INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015
|
|
- Alfred Fields
- 7 years ago
- Views:
Transcription
1 INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015 CHERYL HARRIS, PH.D. DECISIVE ANALYTICS LLC 575 MADISON AVENUE, 10 TH FL NEW YORK, NY January 2015
2 TABLE OF CONTENTS Contents Executive Summary 1 Findings 2 Methodology & Sampling 17 Decisive Analytics LLC 21
3 Executive Summary 1. While mobile security decision makers are well aware of the need to prevent or mitigate targeted attacks, achieving/maintaining regulatory compliance is a close second in terms of priorities. Since many companies are managing multiple compliance standards, ranging from HIPAA, to EU Data Protection, PCI and more, regulatory compliance concerns could well be a primary driver for mobile security adoption in the workplace. 2. Many of the providers of mobile security software were mentioned as among the current vendors being used by managers, including McAfee, Symantec and TrendMicro. Smaller or more specialized vendors mentioned included Good Technology/Bostone, Fiberlink, Airwatch, Samsung KNOX and Zenprise Citrix. While almost a third of smaller companies did not have a provider, most larger companies did. Two-thirds said they were satisfied overall with their current mobile security solution. However, some described several problems with their current solution, and said they were waiting for a "more reliable" and responsive solution that would also provide a cost advantage over current options. 3. Android is targeted as the platform of highest concern, in terms of security threat. All of the major mobile platforms were still seen as worthy of some concern from a security standpoint, and all are in use at most of the companies we included in the study. 4. Interest in the CUPP Computing mobile security solution is high overall, but particularly so among US-based managers. 5. Managers are open to a variety of deployment and procurement options. Larger companies are more likely to prefer self-hosted software in place at their own location, and a centralized procurement option. Still, two-thirds were interested in a "consumerization" model in which direct end-user procurement was enabled. 6. While hopeful that mobile security will become more robust, cost control is still viewed as a primary challenge. Managers are also concerned about convincing their stakeholders that mobile security is a risk or liability that needs to be aggressively addressed. There is also worry that "back doors" to benefit government and/or other commercial interests will compromise mobile security in the future. Page 1
4 Findings Mobile security decisionmakers responding to the survey were reminded that Mobile devices include smartphones and tablets that regularly connect to corporate resources such as , calendar, corporate directory, corporate applications and corporate data in general. Based on this definition, we then asked managers to rate the current priority of several security- related items within their own organization: PRIORITY Achieve and maintain regulatory compliance Prevent and/or mitigate targeted attacks Secure mobile access to corporate applications in the cloud Prevent corporate data loss from mobile devices Deploy mobile anti-malware software % RATING VERY HIGH OR URGENT While all of these issues were a high priority for most of the surveyed managers, preventing or mitigating targeted attacks (68% said it was very high/urgent priority) was ranked the most urgent, followed by achieving and maintaining regulatory compliance (66%.) Managers in US and German companies were significantly more likely to rate both of these issues as a higher priority than were managers in the other countries. Managers within larger companies (1,000 employees or more) were also more concerned than were managers in the smaller organizations. Page 2
5 Compliance requirements related to security differ due to regulations or legal statutes in place in different countries, as well as by industry. Managers reported being subject to multiple compliance requirements, including EU Data Protection, HIPAA, PCI, FISMA, SOX 404 and others. However, nearly two- thirds of the Japanese company managers (64%) said they were subject to none of these, while the US, UK and EU managers reported being required to comply with one or more. Most smaller organizations (<100 employees) did say that they were not required to comply with the mentioned regulatory compliance measures. Page 3
6 Page 4
7 Among the current security software in place at the organizations we surveyed, the most commonly mentioned was McAfee (22%), followed by Symantec (16%.) Interestingly, a third (32%) of the smaller companies (< 100 employees) said they were currently without a security software solution. Page 5
8 Page 6
9 When asked to rank several mobile platforms in order of security concerns, Android was consistently mentioned as the top concern, with almost half (47%) placing it first, followed by Windows phones in second place, then Apple ios and Blackberry. Page 7
10 Page 8
