Is your organization developing its own custom applications specifically for mobile devices? (Percent of respondents, N=242)
|
|
- Roderick Wiggins
- 8 years ago
- Views:
Transcription
1 Solution Brief Check Point Capsule for Mobile Computing Security, Operations Efficiency, and Business Enablement Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore, Research Associate Abstract: Organizations are increasingly reliant on mobile devices for BYOD and business process improvement, but mobile security continues to lag behind. Point tools provide some help for IT operations but they don t provide a true enterprise-class mobile security solution. Check Point Capsule is a refreshing alternative that may actually bridge the enterprise mobile security gap. Why? Check Point Capsule is one of few mobile security products that provides threat prevention, document-level data security controls, and granular access controls that can mitigate security risks while enabling mobile business processes. Overview Mobile computing is no longer a fad recent ESG research data shows that 87% of enterprise organizations say mobile computing is either critical or very important for supporting business processes and employee productivity. 1 While access and calendars are common mobile applications, many organizations are now developing and deploying new types of applications to bolster employee productivity or improve customer relations. In fact, ESG research indicates that 42% of enterprises are actively developing a significant number of mobile applications themselves (see Figure 1). Figure 1. Development of Custom Mobile Applications Is your organization developing its own devices? (Percent of respondents, N=242) devices but we plan to do so within the next 24 months, 10% devices but we are interested in doing so in the future, 4% Yes, my organization is developing a modest amount of its own devices, 38% devices and we have no plans or interest in doing so in the future, 5% Yes, my organization is developing a significant amount of its own devices, 42% Source: Enterprise Strategy Group, Source: ESG Research Report, The State of Mobile Computing Security, February All ESG research references and charts in this brief have been taken from this research report.
2 Enablement 2 Clearly, mobile computing devices such as tablet computers and smartphones have supplanted PCs as the primary user devices and are poised to dominate end-user computing in the future. Mobile Computing Security Challenges Remain In spite of a seemingly unlimited number of business benefits, mobile computing also comes with numerous security concerns as it introduces new devices and new threat vectors to enterprise organizations. These risks are already creating security havoc. According to ESG research, 47% of enterprise respondents indicated that they have experienced security breaches as a result of a compromised mobile device. Why are these security breaches occurring? Mobile computing is still a nascent IT domain but it is evolving at a frantic pace. Furthermore, mobile computing is distributed and constantly changing by its very nature. Finally, mobile devices are often lost or stolen and thus breached. Beyond security breaches however, security professionals also find mobile computing security particularly vexing. In fact, ESG research indicates that enterprise organizations face an assortment of mobile security challenges such as (see Figure 2): Protecting sensitive data at rest and in flight. A significant number of security professionals (43%) claim that it is challenging to protect confidential data when it is accessed from a mobile device while 41% say it is challenging to protect sensitive data when it is stored on a mobile device itself. This is certainly understandable as mobile computing can create blind spots where the security team can t monitor or manage sensitive data once it is accessed and stored on mobile devices. To paraphrase an old management adage, you can t secure what you can t see. Enforcing security policies. Many security policies were originally created with PCs and wired Ethernet ports in mind. While the proliferation of Wi-Fi access networks stretched traditional security policies beyond their original boundaries, mobile computing adds additional challenging dimensions that fall way outside of the legacy policy spectrum. Why? Unfortunately, many organizations find that the only way to address policy enforcement is by implementing new tools and infrastructure for mobile computing security. This creates additional technology complexities and operational overhead for an already overwhelmed security team. Integrating mobile security into existing cybersecurity processes and technologies. As organizations create a mobile security overlay infrastructure, it becomes increasingly difficult to maintain consistent policies, coordinate enforcement actions, or monitor users and devices across the network. This will likely improve as mobile security matures but CISOs are asking a legitimate question: Why can t mobile security be managed with existing tools and processes? This is a logical question since mobile devices are IP-based and access the same resources as other systems. Given this, it makes sense to manage the nuances of mobile computing with tried-and-true approaches if this is possible.
