion

5 Figure 1: Policy on Personal Mobile Device

Use?

6 Figure 2: Storage of Corporate Data on

Mobile Devices

7 Figure 3: Mobile Device and Data Policies?

9 Consider Cloud

9 Figure 4: Cloud Storage Concerns

11 Encryption

11 Figure 5: Importance of Cloud Storage

Features

12 Figure 6: MBM Feature of Interest

13 Work in Progress

15 Related Reports

ABOUT US

InformationWeek Reports’ analysts arm business technology decision-makers with real-world perspective based on qualitative and quantitative research, business and technology assessment and planning tools, and adoption best practices gleaned from experience. To contact us, write to managing director Art Wittmann at [email protected], content director Lorna Garey at [email protected], editor-at-largeAndrewConry-Murray at [email protected], andresearch managing editor Heather Vallis [email protected]. Find all of our reports at reports.informationweek.com.

B a c k i n g U p A n d r o i d a n d i O S D e v i c e s

Page 3: Backing up Android and iOs devices

June 2012 3

Previous Next

© 2012 InformationWeek, Reproduction Prohibited

reports

reports.informationweek.com

B a c k i n g U p A n d r o i d a n d i O S D e v i c e s

Ben DuPont is a software engineer in Green Bay, Wis., and owner of NeblandSoftware LLC. He can be reached at [email protected].

Ben DuPontInformationWeek Reports

Table of Contents

FollowFollowFollowFollow

Want More?

Never Miss a Report!

Page 4: Backing up Android and iOs devices

June 2012 4

Previous Next

Smartphones and tablets present new backup challenges for IT. First, IT has to wrestlewith a broad category of products that run on a variety of operating systems, which complicates centralized management and backups. Second, many of these mobile devices are owned by the employee, not the company, which limits IT’s control. At thesame time, these employee-owned devices access corporate applications and data, and IThas an obligation to protect that data.The result is that IT has to assemble a set of policies and technologies that rely on a

variety of products and services, including cloud-based backup, file synchronization andmobile device management. A growing number of cloud backup and file synchronizationservices offer administrative controls that allow IT to enforce policies, provision and deprovision users, and monitor content such as Office files. At present, backup isn’t a significant feature in mobile device management products, but that’s likely to changeover time as more and more end users bring personal mobile devices into the workplace.At the same time, mobile device management helps ensure that data will be safe fromprying eyes in the event that a device gets lost or stolen.

EXECUTIVE

reports.informationweek.com

reports

SUM

MAR

Y

B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

Page 5: Backing up Android and iOs devices

June 2012 5

As smartphone and tablet use grows in theenterprise, IT wrestles with how to back upsensitive data that might reside on these plat-forms. This task is complicated by the fact thatmany mobile devices are the property of theemployee, not the employer. In fact, 86% of respondents to InformationWeek ’s 2012 Mobile Security Survey said they allow or planto allow employee-owned devices (Figure 1).Unfortunately for IT, the devices users

choose aren’t the ones IT is most ready for.While IT can manage BlackBerry devices with-out much difficulty, users want Apple and Android products. Our survey shows that 46%of respondents allow employee-owned AppleiOS devices to store corporate data, followedby 42% that allow Android 3.x and 4.x devices,and 28% that allow Android 2.x devices (Fig-ure 2). Add BlackBerry at 41% and WindowsPhone at 26% to that list and you can see IThas its work cut out for it when it comes tobacking up data on these devices.If you allow user-owned devices to access

corporate applications or data, make sure yourmobile device policy clearly describes thecompany’s requirements for allowing that access. IT’s first reaction to the bring-your-own-device phenomenon may be to writeseparate policies for employee- and company-

issued devices. That’s the wrong approach,says Michael Finneran, an independent con-sultant and industry analyst. “Our job is tomake sure mobile users get access to the stuffthey need securely, regardless of who ownsthe phone,” says Finneran. “What level of se-

Previous Next

Does your mobility policy allow employees to use personal mobile devices for work?

14%

62%24%

Policy on Personal Mobile Device Use?