11 We asked a series of questions about how valuable each of four mobile security features were seen to be in the organization. Interestingly, managers varied significantly in terms of their perceptions, depending on the country in which they were working. Mobile security, defined as including Anti- malware, Web Reputation, Firewall, and IPS/IDS features, was seen as highly valuable by most of the managers surveyed (84%.) Nearly as many agreed that Data Protection and Baseline Mobile Device Management was also valuable. While the majority of managers in all countries agreed that all four mobile security features were valuable, French and Japanese managers lagged behind in their agreement. For example, only 70% of the Japanese or French managers said that Mobile Security: Anti malware, web reputation, Firewall, IPS/IDS was quite valuable or extremely valuable, while nearly all German managers (90%), US managers (89%), and UK managers (87%) said so. Larger companies (over 1000 employees) also valued the features more highly than did those from smaller companies. Page 9
12 Extremely/Quite Valuable Mobile Security Feature (Top %) Mobile Security: Anti-malware, Web reputation, Firewall, IPS/IDS 84 Baseline Mobile Device Management: Policy enforcement and compliance 79 Data Protection: Mobile Container, Application Wrapping, Data Loss Prevention 80 About two- thirds of managers said they were satisfied with their current mobile security solution, although French and Japanese managers were the least satisfied. Larger companies (1000 employees and above) were more satisfied with their current solution, and they were also more likely to say they had one in place, than were the smaller organizations. Page 10
13 MOBILE SECURITY FEATURE Mobile Security: Anti-malware, Web reputation, Firewall, IPS/IDS Baseline Mobile Device Management: Policy enforcement and compliance Data Protection: Mobile Container, Application Wrapping, Data Loss Prevention EXTREMELY/QUITE SATISFIED (TOP %) Page 11
14 EVALUTING THE CUPP COMPUTING MOBILE SECURITY SOLUTION We presented respondents with a statement describing a new mobile security solution, followed by a series of evaluative questions: The first hardware security engine for mobile devices is being developed by CUPP Computing. This is a unique hardware-based solution providing mobile security, data encryption, secure communications, anti-malware, web reputation and app behavior analysis for consumer and enterprise. Unlike traditional security software, this is completely independent from the host system as it relies on its own CPU, memory and hardened kernel embedded in a micro-sd module. Patented Technology: The CUPP mobile security engine is a complete self-contained subsystem. It includes a high performance embedded CPU, hardened Linux-based OS, 8 GB of flash and 512 MB of RAM in a micro SD package. It provides a complete stack of security services including firewall, proxy server, DNS filtering, network intrusion detection and prevention, OS integrity monitoring, and remote management. Patented The Technology: statement The was CUPP accompanied mobile by security a prototype engine image is of the CUPP a complete micro- SD self- contained module, subsystem. and we immediately It includes asked a high how interested the respondent would be in the solution, for each of the key mobile security performance embedded CPU, hardened Linux- based OS, 8 areas. GB of flash and 512 MB of RAM in a micro SD package. It provides a complete stack of security services including firewall, proxy server, DNS filtering, network intrusion detection and prevention, OS integrity monitoring, and remote management. Page 12
15 CUPP SOLUTION: MOBILE SECURITY FEATURE Mobile Security: Anti-malware, Web reputation, Firewall, IPS/IDS Baseline Mobile Device Management: Policy enforcement and compliance Data Protection: Mobile Container, Application Wrapping, Loss EXTREMELY/QUITE INTERESTED (TOP %) Interest in the CUPP Computing solution was consistently much higher among US- based managers than in the other four countries, although more than half expressed high interest, and overall, the majority of managers said they were highly interested. Page 13
16 In considering the CUPP Computing mobile security solution, different deployment and procurement options could be available. We assessed interest in several of these: DEPLOYMENT OPTION FOR CUPP SOLUTION Server-side software in the cloud hosted by CUPP Server-side software hosted at your location Server-side software at your location on your appliance Server-side software at your location, as a virtual appliance Other deployment option VERY HIGH/HIGH INTEREST (TOP %) US Managers were the most keenly interested in the option of server- side software hosted at their own location, and the larger companies in the sample also indicated they were most likely to prefer this deployment option. Interest in various procurement options was also assessed: PROCUREMENT OPTION FOR CUPP SOLUTION End-user orders and pays online, then expenses it. Item is shipped to end-user address. Centralized corporate procurement. Item is shipped to company address. Decentralized corporate procurement. Item is shipped to enduser address. Other procurement option VERY HIGH/HIGH INTEREST (TOP %) The most popular procurement option was centralized corporate procurement in which the item is shipped to company locations. Several managers expressed concern about a decentralized corporate procurement option, which was a more common view among larger companies than smaller ones. However, just over two- thirds said they were highly interested in procurement Page 14