3 Enablement 3 Figure 2. Mobile Computing Security Challenges Overall, which of the following would you say are the biggest challenges around mobile computing security at your organization? (Percent of respondents, N=242, multiple responses accepted) Protecting data confidentiality and integrity when sensitive data is accessed by a mobile device over the network Protecting data confidentiality and integrity when sensitive data is stored on a mobile device 43% 41% Enforcing security policies for mobile devices 41% Integrating mobile device security processes and technologies with other enterprise security processes and technologies Educating users on best practices for mobile computing security Establishing the right workflows and processes between the security team and other IT groups 36% 35% Managing malware/threat management on mobile devices Ensuring that staff members have proper training and skills on mobile device security Dealing with lost/stolen mobile devices containing sensitive data 33% Supporting new device types 31% Creating security policies for mobile devices Dealing with scale issues caused by the sheer number (i.e., hundreds, thousands) of mobile devices to protect/secure 29% 28% Discovering mobile devices as they gain access to the network 21% None of the above 2% 0% 10% 20% 30% 40% 50% Source: Enterprise Strategy Group, 2014.
4 Enablement 4 What s Really Needed for Mobile Computing Security? CISOs are being asked to support BYOD, embrace new mobile applications for business process improvement, and make sure to mitigate new mobile computing risks. Regrettably, accomplishing these goals can be quite cumbersome when they require new skills, processes, and tools simultaneously. Rather than layer-on discrete mobile-only security solutions, large organizations may be better off by extending their existing security controls that support mobile-friendly functionality. To accomplish this task, security professionals must look for mobile security platforms providing: Unified policy management across all mobile devices. Tablet computers, smartphones, and PCs are different types of end-user computing devices but, as the ESG data indicates, security becomes difficult when different devices are managed with different policies and enforcement points. To bridge this gap, enterprises need security tools that support a wide variety of mobile devices while offering device-specific options for policy creation, management, monitoring, and enforcement. With a unified policy management platform across device types, security professionals can create and enforce security policies based upon business processes and users rather than remain in the technical weeds at the ios or Android level. Strong document-centric data security. When it comes to data, most mobile computing security remains elementary, offering VPN capabilities, storage encryption, or partitioning methods like containerization. These security controls are critical to establish a secure business environment on mobile devices but mobile security should also enforce policies at the document level as well. For example, it may be okay to access and view sensitive data in a spreadsheet on an ipad, but unacceptable to share this document with others. Mobile security tools must provide granular access controls and digital rights management (DRM) for what can and can t be done on a document-by-document basis throughout each document s lifecycle. Granular access policy enforcement. To balance business productivity and IT risk, authorized mobile users should have seamless connections to key applications supported by granular access controls for high-value IT assets and sensitive data. For example, the CFO will always have seamless access to end-of-month reports from the corporate LAN regardless of the device she uses. Alternatively, some organizations may want to preclude this type of access when she tries to access documents from a public network, geographic locations, or various timeframes like the end of the quarter. The key here is being able to enforce these policies across several parameters like user, device, document sensitivity, etc. Threat management. Mobile malware isn t considered an enterprise threat vector today but it likely will be in the future. Many organizations already block PCs from accessing malicious URLs or downloading suspicious files so why not extend these best practices to mobile devices as well? Enterprises should prepare for this eventuality with the right controls and monitoring capabilities for threat prevention, detection, and response sooner rather than later. While all of this security functionality is critical, leading CISOs also recognize that they need security tools that are intuitive, easy to deploy and integrate, and deliver immediate value. The goal? Help the overworked security staff work smarter not harder. It s a given that large organizations need strong security efficacy but security technologies that can accomplish this goal AND streamline operations will go to the head of the line. Introducing Check Point Capsule A lot of mobile security options have come from new vendors with a sole focus on mobile devices but this myopic coverage isn t extensive enough for enterprise organizations and can create operational overhead as previously described. Check Point Software, a recognized leader in enterprise security, intends to alleviate these issues with the announcement of Check Point Capsule. Check Point is focused on bridging the mobile security gap as Capsule offers: Mobile threat management. Check Point Capsule allows organizations to extend corporate security policies to mobile devices via a secure cloud. This can be used for an assortment of security functions such as