Yes

No, and we have no plans to allow personal device use

No, but we’re developing a policy

Data: InformationWeek 2012 Mobile Security Survey of 322 business technology professionals, March 2012 R4720512/3

reports.informationweek.com

Mobile Invasion

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

Figure 1

Page 6: Backing up Android and iOs devices

June 2012 6

curity is required is defined by the organiza-tion, … and what users get access to is de-fined by their role.”Your policy should also be clear about

where IT’s responsibilities lie regarding back-ups: IT has a right and an obligation to backup company data, and to take steps to do so.But IT doesn’t have any obligation to protecta user’s personal information, files, applica-tions and other information, such as photosand videos.Of course, separating personal and corporate

data is easier said than done. A mobile devicecan quickly become a hodgepodge of busi-ness and private information. For instance, aphone’s contact list could have personal andbusiness contacts. Business documents savedas PDFs may be loaded into an e-reader app.Thus, your policy must make it clear that whileIT isn’t responsible for backing up your MP3files or vacation photos, some personal datamay be intermingled with corporate backups.Almost half of the respondents to our Infor-mationWeek Mobile Device Management andSecurity Survey have written policies and pro-

Previous Next

Win

dow

s lap

tops

/net

book

s

Blac

kBer

ry

Appl

e iO

S

Andr

oid

3.x a

nd 4

.x

Win

dow

s Mob

ile

Andr

oid

2.x

Non-

Win

dow

s lap

tops

/net

book

s (OS

X, L

inux

)

Win

dow

s Pho

ne

Web

OS

Sym

bian

Bada

On which of the following mobile device platforms does your organization permit corporate data to be stored?

Storage of Corporate Data on Mobile Devices

Data: InformationWeek 2012 Mobile Security Survey of 322 business technology professionals, March 2012 R4670512/35

Company-provided Personally owned

80%

41%

70%

41%

62%

46%

42%

36%

35%

25%

35%

28%

34%

23%

30%

26%

14%

10%

6%7%

4% 4%

reports.informationweek.com

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

Figure 2

FAST FACT

86%of respondents to

InformationWeek’s 2012

Mobile Security Survey

said they allow or plan to

allow employee-owned

devices.

Page 7: Backing up Android and iOs devices

June 2012 7

Previous Next

cedures regarding the handling of mobiledata (Figure 3). If you haven’t yet developed amobile policy, make sure you get input frommultiple sources, including HR, security, legaland users themselves.

Backup ChallengesYour IT organization probably has mecha-

nisms in place to back up users’ laptops andPCs. A typical plan calls for backing up every-thing on the device, including the OS, appli-cations and files such as Office documents.Full backups, including the OS, are possible

on mobile platforms, but not without somechallenges. The operating systems for Appleand Android phones and tablets run applica-tions in a sandbox that don’t permit apps tosee data generated by other apps, whichmeans a traditional backup agent like thekind that runs on a PC wouldn’t be able tocapture all the data on a mobile device. Organizations that want to perform a fullbackup will have to use workarounds.Apple requires the use of its iTunes service

to activate iPhones and iPads. The iTunes ser -

vice is also used to update the devices and re-install the OS, if necessary. Apple phones andtablets have to sync with iTunes to back updata. IT can deploy iTunes software to em-ployees’ work computers using desktop man-

agement tools. If users sync their Applephones or tablets to their work computers,then iTunes will automatically back up themobile device and store that backup on thework computer, which gives IT some measure

2012 State of Mobile Security

With 62% already allowing personal devices at work, IT’s juggling laptop policies and Wi-Fipolicies and BYOD policies—andthat means security gaps bigenough to drive a semi through.Most, 80%, require only passwords for mobile devicesthat access enterprise data/ -networks, yet just 14% requirehardware encryption, no exceptions. Let’s be clear: Mobilesecurity is data security, and wemust do better.

DownloadDownload

reports.informationweek.com

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

2011 2010

Does your organization currently have written policies or procedures pertaining specifically to mobile/portable devices or the handling of mobile data?

Mobile Device and Data Polices?