17 scenario in which an end- user could purchase the solution and expense it, opening up a consumerization model for companies in which BYOD has become commonplace. CHALLENGES In closing, we asked managers to share their views of the primary challenges for their company or industry in terms of implementing mobile security solutions. Additionally, we asked them to reflect on where they see mobile security technology headed in the future. Cost was frequently mentioned as a key management challenge, particularly in view of tightening resources: I think controlling costs is the primary challenge. I see mobile security becoming more robust in the future.. At the same time, it was recognized that allocating more resources to mobile security was an inevitable step for most companies. Still, a few mentioned that the level of penetration of mobile device usage in their workplace was still relatively low: We do not have this type of concern our critical data does not move across mobile networks; furthermore, our critical data has very low commercial value. Recent revelations concerning government intrusion into computing systems and devices also was an ongoing concern for some. In Europe, one manager noted that: The question will be if these products will really be secure or leave open back doors for government institutions Another said that the data security guidelines are the biggest challenges. In some companies, there is a sense that mobile security software is still not reliable, or able to handle a zero day vulnerability and that sometimes, upper management does not understand the risk presented by mobile device security gaps. Selected Comments: Waiting for new reliable offerings Clouds will be huge in the future, it will differentiate one company from another, device types will increase and security for all will become even more of a challenge That there are constantly new threats, so you need to work with a company that is on top of them. The different devices and OSs and versions. The biggest threat is from advertisers so I'm not sure how security can tie in with huge corporations that steal data when they own the security companies. Preventing all foreign penetration. Mobile security technology will definitely evolve toward a concentration of protections that are essential for proper system function. The lack of time and resources Having an effective system at a low price Page 15
18 Increasingly strict standards in this area will be put in place to fight computer pirates. Complete data security is becoming increasingly important in mobile devices! Each employee can be a risk for the security. It will be difficult to ensure complete security! Regarding cost increases, I think it would be very difficult at this time to get upper management to understand. Little proof of ongoing success; it will have to become much more efficient, less costly and prove- able. It will need to take place by device; there is no way around that. It needs to be more embedded into the phones. Integrating different servers with different operating systems Must be operable and user friendly. Can't be sabotaged and be 100 % reliable. My concern is that these need to be upgradable so that if there is a zero day vulnerability it can be patched. This is a good solution now and I expect more of these in the future. That employees comply with standards and that we properly educate them, supply the tools and also monitor for compliance. Finding a single comprehensive solution that addresses the major issues concerned with mobile security technology like confidentiality or information validity. I think controlling costs is the primary challenge. I see mobile security becoming more robust in the future. Page 16
19 Methodology & Sampling Decisive Analytics LLC was commissioned in 2014 to conduct a series of surveys among IT Decisionmakers in 5 countries: the US, UK, France, Germany and Japan. Decisionmakers working in US- based companies were interviewed in May- June 2014, and the European and Asian interviews were completed in November- December, The purpose of the study was to explore response to CUPP Computing s mobile security solutions, as well as the customer s preferred feature set, likely purchase intent, and other concerns related to mobile security in a diverse range of organizations. The survey was conducted online in partnership with Authentic Response, a specialized IT panel company now owned by international sampling firm Critical Mix. A total of 159 interviews were completed across the five countries, with nearly half (n=76) conducted with US participants, and the rest distributed across the UK, French, German and Japanese participants. Interviews were conducted in English in the US and the UK, but were translated into French (France), German (Germany) and Japanese (Japan) for those phases of the study. Sample was drawn based on the following criteria: Participant must be working in the US, UK, France, Germany or Japan Job Title must be within the Senior Management band (Director or Managing Director, Senior Manager, VP/SVP, CIO, CTO, CSO..) with influence in the area of IT, tech security, and/or selecting appropriate technology for the business unit or corporation. Page 17
