BYOD & MOBILE SECURITY

Size: px
Start display at page:

Download "BYOD & MOBILE SECURITY"

Transcription

1 2013 surve y results BYOD & MOBILE SECURITY Group Partner Information Security Sponsored by Symantec KPMG Zimbani MailGuard

2 INTRODUCTION Welcome to the 2013 BYOD & Mobile Security Report! Bring Your Own Device (BYOD) is a popular topic this year as more companies are adopting employee-owned mobile devices (or deciding against it for security and data control reasons). The 160,000 member Information Security Community on LinkedIn conducted the survey BYOD & Mobile Security 2013 to shed some light on the drivers for BYOD, how companies will benefit from BYOD, and how they respond to the security risks associated with this trend. Share the Report The results are in - we received more than 1,600 responses and found interesting insights into BYOD adoption patterns and mobile security practices. We hope you will enjoy the report. Thanks to everyone who participated in the survey! Holger Schulze Group Owner, Information Security Community hhschulze@gmail.com BYOD & MOBILE SECURITY Read the 2013 survey results 1

3 SURVEY HIGHLIGHTS Top-5 Trends in BYOD & Mobile Security The number one benefit of BYOD is greater employee satisfaction and productivity. A majority of companies are concerned about loss of and unauthorized access to data. Encryption is the most used risk control measure for mobile devices. 4 The biggest impact of mobile security threats is the need for additional IT resources to manage them. 5 The most popular mobile business applications are , calendar and contact management. The most popular mobile platform for BYOD is ios/apple. BYOD & MOBILE SECURITY Read the 2013 survey results 2

4 Q1 WHAT ARE THE MAIN DRIVERS and benefits of BYOD for your company? The top-3 drivers for BYOD are all about keeping employees happy and productive: greater employee satisfaction (55 percent), improved employee mobility (54 percent) and increased employee productivity (51 percent). What are the main drivers and expected benefits of BYOD for your company? Greater employee satisfaction Improved employee mobility Increased employee productivity Reduced device/endpoint hardware costs Reduced operational support costs 0% 20% 40% 60% BYOD & MOBILE SECURITY Read the 2013 survey results 3

5 Q2 Which is your organization s BYOD policy? While a slim majority of organizations support company-owned devices, BYOD is clearly on everyone s radar. Which of the following describes your organization s overall policy towards privately-owned and company-owned mobile devices for business use? Company-owned devices are widely used BYOD is under evaluation Privately-owned devices are in very limited use Privately-owned devices are widely in use, but not supported by the organization Privately-owned devices are widely in use and supported through a BYOD policy There are currently no plans to use private devices within the next 12 months We plan to allow private devices within the next 12 months 0% 10% 20% 30% 40% BYOD & MOBILE SECURITY Read the 2013 survey results 4

6 Q3 concerns related to BYOD? What are your main security BYOD causes significant security concerns: Loss of company or client data (75 percent), unauthorized access to company data & systems (65 percent) and fear of malware infections (47 percent) top the list. What are your main security concerns related to BYOD? Loss of company or client data Unauthorized access to company data and systems Malware infections Lost or stolen devices Device management Compliance with industry regulations Support & maintenance None 0% 20% 40% 60% 80% BYOD & MOBILE SECURITY Read the 2013 survey results 5

7 Q4 What negative impact did mobile threats have on your company? The biggest impact of mobile security threats is the need for additional IT resources to manage them (33 percent). And 28 percent of respondents report no negative impact from mobile threats in the past 12 months. What negative impact did mobile threats have on your company in the past 12 months? Additional IT resources needed to manage mobile security Corporate data loss or theft Cost of cleaning up malware infections Increased helpdesk time to repair damage Don t know Disrupted business activities Reduced employee productivity Increased cost due to devices subscribed to premium pay-for-services The company had to pay regulatory fines None 0% 5% 10% 15% 20% 25% 30% 35% BYOD & MOBILE SECURITY Read the 2013 survey results 6

8 Q5 does your company support? Which mobile platforms The most popular mobile platform for BYOD is ios/apple (72 percent). Which mobile platforms does your company support? ios / Apple Android / Google RIM / Blackberry Windows / Microsoft None All other responses 0% 10% 20% 30% 40% 50% 60% 70% 80% BYOD & MOBILE SECURITY Read the 2013 survey results 7

9 Q6 Which company policies DO you have in place for mobile devices? Central management of mobile devices and applications (39 percent) tops the list of BYOD policies and procedures currently in place. 32 percent of organizations say they do not have any policies or procedures in place. Central management of mobile devices and applications Which company policies and procedures do you have in place for mobile devices? Employee training Detailed BYOD policies None 0% 10% 20% 30% 40% BYOD & MOBILE SECURITY Read the 2013 survey results 8

