Get Instant Access
to This Blueprint

Applications icon

Strengthen the SSDLC for Enterprise Mobile Applications

Tackle secure development techniques to close the gaps on vulnerabilities.

  • CEOs see mobile for employees as their top mandate for upcoming technology innovation initiatives, making security a key competency for development.
  • Unsecure mobile applications can cause your employees to question the mobile applications’ integrity for handling sensitive data, limiting uptake.
  • Secure mobile development tends to be an afterthought, where vulnerabilities are tested for post-production rather than during the build process.
  • Developers lack the expertise, processes, and proper tools to effectively enhance applications for mobile security.

Our Advice

Critical Insight

  • Organizations currently react to security issues. Info-Tech recommends a proactive approach to ensure a secure software development life cycle (SSDLC) end-to-end.
  • Organizations currently lack the secure development practices to provide highly secure mobile applications that end users can trust.
  • Enable your developers with five key secure development techniques from Info-Tech’s development toolkit.

Impact and Result

  • Embed secure development techniques into your SDLC.
  • Create a repeatable process for your developers to continually evaluate and optimize mobile application security for new threats and corresponding mitigation steps.
  • Build capabilities within your team based on Info-Tech’s framework by supporting ongoing security improvements through monitoring and metric analysis.

Strengthen the SSDLC for Enterprise Mobile Applications Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should adopt secure development techniques for mobile application development, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

2. Implement and test secure mobile techniques

Incorporate the various secure development techniques into current development practices.

3. Monitor and support secure mobile applications

Create a roadmap for mobile optimization initiatives.

Strengthen the SSDLC for Enterprise Mobile Applications preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 3-phase advisory process. You'll receive 5 touchpoints with our researchers, all included in your membership.

Guided Implementation 1: Assess secure mobile development processes
  • Call 1: Assess your secure mobile development practices

Guided Implementation 2: Implement and test secure mobile techniques
  • Call 1: Optimize the security of existing mobile applications
  • Call 2: Test the effectiveness of the mobile development techniques

Guided Implementation 3: Monitor and support secure mobile applications
  • Call 1: Identify the metrics to monitor your secured mobile applications
  • Call 2: Optimize your support procedures to address mobile security issues

Authors

Andrew Kum-Seun

Altaz Valani

Kevin Kim

Contributors

  • Dan Cornell, CTO and Principal, Denim Group Ltd.
  • Nicholas Harlow, Director of Product Management, Sencha
  • Jim Ivers, Vice President of Marketing, Cigital
  • Amit Sethi, Principal Consultant, Citigal
  • Emilio Chemali, Director - Business Intelligence & Analytics, MRE Consulting
  • Erik Bjerkelund, Manager of Application Services, Corix
  • John Petterle, Managing Partner, ONE Desktop LLC
  • Andrew Hoog, CEO & Co-Founder, NowSecure

Search Code: 77364
Last Revised: September 8, 2015

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019