20 We sought distribution among a wide range of industry verticals, along with a mix of participant age, location, and company size. The most common primary vertical among companies interviewed was manufacturing, although respondents were drawn from numerous other industries. Page 18
21 Job titles varied among the IT Decisionmakers we recruited, but about a fifth were CIOs (19%), while others said they were Senior Managers (13%), VP- level (13%), held another similar senior management title (13%.) All participants were required to be influential in either making recommendations concerning mobile security solutions in the company or business unit, or primarily or jointly responsible for making decisions about mobile security solutions in the business. Page 19
22 None of the participants were younger than 24, and on average, said they were between 25 and 54 years of age, although a few were older than 55. Page 20
23 Contact Information Cheryl Harris, Ph.D. Chief Research Officer Tel Decisive Analytics LLC 575 Madison Avenue, 10 th Floor, NY NY USA Tel decisiveanalytics.com Page 21
Protecting Corporate Data from Mobile Threats. And the emerging role for microsd-based security Art Swift CEO, CUPP Computing
Protecting Corporate Data from Mobile Threats And the emerging role for microsd-based security Art Swift CEO, CUPP Computing 1 Information security is broken $77B WORLDWIDE SPENDING ON INFORMATION SECURITY
More informationIT Executive and CEO Survey
Mobile Consumerization Trends & Perceptions IT Executive and CEO Survey FINAL REPORT COMPARISONS: WAVES 1 AND 2 PREPARED FOR: TREND MICRO, INC. BY: DECISIVE ANALYTICS, LLC Cheryl Harris, Ph.D. Chief Research
More informationInformation Security for the Rest of Us
Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT
More informationSamsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics
Samsung Solutions for Enterprise Mobility MichailasTraubas Samsung Electronics Baltics Samsung Today Samsung Electronics Baltics Established in 2008 [1999] Employees: 144 people Revenue: 357 mio. USD in
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationMy CEO wants an ipad now what? Mobile Security for the Enterprise
My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationSecure Mobile Solutions
Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationHands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationThe Truth About Enterprise Mobile Security Products
The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing
More informationof firms with remote users say Web-borne attacks impacted company financials.
Introduction As the number of users working from outside of the enterprise perimeter increases, the need for more efficient methods of securing the corporate network grows exponentially. In Part 1 of this
More informationA number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
More informationCyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
More informationW H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored
More informationTop Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology
More informationThe Changing Role of the CIO. An IDC InfoBrief, sponsored by Samsung Canada March 2014
An IDC InfoBrief, sponsored by Samsung Canada March 2014 The Changing Role of the CIO What s most important today? 60% of Top IT Executives identify Improving Staff Productivity as their biggest IT priority
More information= AUDIO. The Importance of Mobile Device Management in HIT. An Important Reminder. Mission of OFMQ 12/9/2015
The Importance of Mobile Device Management in HIT Mario Cruz OFMQ Chief Information Officer An Important Reminder For audio, you must use your phone: Step 1: Call (866) 906 0123. Step 2: Enter code 2071585#.
More informationBring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationIBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
More informationSay Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
More informationSecurity and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com
More informationThe Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
More informationCompanies need integrated mobility management solutions
Spotlight analysis Companies need integrated mobility management solutions January 2014 f This spotlight analysis is based on the PAC trend study Mobile Device & Application Management in Germany, France,
More informationConducting a Risk Assessment for Mobile Devices
Conducting a Assessment for Mobile Devices May 9, 2012 David Frei Director, Digital/Information Security Specialist The Changing Environment Today s Discussion Available Industry Assessment Models Unique
More informationMobile Device as a Platform for Assured Identity for the Federal Workforce
Mobile Device as a Platform for Assured Identity for the Federal Workforce Dr. Sarbari Gupta President and CEO, Electrosoft U.S. Army Information Technology Agency (ITA) Security Forum Fort Belvoir Electrosoft
More informationEnterprise mobile management a need or an option?