5 Enablement 5 denying access to malicious files, blocking malicious websites, and preventing C&C communications with malicious hosts. In this way, Check Point can help CISOs implement best practices for threat management in the mobile world, just as most organizations do today for protecting employees, PCs, and sensitive data. Secure business environment. Mobile devices have two major functions: personal use and professional use. Check Point Capsule segregates the business data and applications from the personal data and applications, allowing users to seamlessly access business apps without sacrificing ease-of-use or device performance. This also helps mitigate risk because it protects corporate networks and assets from nefarious consumeroriented software. Protect business documents. Check Point Capsule allows organizations to customize how they secure their documents, regardless of where they go. Features include native password-protection, specifying a list of authorized recipients, and document encryption that stay with the document throughout its lifecycle. In this way, Check Point takes mobile data security beyond basic encryption by introducing business-centric DRM into the mix. Check Point s announcement is well timed as many organizations are in the early stages of the mobile security maturity curve and CISOs want mobile security rather than IT operations technologies to mitigate risk. Just as important, Check Point Capsule brings Check Point s security management and operations prowess to mobile security, aligning ease-of-use with strong security. Given these business, operations, and security benefits, Check Point Capsule could be in the right place at the right time. The Bigger Truth The onslaught of mobile devices has made security more difficult for enterprise organizations and, unfortunately, the security industry addressed this increasing security challenge with an army of add-on point tools. This has created a mobile security gap along with an operations nightmare. Furthermore, mobile security tools provide basic data confidentiality and integrity protection but they lack granular access policies or DRM-like capabilities at a document level. Check Point clearly recognized those concerns and is now introducing a unique top-to-bottom mobile computing solution that can help organizations bolster mobile security, lower IT risk, and align business-centric security policies with granular controls. Given these advantages, CISOs would be well served by investigating Check Point Capsule and assessing how it aligns with their mobile computing business and security needs. This ESG brief was commissioned by Check Point and is distributed under license from ESG. All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at
ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,
More informationThe Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations
More informationVirtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Virtual Patch Management Offers Automation, Availability, and Cost Benefits Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Timely patch management is a security best practice,
More informationAddressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
More informationUtilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
More informationCisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS)
White Paper Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS) By Jon Oltsik, Senior Principal Analyst October 2014 This ESG White
More informationThe Network Application Security Architecture Requirement
White Paper The Network Application Security Architecture Requirement By Jon Oltsik March, 2011 This ESG White Paper was commissioned by Juniper Networks and is distributed under license from ESG. 2011,
More informationWhite. Paper. Cloud Computing Demands Enterprise- class Password Management and Security. April 2013
White Paper Cloud Computing Demands Enterprise- class Password Management and Security By Jon Oltsik, Senior Principal Analyst April 2013 This ESG White Paper was commissioned by McAfee (a Division of
More informationWhite. Paper. Rethinking Endpoint Security. February 2015
White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed
More informationThe State of Mobile Computing Security
Research Report Abstract: The State of Mobile Computing Security By Jon Oltsik, Senior Principal Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager February 2014
More informationResearch Perspectives
Research Perspectives Paper Network Security Operations and Cloud Computing By Jon Oltsik, Senior Principal Analyst April 2015 This ESG Research Perspectives Paper was commissioned by Tufin and is distributed
More informationInformation-driven Security and RSA Security Analytics and RSA ECAT
White Paper Information-driven Security and RSA Security Analytics and RSA ECAT By Jon Oltsik, Senior Principal Analyst September 2014 This ESG White Paper was commissioned by RSA, The Security Division
More informationHow To Understand The Needs Of The Network
White Paper The Modern Network Monitoring Mandate By Bob Laliberte, Senior Analyst April 2014 This ESG White Paper was commissioned by Emulex and is distributed under license from ESG. White Paper: The
More informationData- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
More informationThreat Intelligence and Its Role Within Enterprise Cybersecurity Practices
Research Report Abstract: Threat Intelligence and Its Role Within Enterprise Cybersecurity Practices By Jon Oltsik, Senior Principal Analyst With Bill Lundell, Senior Research Analyst and Jennifer Gahm,
More informationTotal year-over-year spending change in networking, 2009-2012. (Percent of respondents) 37% 36% 35% 37% 29% 26% 16% 13% 0% 20% 40% 60% 80%
Research Brief 2012 Networking Spending Trends Date: March 2012 Author: Jon Oltsik, Senior Principal Analyst; Bob Laliberte, Senior Analyst; and Bill Lundell, Senior Research Analyst Abstract: According
More informationThe Challenge of Securing and Managing Data While Meeting Compliance
ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst
More informationIBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already
More informationWhite. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013
White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed
More informationReducing the Critical Time from Incident Detection to Containment
White Paper Reducing the Critical Time from Incident Detection to Containment By Jon Oltsik, Senior Principal Analyst May 2014 This ESG White Paper was commissioned by Bradford Networks and is distributed
More informationCompensating Security Controls for Windows Server 2003 Security
ESG Solution Showcase Compensating Security Controls for Windows Server 2003 Security Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: It is common knowledge by now that Microsoft
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationVMware and the Need for Cyber Supply Chain Security Assurance
White Paper VMware and the Need for Cyber Supply Chain Security Assurance By Jon Oltsik, Senior Principal Analyst September 2015 This ESG White Paper was commissioned by VMware and is distributed under
More informationEnterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
More informationThis ESG White Paper was commissioned by Blue Coat and is distributed under license from ESG.