Yes; written policies and procedures

Yes; written policies only

Yes; written procedures only

No, but policies are being considered or are under development

No

Base: 323 respondents in August 2011 and 307 in March 2010Data: InformationWeek Mobile Device Management and Security Survey of business technology professionals

R3321011/19

49%52%

18%19%

6%4%

21%22%

6%3%

Figure 3

Page 8: Backing up Android and iOs devices

June 2012 8

of control over the data. Apple’s manual forenterprise deployments has more informa-tion on backing up Apple mobile devices. Apple also allows for different data types to

be synced to different computers. For exam-ple, music files can be synced to a home com-puter and contacts to a work computer. If ITactivates the tablet or phone for the employee via iTunes, the service can be pre-configured to enforce this separation of data,so that information important to the com-

pany is synced andbacked up to a corpo-rate PC, while personaldata stays with a user’scomputer. However, given that

many Apple devices arepurchased by employees, there’s a strong like-lihood that they would activate and sync theirmobile devices to iTunes running on a per-sonal computer, which may put backups out-side of IT’s control.Android devices aren’t much better when

it comes to a full backup of the OS and all

data; the Android OS doesn’t provide hooksneeded for a full device backup. A backupmanager API is built in to the Android plat-form, but each Android device vendor, suchas Samsung and Mo tor ola, must create a cus-tomized backup transport that user applica-tions can communicate with through theAPI. The upshot is that each individual appli-cation on the device must have backup sup-port built in by the application vendor, andIT cannot necessarily control where thebackup lands.Some third-party services, such as MyBack-

upPro, will back up just about everything onan Android device except the OS, but the An-droid device has to be rooted to enable this.A device is rooted when the user subverts sys-tem controls placed by the device manufac-turer so that the user can get “root,” or administrator, access to the device. Many organizations don’t want rooted devices con-necting to corporate networks because of thepotential security dangers. While users root their devices to gain more

control, they also expose themselves to more

risks. Rooted devices have a greater potentialof exposing private data to malware, becausemalware on the device can take advantage ofroot privileges. And users with rooted phonesmay also have the ability to disable securityfeatures enabled by mobile device manage-ment software, such as the password strengthpolicy and autolock. Users can also installapps that would otherwise be blacklisted byMDM software. For these reasons, many or-ganizations don’t allow rooted mobile devicesonto the corporate network.Most Android smartphones come with a

card slot into which the user can plug an external storage device, such as an SD Card.The Android device can be configured to savedata to this external device, providing anotherbackup option for IT, but again this requires adiligent user who knows enough to back upthe data and then either save the data to a PCthat IT regularly backs up or deliver the re-movable card to IT for backup. Some backupagents can also back up data on an SD Card.If you store corporate data on an SD Card, beaware that the data will not be encrypted by

Previous Next

reports.informationweek.com

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

Your policy should also be clear

about where IT’s responsibilities

lie regarding backups.

Page 9: Backing up Android and iOs devices

June 2012 9

device encryption and the data will be read-able by any application on the device.While backup for most mobile device data is

challenging, email is the exception, particularlyfor companies that use Microsoft Exchange. Mi-crosoft offers an ActiveSync agent that syn-chronizes email and attachments between theExchange server and mobile devices. The dataremains on the Exchange server so it can besynced among multiple devices (laptop, desk-top, mobile phone, etc.). Exchange servers arealready part of a company’s centralized backupprogram, so corporate email doesn’t need tobe backed up on individual mobile devices.

Consider CloudAndroid and iOS devices do support backups

of certain user data, such as device settings, cal-endar and contacts, photos, and SMS, butthere’s no easy way for an enterprise to back upthat information to a central location—unlessIT is willing to consider cloud-based backup.One option is a company called Druva, which

provides a variety of services, includingbackup, for laptops and mobile devices. IT can

have backups stored on premises or in Druva’scloud. Druva’s application, inSync, provides ad-ministrator-controlled backup for Apple and

Android devices. On iOS and Android plat-forms, administrators can schedule backups ofcontacts, pictures, videos, text messages and

Previous Next

2012 2011

What are your main concerns about using cloud storage services?

Cloud Storage Concerns

Security

Reliability and availability

Performance

Cost

Regulatory concerns

Other

Note: Multiple responses allowedBase: 313 respondents in January 2012 and 377 in November 2010Data: InformationWeek State of Storage Survey of business technology professionals