perspective Enterprise mobile management a need or an option? - Payal Patel, Jagdish Vasishtha (Jags) Abstract Even as native platforms are growing tighter with security features, the enterprise mobile
More informationKey & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
More informationBYOD in Enterprise Applications and Cloud: Challenges and Market Opportunities 2013-2018
Brochure More information from http://www.researchandmarkets.com/reports/2760581/ BYOD in Enterprise Applications and Cloud: Challenges and Market Opportunities 2013-2018 Description: Bring your own device
More informationFirms Turn To Next- Generation Firewalls To Tackle Evolving IT Threats
A Custom Technology Adoption Profile Commissioned By Fortinet April 2014 1 Firms Turn To Next- Generation Firewalls To Tackle Evolving IT Threats Introduction With the advancement of technology, IT security
More informationMobility Index Report Q4 2014. Report on App, Platform and Device Preferences from the Leader in Secure Mobility
Mobility Index Report Q4 2014 Report on App, Platform and Device Preferences from the Leader in Secure Mobility February 2015 Report on App, Platform and Device Preferences from the Leader in Secure Mobility
More informationHow To Protect Your Employees From Being Hacked By A Corporate Firewall
The case for supporting mobile users with secure remote access Your employees are mobile and your remote support strategy needs to be too - but manage the security risks of remote access tools. A study
More informationAdams County, Colorado
Colorado Independent Consultants Network, LLC Adams County, Colorado Bring-Your-Own-Device Policy Prepared by: Colorado Independent Consultants Network, LLC Denver, Colorado March 20, 2014 Table of Contents
More informationSecurity. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
More informationHow To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)
Plugging the Holes in Mobile Security: The Rising Threat Jennifer M. Pigg, VP of Research, Yankee Group Nick Wade, Group Product Manager, Symantec June 2011 Copyright 2011. Yankee Group Research, Inc.
More informationA number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
More informationSecurity Best Practices for Mobile Devices
Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices
More informationGlobal Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
More informationGETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE
GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE iscan Online 5600 Tennyson Parkway Suite 343 Plano, Tx 75024 Table of Contents Overview... 3 Data Breach Prevention... 4 Choosing
More informationEnterprise on the Go. How enterprises can leverage mobile apps
Enterprise on the Go How enterprises can leverage mobile apps Vivek Narasimhan June 2012 Contents I. Project Scope II. Consumerization of IT drives demand for apps III. Enterprise App Considerations IV.
More informationA Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:
A Channel Company White Paper Online Security Beyond Malware and Antivirus Brought to You By: Abstract Security has always encompassed physical and logical components. But in the face of Bring Your Own
More informationHow Technology Executives are Managing the Shift to BYOD
A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
More informationSichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce
Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013
More informationSecuring Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
More informationBYOD in Enterprise Applications and Cloud Environment: Market Challenge and Opportunity Analysis 2015-2020
Brochure More information from http://www.researchandmarkets.com/reports/3196269/ BYOD in Enterprise Applications and Cloud Environment: Market Challenge and Opportunity Analysis 2015-2020 Description:
More informationBYOD Policy Implementation Guide. February 2016 March 2016
BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...
More informationMobile Device. Management-
Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly
More informationThe Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
More informationThe Dangers of Consumer Grade File Sharing in a Compliance Driven World
The Dangers of Consumer Grade File Sharing in a Compliance Driven World Enterprise data access is spiraling out of control owncloud, Inc. 57 Bedford Street Suite 102 Lexington, MA 02420 United States www.owncloud.com/contact
More informationState of Mobility Survey. France Results
State of Mobility Survey France Results Methodology Survey performed by Applied Research 6,275 global organizations 43 countries NAM 2 LAM 14 EMEA 13 APJ 14 SMBs: Individuals in charge of computers Enterprises:
More information1 0 0 V i l l a g e C o u r t H a z l e t, N J 0 7 7 3 0, U S A Tel: +1 (732) 416-7722 w w w. p a l i n d r o m e t e c h. c o m.
Impart Assurance Instill Trust Inspire Confidence Mike Stauffer Advanced mobile data networks and the promise of accessing mission critical apps anytime from anywhere are two reasons behind the increase
More informationSpikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015
Spikes Mobile Security Research Report Deployed to Spiceworks Voice of IT panel April, 2015 Table of Contents IN THIS REPORT Background & Methodology 3 Executive Summary 4 Detailed Findings 5-17 Mobile
More informationIbrahim Yusuf Presales Engineer at Sophos ibz@sophos.com. Smartphones and BYOD: what are the risks and how do you manage them?
Ibrahim Yusuf Presales Engineer at Sophos ibz@sophos.com Smartphones and BYOD: what are the risks and how do you manage them? Tablets on the rise 2 Diverse 3 The Changing Mobile World Powerful devices
More informationThe Challenges Posed by BYOD.