White Paper Network Encryption and its Impact on Enterprise Security By Jon Oltsik, Senior Principal Analyst February 2015 This ESG White Paper was commissioned by Blue Coat and is distributed under license
More informationRSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
More informationFigure 1. Number of Successful Malware Attacks Suffered in the Last 24 Months
ESG Brief Strong Cyber Protection: Keeping Bad Stuff Out and Good Stuff In Date: November 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Malicious activity and threats are growing in volume,
More informationSavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM
ESG Solution Showcase SavvyDox: Next-generation Collaboration Bridges the Space Between EFSS and ECM Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract:
More informationNext-generation Security Architecture for the Enterprise
White Paper Next-generation Security Architecture for the Enterprise By Jon Oltsik, Senior Principal Analyst October 2014 This ESG White Paper was commissioned by Palo Alto Networks and is distributed
More informationSecure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst
ESG Lab Review Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst Abstract: Organizations are challenged in today
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationSecure Document Sharing & Online Workspaces for Financial Institutions
Secure Document Sharing & Online Workspaces for Financial Institutions By Adi Rupin, CTO A WatchDox White Paper February 2012 The challenge Maintaining document security is critical for financial institutions
More informationWhite. Paper. Evaluating Sync and Share Solutions. Balancing Security, Control, and Productivity. September, 2014
White Paper Evaluating Sync and Share Solutions Balancing Security, Control, and Productivity By Terri McClure, Senior Analyst September, 2014 This ESG White Paper was commissioned by Code42 and is distributed
More informationAndroid for Work powered by SOTI
Android for Work powered by SOTI Work The Way You Live Secure Enterprise Mobility Management Android for Work powered by SOTI transforms workplace mobility with enhanced security, consistent management
More informationCybersecurity Skills Shortage: A State of Emergency
Enterprise Strategy Group Getting to the bigger truth. ESG Brief Cybersecurity Skills Shortage: A State of Emergency Date: February 2016 Author: Jon Oltsik, Principal Analyst, Doug Cahill, Senior Analyst,
More informationWhite. Paper. The Converged Network. November, 2009. By Bob Laliberte. 2009, Enterprise Strategy Group, Inc. All Rights Reserved
White Paper The Converged Network By Bob Laliberte November, 2009 2009, Enterprise Strategy Group, Inc. All Rights Reserved White Paper: The Converged Network 2 Contents Introduction... 3 What s Needed...
More informationWHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them
Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for
More informationEMBRACING SECURE BYOD
EMBRACING SECURE BYOD Acronis 2002-2014 Introduction The Bring Your Own Device (BYOD) movement has evolved from a buzzword and a trend to a full-fledged corporate phenomenon. Tablets and smartphones have
More informationGetting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions
White Paper Getting on the Road to SDN Attacking DMZ Security Issues with Advanced Networking Solutions By Bob Laliberte, Senior Analyst March 2014 This ESG White Paper was commissioned by NEC and is distributed
More informationSecure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst
ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access
More informationSay Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
More informationAn Analytics-based Approach to Cybersecurity
ESG Solution Showcase An Analytics-based Approach to Cybersecurity Date: May 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Since the Google Aurora incident announced in 2010, large organizations
More informationThe ESG Cybersecurity Maturity Model
ESG Brief The ESG Cybersecurity Maturity Model Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: As part of its research, ESG regularly uses a scoring system to divide survey populations
More informationBell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
More informationWhite. Paper. Building Next Generation Data Centers. Implications for I/O Strategies. August 2014
White Paper Building Next Generation Data Centers Implications for I/O Strategies By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned by Emulex and is distributed under license
More informationHow To Integrate Identity And Security With A Network-Based Business Process
INFORMATION SECURITY BRIEF Business Enablement Demands Tight Identity and Security Integration Date: April 2009 Author: Jon Oltsik, Principal Analyst Abstract: Identity management and security were once
More informationMobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them
Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for
More informationSpikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015