10 Q7 are in place for mobile devices? Which risk control measures Mandatory use of encryption (40 percent) is the most used risk control measure for mobile devices. 34 percent of organizations say they have no risk control measures in place. Which risk control measures are in place for mobile devices? Mandatory use of encryption Endpoint Integrity Checking Auditing of mobile devices Attack and penetration testing of mobile applications None 0% 10% 20% 30% 40% BYOD & MOBILE SECURITY Read the 2013 survey results 9

11 Q8 property and sensitive data stored? Where is most of your intellectual 85 percent of organizations have most of their intellectual property and sensitive data stored in the datacenter/network. Where is most of your intellectual property and sensitive data stored? Datacenter / Network Device / Endpoint Cloud 0% 20% 40% 60% 80% 100% BYOD & MOBILE SECURITY Read the 2013 survey results 10

12 What type of intellectual property Q9& sensitive data are you most concerned about? 77 percent of organizations are most concerned about protecting business and employee data. What type of intellectual property and sensitive data are you most concerned about? Business and employee data (in databases, apps, etc) Documents s Contacts Images Text messages Voice conversations 0% 20% 40% 60% 80% BYOD & MOBILE SECURITY Read the 2013 survey results 11

13 Q10 Which tools are used to monitor and govern the handling of mobile devices? Mobile device management tools (MDM) are most frequently used by 40 percent of organizations to monitor and govern mobile devices. 22 percent of organizations say they have no tools to monitor and govern mobile devices. Which tools are used to monitor and govern the handling of mobile devices? Mobile Devices Management (MDM) Tools Endpoint Security Tools Network Access Controls (NAC) Endpoint Malware Protections Configuration Controls /Lifecycle Management None 0% 10% 20% 30% 40% BYOD & MOBILE SECURITY Read the 2013 survey results 12

14 Q11 How are current mobile devices embedded in your organization s IT-infrastructure? 45 percent of organizations embed personal mobile devices via guest networking and separate networks. How are current mobile devices embedded in your organization s IT-infrastructure? Guest networking / separate networks for personal mobile devices None Incident management procedures are employed / amended An application repository exists for mobile devices 0% 10% 20% 30% 40% 50% BYOD & MOBILE SECURITY Read the 2013 survey results 13

15 Q12 BYOD solutions? How are you deploying 32 percent of organizations are considering or implementing on-premise BYOD solutions. In order to meet your BYOD objectives and deploy relevant technologies, have you considered or already implemented one of the following? On premise solutions Hybrid of cloud and on-premise solutions None Cloud (SaaS) solutions 0% 5% 10% 15% 20% 25% 30% 35% BYOD & MOBILE SECURITY Read the 2013 survey results 14

16 Q13 success criteria for BYOD deployments? What are your most important The most important success criterion of BYOD deployments is maintaining security for 70 percent of organizations. Employee productivity ranks second with 54 percent. What are your most important success criteria for BYOD deployments? Security Employee productivity Usability Device management Cost reduction Innovation Technology consolidation 0% 20% 40% 60% 80% BYOD & MOBILE SECURITY Read the 2013 survey results 15

17 Q14 Which topics are covered BY your company s Mobile Device Policy? accounts (49 percent), access and authentication (47 percent), and acceptable usage & employee education (42 percent) are the top-3 mobile device policy topics for organizations. Which topics are covered by your company's Mobile Device Policy? accounts Access and authentication Acceptable usage / employee education Device wiping Stored data Malware protection Configuration Applications We don t have a mobile device policy Guest networking Location tracking SMS 0% 10% 20% 30% 40% 50% BYOD & MOBILE SECURITY Read the 2013 survey results 16

18 Q15 which capabilities ARE REQUIRED for Mobile Device Management (MDM) tools? Logging, monitoring and reporting are the most required features (69 percent) of mobile device management tools (MDM). Logging, monitoring and reporting Centralized functionality Malware protection Ease of deployment Configuration controls Endpoint Integrity Checking Role-based access rules Flexible configuration to support different requirements and parameters Harmonization across mobile platform types Integration with other Endpoint Management Systems In your opinion, which capabilities are required for Mobile Device Management (MDM) tools? 0% 20% 40% 60% 80% BYOD & MOBILE SECURITY Read the 2013 survey results 17

19 Q16 has been reached in your company? Which stage of BYOD adoption 60 percent of organizations have not yet adopted BYOD, but are considering it. Only 10 percent of non-adopters are ruling it out. 24 percent are actively working on policies, procedures and infrastructure for BYOD. Which stage of BYOD adoption has been reached in your company? Not yet adopted, but considering Working on the policies, procedures and infrastructure to enable BYOD Currently evaluating the cost / benefits of BYOD adoption BYOD already fully implemented Considering BYOD adoption within a year Not yet adopted, and no plans BYOD will not be permitted 0% 10% 20% 30% 40% 50% 60% 70% BYOD & MOBILE SECURITY Read the 2013 survey results 18

