Information security and mobile applications: overview

Mobile devices have information security requirements that are unique when compared with traditional fixed assets (for example, servers, desktop computers and, to a lesser extent, notebook computers).
Some examples of the differences in mobile devices that affect information security requirements are: It is these and other factors that highlight the importance of designing secure mobile applications.
Many features in the Rational® solution for Collaborative Lifecycle Management are available to help specify the security requirements of a mobile application and verify that they are being met throughout the software delivery lifecycle. For example:

Feedback