Spikes Mobile Security Research Report Deployed to Spiceworks Voice of IT panel April, 2015 Table of Contents IN THIS REPORT Background & Methodology 3 Executive Summary 4 Detailed Findings 5-17 Mobile
More informationVaronis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst
ESG Brief Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With the burgeoning workplace mobility
More informationAdvanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: In spite of marginal progress, privileged accounts
More informationResearch Report. Abstract: The Evolution of Server Virtualization. November 2010
Research Report Abstract: The Evolution of Server Virtualization By Mark Bowker and Jon Oltsik With Bill Lundell, John McKnight, and Jenn Gahm November 2010 2010 Enterprise Strategy Group, Inc. All Rights
More informationWhite. Paper. The Big Data Security Analytics Era Is Here. January 2013
White Paper The Big Data Security Analytics Era Is Here By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by RSA Security and is distributed under license from
More informationEnterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts
Enterprise Strategy Group Getting to the bigger truth. By Bill Lundell, Senior Research Analyst and John McKnight, VP Research and Analysts March 2015 4 Cloud Computing: Not a Question of If, but Rather
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationFive Best Practices for Secure Enterprise Content Mobility
A N A C C E L L I O N W H I T E P A P E R Five Best Practices for Secure Enterprise Content Mobility Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com
More informationSecurity Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Security Intelligence: A Key Component of Big Data Security Analytics Date: December 2012 Author: Jon Oltsik, Senior Principal Analyst Abstract: The intersection of big data and security analytics
More informationSay Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices
Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices Introduction Bring Your Own Device (BYOD) and consumerization of IT are all phrases that serve to encompass
More informationThe New Workplace: Supporting Bring your own
IBM Global Technology Services Thought Leadership White Paper December 2011 The New Workplace: Supporting Bring your own 2 The New Workplace: Supporting Bring your own Contents 2 Consumerization takes
More informationWhite. Paper. Endpoint Security Demands Defense-indepth and Advanced Analytics. November 2013
White Paper Endpoint Security Demands Defense-indepth and Advanced Analytics By Jon Oltsik, Senior Principal Analyst November 2013 This ESG White Paper was commissioned by Bit9 and is distributed under
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More informationWhite. Paper. Understanding and Addressing APTs. September 2012
White Paper Understanding and Addressing APTs By Jon Oltsik, Senior Principal Analyst September 2012 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG. 2012,
More information5 Things You Need to Know About ipad in the Enterprise
5 Things You Need to Know About ipad in the Enterprise Introduction Without a doubt, ipads are one of the fastest adopted computing platforms in history. And, not just for consumers desiring to play Angry
More informationCA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
More informationMobile Application Management: Unlock the Value of Enterprise Mobility
Mobile Application Management: Unlock the Value of Enterprise Mobility Enterprise mobility strategies that are centered on device management are archaic. In today s enterprises, app-centric approaches
More informationMarket Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik
Market Research Study Database Security and Compliance Risks By Jon Oltsik December, 2009 An ESG Market Research Study Sponsored by Application Security, Inc. 2009, Enterprise Strategy Group, Inc. All
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationThe Benefits of a Hybrid Security Architecture
White Paper The Benefits of a Hybrid Security Architecture By Jon Oltsik, Senior Principal Analyst November, 2011 This ESG White Paper was commissioned by Blue Coat Systems, Inc, and is distributed under
More informationMulti-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationWhite. Paper. The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications
White Paper The Application Deluge and Visibility Imperative: How to ensure network performance for your business-critical applications By Bob Laliberte, Senior Analyst November 2013 This ESG White Paper
More informationWhite. Paper. Citrix XenDesktop Eases Windows 7/8.1 Migration. October 2013
White Paper Citrix XenDesktop Eases Windows 7/8.1 Migration By Mark Bowker, Senior Analyst October 2013 This ESG White Paper was commissioned by Citrix and is distributed under license from ESG. 2013 by
More informationIntegrated Network Security Architecture: Threat-focused Nextgeneration