20 Q17 for full enterprise BYOD adoption? How would you rate your readiness A majority of organizations say they are less than 50 percent ready to adopt BYOD for their enterprise. How would you rate your readiness for full enterprise BYOD adoption (in percent 100 is completely ready)? Responses in % 14% 12% 10% 8% 6% 4% 2% 0% Readiness in % BYOD & MOBILE SECURITY Read the 2013 survey results 19

21 Q18 Does your organization create / use mobile apps for business purposes by employees? 41 percent of all organizations create mobile apps for employees - 40 percent do not. 18 percent plan to do so in the future. Does your organization create / use mobile apps for business purposes by employees? Yes No Planned in the future 0% 10% 20% 30% 40% 50% BYOD & MOBILE SECURITY Read the 2013 survey results 20

22 Q19 Does your organization create / use mobile apps for business purposes by customers? 43 percent of organizations create mobile apps for customers - 40 percent do not. 17 percent plan to do so in the future. Does your organization create / use mobile apps for business purposes by customers? Yes No Planned in the future 0% 10% 20% 30% 40% 50% BYOD & MOBILE SECURITY Read the 2013 survey results 21

23 What are the most POPULAR Q20business applications used on BYOD devices? The most popular mobile business applications are , calendar and contact management (85 percent). What do you think are the most popular business applications used on BYOD devices? /Calendar/Contacts Document access / editing Access to Sharepoint / Intranet Access to company-built applications File sharing Access to SaaS apps such as Salesforce Virtual Desktop Video conferencing Cloud Backup 0% 20% 40% 60% 80% 100% BYOD & MOBILE SECURITY Read the 2013 survey results 22

24 SURVEY METHODOLOGY This survey was conducted in April We collected 1,650 responses from information security professionals across the world here is a detailed breakdown of the demographics. What industry is your company in? Software & Internet Computers & Electronics Financial Services Business Services Government Telecommunications Education Manufacturing Healthcare, Pharmaceuticals, & Biotech Energy & Utilities Retail Non-profit Media & Entertainment Transportation & Storage Consumer Services Agriculture & Mining Real Estate & Construction Travel, Recreation & Leisure Wholesale & Distribution 0% 5% 10% 15% 20% What department do you work in? IT Sales Operations Engineering Product Management Marketing Legal Finance HR 0% 20% 40% 60% What is your career level? What is the size of your company (number of employees)? Specialist Manager Owner/CEO/President Director C-Level (CTO, CIO, CMO, CFO, COO) VP Level 25.3% Fewer than % % % 1,000-10, % 10,000+ 0% 5% 10% 15% 20% 25% 30% 35% BYOD & MOBILE SECURITY Read the 2013 survey results 23

25 SPONSORS We would like to thank our sponsors for supporting the BYOD & Mobile Security Report. Lumension Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance offerings. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide. Lumension: IT Secured. Success Optimized. Symantec Symantec protects the world s information, and is a global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities and interactions gives our customers confidence in a connected world. KPMG KPMG delivers a globally consistent set of multidisciplinary services based on deep industry knowledge. Our industry focus helps KPMG professionals develop a rich understanding of clients businesses and the insight, skills, and resources required to address industry-specific issues and opportunities.. Zimbani Zimbani is an innovative technology consulting firm with a special focus on information security, mobility and cloud. We help businesses acquire a competitive edge by incorporating the latest technology that can improve their current performance as well as prepare them for future challenges. Our extensive experience in the industry has helped us deliver capabilities that can ultimately optimise the service and products offered by our customers. Our aim is to provide businesses with highly cost effective, trustworthy, productive and innovative solutions that will add value to your business. With our help our clients have been able to deliver secure, efficient and adaptive services with ease. MailGuard The MailGuard Group was founded in 2001 to address the growing online security concerns of business. Recognising that organisations needed a simple and inexpensive way to manage unwanted and web content, we pioneered a range of cloud security solutions to provide complete protection against online threats. Today, we ve built upon our reputation as a technological innovator to become a trusted name in enterprise cloud security. BYOD & MOBILE SECURITY Read the 2013 survey results 24

26 THANK YOU Many thanks to everybody who participated in this survey. If you are interested in co-sponsoring upcoming surveys, or creating your own survey report, please contact Holger Schulze at Group Partner Information Security About the Information Security Community Over 160,000+ members make the Information Security Community on Linkedin is the word s largest community of infosec professionals. We are building a network of infosec professionals that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, managing, deploying, using... or learning about information security solutions an concepts - this group is for you. Join the INFORMATION SECURITY Community on LinkedIn BYOD & MOBILE SECURITY Read the 2013 survey results 25