R4190212/23

79%79%

52%55%

49%51%

39%48%

38%34%

3%5%

reports.informationweek.com

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

Figure 4

Page 10: Backing up Android and iOs devices

June 2012 10

call history. When it comes to Office-type files,the user can manually share files with inSyncand inSync will back them up.Asigra also offers a cloud-based backup

service that supports mobile devices. On theAndroid platform, Asigra’s DS-Mobile Clientcan back up contacts, calendar, call logs, set-tings, apps and Office files. On iOS, the clientcan back up contacts, calendars, photos andvideo. Many cloud backup vendors also resellAsigra’s client to support mobile devicebackup for their customers.Business contacts and SMS data are impor-

tant to IT, but Office files are likely to be themost sensitive corporate information thatgets used on mobile devices—think of an executive working on spreadsheets whilewaiting to catch a connection at the airport,or a salesperson updating a presentation fora new customer.If IT is concerned about Office files, it may

want to consider cloud-based synchroniza-tion services such as Box and Dropbox. Whilenot technically a backup, these file synchro-nization services do store copies of files, in-

cluding updates and changes, in the cloud. Ifa mobile device is lost or wiped, users can stillrecover their files. In addition, many of theseservices support some form of centralizedmanagement for IT, such as being able to cre-ate and monitor corporate accounts for users.While IT may be uncomfortable with putting

corporate data into the cloud (security wasthe No. 1 concern of cloud storage in Informa-tionWeek’s 2012 State of Storage Survey), thefact is, users are flocking to these offeringswith or without IT’s approval (Figure 4). IT maybe better served by getting out in front of theproblem by offering a version to users that al-lows some measure of administrative control.For instance, in May, Box announced new se-curity and administration features to make iteasier for IT to manage users and files. Mean-while, Dropbox launched a Teams version ofits service that includes administrative func-tions such as the ability to add and removeusers from the service. Similar options include Syncplicity, a file syn-

chronization and sharing platform designedfor enterprise use that supports mobile

devices. On the Android platform, users can up-date existing files and create new ones, andhave them synced via the service to be avail-able elsewhere. Apple iPhone users can uploadand view files, but can’t create new files. Sync-plicity, which was recently acquired by EMC,supports administrative controls such as revok-ing user accounts and setting and resettingpasswords. Other products that combine cloudsynchronization with administrative controlsinclude Trend Micro SafeSync and Mezeo.Other options include services from Egnyte

and SugarSync, both of which offer cloud-based file synchronization and storage for mobile platforms. Both companies enable mobile access to files, and both cansynchronize and save new files that are created on a mobile device, or changes thathave been made to existing files (assumingthat the mobile platform offers file creation orediting capabilities).All of these services ensure that documents

and files will remain available to IT and busi-ness users even if the mobile device is lost ordamaged.

Previous Next

reports.informationweek.com

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

Page 11: Backing up Android and iOs devices

June 2012 11

EncryptionWhen using a cloud-based service, data

should be encrypted both in transit and at rest.Respondents to the InformationWeek’s PublicCloud Storage Survey rated data encryption asthe third-most-important feature of a cloudstorage system, just behind the ability to movedata between cloud and on-premises storage,and on-demand access (Figure 5). Most cloud backup and synchronization

services support encryption in transit—theprocedures and protocols for encrypting dataas it travels over networks are well estab-lished. Many cloud storage and file synchro-nization services also encrypt the data storedon their systems. For instance, SugarSync encrypts all stored files using 128-bit AES, andBox encrypts data at rest using 256-bit AES.The question then becomes one of trust. If

the provider manages decryption keys,which potentially opens the door to unau-thorized access to your information by arogue employee or outside attacker. Theprobability of such an occurrence is low, butif it represents a risk you don’t want to take,

Previous Next

How important are the following features when using or evaluating a cloud storage service? Please use a scale of 1 to 5, where 1 is “not important” and 5 is “very important.”

Importance of Cloud Storage Features

Note: Mean average ratingsBase: 229 respondents at organizations using, planning to adopt or assessing public cloud storage servicesData: InformationWeek Public Cloud Storage Survey of 363 business technology professionals, April 2011

R2750511/7

R

Abili

ty to

mov

e da

ta b

etw

een

cloud

and

on-

prem

ises s

tora

ge

On-d

eman

d ac

cess

Data

enc

rypt

ion

Abili

ty to

est

ablis

h/en

forc

e re

tent

ion

polic

y

Netw

ork

encr

yptio

n

Mon

itorin

g to

ols

Com

patib

ility

with

lega

cy sy

stem

s/pr

oces

ses,

e.g.