White Paper Integrated Network Security Architecture: Threat-focused Nextgeneration Firewall By Jon Oltsik, Senior Principal Analyst September 2014 This ESG White Paper was commissioned by Cisco Systems
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More information... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
More informationSo, you need a mobility strategy Five things you must do. David P Merrill Senior Technical Staff Member June 2012
So, you need a mobility strategy Five things you must do. David P Merrill Senior Technical Staff Member June 2012 Mobile is a major driver in the evolution of computing Employees Mobile/Wireless/Cloud
More information2010 Networking Spending Trends Date: February 2010 Author: Jon Oltsik, Principal Analyst
ESG Research Brief 2010 Networking Spending Trends Date: February 2010 Author: Jon Oltsik, Principal Analyst Abstract: In general terms, spending on networking equipment will be better than last year but
More informationForeScout CounterACT. Continuous Monitoring and Mitigation
Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More informationVDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI
White Paper VDI-Centric Endpoint Security Can Help Lower Costs and Increase ROI By Jon Oltsik, Senior Principal Analyst June 2012 This ESG White Paper was commissioned by Trend Micro and is distributed
More informationSANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
More informationWhite. Paper. EMC Isilon: A Scalable Storage Platform for Big Data. April 2014
White Paper EMC Isilon: A Scalable Storage Platform for Big Data By Nik Rouda, Senior Analyst and Terri McClure, Senior Analyst April 2014 This ESG White Paper was commissioned by EMC Isilon and is distributed
More informationDelivering Control with Context Across the Extended Network
Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationThe flexible workplace: Unlocking value in the bring your own device era
IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring
More informationKey Considerations in Enterprise File Sharing Gurinder Dhillon, Sr. Director Product Management Ankur Shah, Sr. Product Manager
Key Considerations in Enterprise File Sharing Gurinder Dhillon, Sr. Director Product Management Ankur Shah, Sr. Product Manager 1 Agenda Evolution of EFSS Employee Experience Enterprise Security Expectations
More informationTrends in Private Cloud Infrastructure
Research Report Abstract: Trends in Private Cloud Infrastructure By Mark Bowker, Senior Analyst and Bill Lundell, Senior Research Analyst With Jennifer Gahm, Senior Project Manager April 2014 Introduction
More informationWhere is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.
Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution. TABLE OF CONTENTS WELCOME INTRODUCTION... 1 TIP 1:... 4 Ensure Ease-of-Use TIP 2:... 6 Empower Secure
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationMOBILITY IN ENTERPRISE ASSET MANAGEMENT SOFTWARE
MOBILITY IN ENTERPRISE ASSET MANAGEMENT SOFTWARE A study conducted by IFS North America APRIL, 2013 THE CURRENT STATE OF THE INDUSTRY BASED ON A SURVEY OF MORE THAN 200 EXECUTIVES METHODOLOGY In early
More informationWhite. Paper. The Rise of Network Functions Virtualization. Implications for I/O Strategies in Service Provider Environments.
White Paper The Rise of Network Functions Virtualization Implications for I/O Strategies in Service Provider Environments By Bob Laliberte, Senior Analyst August 2014 This ESG White Paper was commissioned
More informationTHE TOP 6 TOOLS USERS NEED FOR MOBILE FILES AND HOW TO PROVIDE THEM SECURELY. White Paper
THE TOP 6 TOOLS USERS NEED FOR MOBILE FILES AND HOW TO PROVIDE THEM SECURELY White Paper 2 The Top 6 Tools Users Need for Mobile Files And How to Provide Them Securely Executive Summary The more things
More informationEnterprise Mobility Management
Enterprise Mobility Management Security Without Compromising User Experience SESSION ID: SPO2-R03 Brian Robison Principal Technology Evangelist, XenMobile Citrix Systems, Inc. Providing the freedom to
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationKEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE
KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE There s been lots of buzz about the tsunamis of change hitting IT. Talk of pivoting to the cloud, the growing mobile workforce, and the Internet of Things
More informationBYOD Security Challenges in Education: Protect the Network, Information, and Students
BYOD Security Challenges in Education: What You Will Learn The influx of personal smartphones and tablets on campus, and the resulting data deluge, imposes a new set of security challenges. This white
More informationFive Best Practices for Secure Enterprise Content Mobility. Whitepaper Five Best Practices for Secure Enterprise Content Mobility
Five Best Practices for Secure Enterprise Content Mobility An Accellion Whitepaper Five Best Practices for Secure Enterprise Content Mobility Executive Summary The proliferation of mobile devices and IT
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More information