The Challenges Posed by BYOD. The Challenges Posed by BYOD.... 1 Introduction... 3 Primary Bring Your Own Device Challenges... 3 Enable Workers to Securely Accomplish Business Tasks... 4 Managing Multiple
More informationPassword Management Evaluation Guide for Businesses
Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various
More informationIT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationDNS Server Security Survey
EXECUTIVE BRIEF DNS Server Security Survey Sponsored by: EfficientIP Romain Fouchereau June 2014 INTRODUCTION With most organizations having some business linked to and more importantly relying on an online
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationWhy Email Encryption is Essential to the Safety of Your Business
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
More informationEnterprise mobility trends 2015 and beyond
Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources
More informationIf you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
More informationCyberoam Perspective BFSI Security Guidelines. Overview
Overview The term BFSI stands for Banking, Financial Services and Insurance (BFSI). This term is widely used to address those companies which provide an array of financial products or services. Financial
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationEnterprise Mobility Management
Enterprise Mobility Management Vodafone Global Enterprise Vodafone Power to you Delivering the truly mobile enterprise A Ready Business is truly connected allowing you to be ready for almost anything by
More informationBYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com
More informationWhich is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO
Which is the Right EMM: Enterprise Mobility Management Craig Cohen - President & CEO Adam Karneboge - CTO Mobile is strategic for business Mobile provides a beeer experience Mobile changes the way people
More informationSecuring Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
More informationPULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
More informationBYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere
More informationWhite Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
More informationCloud email Security solutions
Cloud email Security solutions THE MARKET OPPORTUNITY KEY MESSAGES The security market is a very dynamic and evolving market - Threats are rapidly increasing in sophistication and severity - New technologies,
More informationGetting Started with the iscan Online Data Breach Risk Intelligence Platform
Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing
More informationHi and welcome to the Microsoft Virtual Academy and
Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering
More informationMobility in Business Report
Mobility in Business Report Prepared by: Citrix and Vanson Bourne www.citrix.com Executive Summary Mobility continues to change the way we do business at a dramatic rate. Ten years ago, no one was talking
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationNetwork Security in Building Networks
Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationSAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts
SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance
More informationSecuring Mobile Apps in a BYOD World
SAP Thought Leadership Paper Mobile App Security Securing Mobile Apps in a BYOD World Protecting Apps Makes You More Responsive to Demands for Enterprise Mobility Table of Contents 4 The Mobile App Tsunami
More informationHow Nokia deployed AirWatch MDM for Nokia Lumia
How Nokia deployed AirWatch MDM for Nokia Lumia Case Study 2 Contents 1 Challenge...3 1.1 AirWatch MDM pilot...3 1.2 Challenge of full MDM deployment...4 2 Preparing for deployment...6 2.1 Lessons learned
More informationDOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
More informationMalware and Other Malicious Threats
21 August Thailand Securing Your Endpoints from Malware and Other Malicious Threats Steven Scheurmann Sales Leader, Tivoli Endpoint Management Products, built on BigFix, IBM Software Group, Asia Pacific
More informationEnterprise Mobility: The Impact of Changing Employee Behaviour
Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility richard.absalom@ovum.com / @RichAbsalom 23 April 2015 1 About Ovum Leading independent
More informationSamsung SDS. Enterprise Mobility Management
Samsung SDS Enterprise Mobility Samsung SDS Enterprise Mobility Faster and Safer Samsung SDS Enterprise Mobility provides stronger security for enterprise mobility without Compromising usability of mobile
More informationSTATE OF NEW JERSEY IT CIRCULAR
NJ Office of Information Technology P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 River View E. Steven Emanuel, Chief Information Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT CIRCULAR
More informationAnalyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
More informationSay Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices
Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices Introduction Bring Your Own Device (BYOD) and consumerization of IT are all phrases that serve to encompass
More informationThe Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow
Addressing Security And Performance How Your Enterprise is Impacted Today and Tomorrow THE CLOUD: SECURED OR NOT? IN A STUDY BY MICROSOFT, 51 percent of companies who moved to the cloud said that since
More informationEMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
More informationThe Challenges of Securing Hosting Hyper-V Multi-Tenant Environments
#1 Management and Security for Windows Server and Hyper-V The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments by Brien M. Posey In the not too distant past, VMware was the hypervisor of
More informationHow to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
More informationFive Steps to Android Readiness
Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and
More informationCloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
More informationCLOUD SECURITY: Secure Your Infrastructure
CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED
More informationHOSTING. Managed Security Solutions. Managed Security. ECSC Solutions
Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT
More information