, Act

ive

Dire

ctor

y

SLAs

Repo

rtin

g (u

sage

and

com

plia

nce)

Geog

raph

ic re

dund

ancy

Wid

e su

ppor

t for

tran

sfer

pro

toco

ls (S

CP, F

TP, S

AMBA

/CIF

S, R

SYNC

)

Nativ

e fil

e sy

stem

supp

ort (

mou

nt p

oint

)

Inst

ant s

cala

bilit

y

Inte

grity

pol

icy r

epor

ting

Data

com

pres

sion

Dedu

plica

tion

Lim

itles

s sca

labi

lity

4.4

4.3

4.3

4.3

4.2

4.1

4.1

4.1

4.0

3.9

3.9

3.9

3.8

3.8

3.7

3.7

3.6

1 No

t at a

ll co

ncer

ned

Very

conc

erne

d 5

reports.informationweek.com

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

Figure 5

Like This Report?

Rate It!Something we could dobetter? Let us know.

RateRate

Page 12: Backing up Android and iOs devices

June 2012 12

you can look for a vendor that supports a dis-tributed key management system, such asDruva. In Druva’s approach, neither the company nor the customer has direct access

to the encryption key; part of the key is encrypted with the user’s password, and the key can only be recovered when a userlogs in.

Mobile Device ManagementMDM systems are available to help IT get a

measure of control over smartphones andtablets, including user-owned devices. We rec-ommend the use of MDM products as part ofyour overall mobility strategy. Unfortunately,only a handful of MDM platforms addressbackup: Of 11 products in the Information-Week Mobile Device Management Buyer’sGuide, just three support remote backup:Fiberlink, Sybase and Wyse. However, we an-ticipate that more MDM vendors will offersome form of backup service or partner witha provider.However, it’s also clear that IT isn’t looking

to MDM vendors for backup capabilities. Inour 2011 Mobile Device Management and Se-curity Survey, only 11% of respondents listed“scheduled backup and restore” as a featureof interest. Twelve other features rankedhigher, including security-centric featuressuch as compliance and policy settings, policyenforcement and remote wipes (Figure 6). That attitude may change as smartphones

and tablets become more ingrained in corpo-

Previous Next

Whether or not you have a mobile device management (MDM) system for controlling tablets and smartphones, which centrally controlled features are of greatest interest to you?

MDM Features of Interest

Com

plia

nce/

polic

y set

ting

Polic

y enf

orce

men

t

Devi

ce u

pdat

es

Man

agem

ent o

f phy

sical

dev

ices

Audi

ting

Rem

ote

sele

ctiv

e da

ta w

ipe

Rem

ote

full

data

wip

e

Supp

ort f

or m

ultip

le d

evice

type

s

Over

-the

-air

prov

ision

ing

and

upda

tes

Appl

icatio

n w

hite

listin

g

Rem

ote

trou

bles

hoot

ing

Jailb

reak

/roo

ting

dete

ctio

n

Sche

dule

bac

kup

and

rest

ore

Vuln

erab

ility

rem

edia

tion

Role

-bas

ed p

olici

es

Priv

ate

app

stor

e

Sand

boxi

ng ca

pabi

litie

s

RSS/

Web

bro

wsin

g

Othe

r

Note: Five responses allowedData: InformationWeek 2011 Mobile Device Management and Security Survey of 323 business technology professionals, August 2011

R3321011/27

53%

51%

44%

40%

34%

34%

30%

29%

26%

21%

20%

18%

11%

11%

9% 8% 8%

5%

2%

reports.informationweek.com

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

Figure 6

Page 13: Backing up Android and iOs devices

June 2012 13

rate workflow, and as the devices’ ability tocreate content improves. In the meantime, thelack of backup in an MDM platform doesn’tdetract from MDM’s other capabilities. As you evaluate MDM products, ask the

vendors where backup sits on their road maps.And in the meantime, there are a few other pro-tection mechanisms you should ensure areavailable today.The first line of defense is a strong password.

However, users are notorious for selecting sim-ple passwords, so you can fortify the mobile device with an autolock feature. Autolockmakes the device inaccessible if a person failsto enter the correct password after a predeter-mined number of tries. However, while lockoutfeatures will slow down an attacker, the lockoutmechanism is only effective if the device is at-tacked through the UI. If an attacker can get di-rect access to the content on the device,whether through an OS exploit or by gettingphysical control of the device and prying outthe memory chip, the lockout won’t help. That’swhy encryption is the next line of defense.Most MDM platforms support full device en-

cryption, which IT may find comforting in casea device is lost or stolen. However, note that en-cryption isn’t guaranteed protection becauserecovery of the encryption key is possible,though difficult. For a device to encrypt anddecrypt data, it needs a key that must be storedsomewhere on the device. Android and iOS de-vices solve this problem by encrypting the en-cryption key with the user’s password. The mo-bile device prompts the user for the password,decrypts the encryption key, and can then en-crypt and decrypt data.However, if an attacker gains direct access

to the flash memory on the device, the attacker can carry out a brute-force attackagainst the encrypted key. If the password issimple, the key can be recovered quickly.Other features to look for include device

tracking and remote wipe. Device tracking willallow you to confirm the location of a user’s device. If it seems that the probability of recovering a device is low, remote wipe will ensure that no one can recover the data.Of course, a remote wipe is tricky with a

device owned by the employee—you’ll

prevent sensitive information from beingleaked, but you’ll also destroy whatever per-sonal information was stored on the device.This might not be a problem if the device couldn't be recovered, but it will be anissue if the employee leaves the company. Lookfor an MDM product that can differentiate between private and company-owned data.For instance, Symantec says its MDM product,Symantec Mobile Management, can keep per-sonal and corporate data separate. We also rec-ommend that your policy address the issue ofremote wiping for employee-owned devices. Ifyour policy requires that a device be wiped, andyou allow the use of personal devices, makesure employees understand the potential tohave personal data eliminated.Other MDM features to look for include

application blacklisting or whitelisting, detection of rooted phones, and the abilityto host a corporate app store with apps sanctioned by the company.

Work in ProgressEnterprise backup schemes for Android and

Previous Next

reports.informationweek.com

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

LikeLike TweetTweetTweet

ShareShare

Like This Report?

Share it!

Page 14: Backing up Android and iOs devices

June 2012 14

iOS devices are still in their infancy, whichmeans IT may have to take a variety of approaches to protect corporate data on thesedevices. First and foremost, IT needs to have amobile device policy that describes its role andresponsibility for data backups. That policyshould be created with input from a variety ofstakeholders, not just the IT department. IT should also consider cloud services for

backing up and synchronizing files; while ITmay be reluctant to embrace cloud storage,such services can be a sensible alternative totraditional, premises-based backup productsfor mobile devices.Finally, deploy an MDM product that sup-

ports full device encryption, strong pass-words, autolock and remote wipe. These stepswill go a long way to protecting corporatedata.

Previous Next

reports.informationweek.com

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s Table of Contents

Page 15: Backing up Android and iOs devices

SubscribeSubscribe

Newsletter

Want to stay current on all newInformationWeek Reports? Subscribe to our weeklynewsletter and never miss a beat.

June 2012 15

Previous

reports.informationweek.com

reports B a c k i n g U p A n d r o i d a n d i O S D e v i c e s

MOR

ELIKE THIS

Want More Like This?

InformationWeek creates more than 150 reports like this each year, and they’re all free to registered users. We’ll helpyou sort through vendor claims, justify IT projects and implement new systems by providing analysis and advice fromIT professionals. Right now on our site you’ll find:

Buyer’s Guide: Cloud Storage, Backup and Synchronization: The cloud is displacing local physical storage for applications as diverse as file sharing, backup and cross-device data synchronization. Both business users and IT areadopting cloud services because of their convenience and low costs. We examine the market landscape and present detailed features and pricing from14 providers, including Carbonite, Dropbox and Nirvanix.

Mobile App Development: Smartphones and tablets are everywhere. If you need to reach your customers or employees on these devices, now’s the time to start developing mobile apps. We provide essential information to helpyou get started, including development basics for Apple iOS, Google Android, RIM BlackBerry and Microsoft Windows.We also look at the pros and cons of cross-platform development and discuss how to build secure apps from the get-go.

Enterprise Buyer’s Guide: Tablets:We profile five contenders for your business. Key differentiators for enterprise IT: theability to connect to corporate VPNs, native device security and authentication, and amenability to centralized management. We also touch on Intel’s master plan to challenge purveyors of smartphone silicon. Clearly, 2012 will see Android OEMs up their games and the Wintel combo reunite to finally take a serious stab at the tablet market.How will you manage the onslaught?

PLUS: Find signature reports, such as the InformationWeek Salary Survey, InformationWeek 500 and the annual State ofSecurity report; full issues; and much more.

Table of Contents


Recommended