27 ABOUT THE AUTHOR Holger Schulze is a B2B technology marketing executive delivering demand, brand awareness, and revenue growth for high-tech companies. A prolific blogger and online community builder, Holger manages the B2B Technology Marketing Community on LinkedIn with over 42,000 members and writes about B2B marketing trends in his blog Everything Technology Marketing. hhschulze@gmail.com Holger Schulze B2B Marketer Our goal is to inform and educate B2B marketers about new trends, share marketing ideas and best practices, and make it easier for you to find the information you care about to do your jobs successfully. Follow Holger on Twitter Subscribe to Holger s Technology Marketing Blog BYOD & MOBILE SECURITY Read the 2013 survey results 26

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey

More information

Symantec Mobile Security

Symantec Mobile Security Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Mobility Challenges & Trends The Financial Services Point Of View

Mobility Challenges & Trends The Financial Services Point Of View Mobility Challenges & Trends The Financial Services Point Of View Nikos Theodosiou Cloud Computing Solutions Presales/Marketing Engineer The New World Agenda The Mobile World The Challenges The Solutions

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices

More information

Kaseya White Paper. Managing the Complexity of Today s Hybrid IT Environments

Kaseya White Paper. Managing the Complexity of Today s Hybrid IT Environments Kaseya White Paper Managing the Complexity of Today s Hybrid IT Environments There are many factors driving the increasing complexity of IT today. The rapid adoption of cloud computing, big data and mobile

More information

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Protecting Content and Securing the Organization Through Smarter Endpoint Choices Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops

More information

State of Mobility Survey. France Results

State of Mobility Survey. France Results State of Mobility Survey France Results Methodology Survey performed by Applied Research 6,275 global organizations 43 countries NAM 2 LAM 14 EMEA 13 APJ 14 SMBs: Individuals in charge of computers Enterprises:

More information

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015

Spikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015 Spikes Mobile Security Research Report Deployed to Spiceworks Voice of IT panel April, 2015 Table of Contents IN THIS REPORT Background & Methodology 3 Executive Summary 4 Detailed Findings 5-17 Mobile

More information

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics Samsung Solutions for Enterprise Mobility MichailasTraubas Samsung Electronics Baltics Samsung Today Samsung Electronics Baltics Established in 2008 [1999] Employees: 144 people Revenue: 357 mio. USD in

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Enterprise Mobility Management

Enterprise Mobility Management Enterprise Mobility Management Vodafone Global Enterprise Vodafone Power to you Delivering the truly mobile enterprise A Ready Business is truly connected allowing you to be ready for almost anything by

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

MAM + MDM = BMS. (Bada$$ Mobile Strategy)

MAM + MDM = BMS. (Bada$$ Mobile Strategy) MAM + MDM = BMS (Bada$$ Mobile Strategy) Table of Contents 3 Introduction 4 What is Mobile Device Management? 5 What is Mobile Application Management? 6 Why Should You Use Both MDM and MAM? 7 MAM Lifecycle

More information

Security and Compliance challenges in Mobile environment

Security and Compliance challenges in Mobile environment Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com

More information

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Federal Cyber Security Outlook for 2010

Federal Cyber Security Outlook for 2010 Federal Cyber Security Outlook for 2010 National IT Security Challenges Mounting How well prepared are IT professionals within U.S. government agencies to respond to foreign cyber threats? Will government

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Commissioned Study. SURVEY: Mobile Threats are Real and Costly

Commissioned Study. SURVEY: Mobile Threats are Real and Costly Commissioned Study SURVEY: Mobile Threats are Real and Costly Introduction A lack of integrated mobile security is costing companies in terms of everything from lost productivity to lost data. Cyber criminals

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

The Future of Network Security Sophos 2012 Network Security Survey

The Future of Network Security Sophos 2012 Network Security Survey The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

"Secure insight, anytime, anywhere."

Secure insight, anytime, anywhere. "Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Good Technology Mid-Market Mobility Trends Survey. August 2014

Good Technology Mid-Market Mobility Trends Survey. August 2014 6 Good Technology Mid-Market Mobility Trends Survey August 2014 Mobility Trends Survey Introduction Purpose & Methodology In August 2014, Good conducted an online survey of global mid-market organizations

More information

Enterprise mobility trends 2015 and beyond

Enterprise mobility trends 2015 and beyond Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources

More information

Data Breach: The Cloud Multiplier Effect

Data Breach: The Cloud Multiplier Effect Data Breach: The Cloud Multiplier Effect Sponsored by Netskope Independently conducted by Ponemon Institute LLC Publication Date: June 2014 Ponemon Institute Research Report Part 1. Introduction Data Breach:

More information

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Mobile Security: Controlling Growing Threats with Mobile Device Management

Mobile Security: Controlling Growing Threats with Mobile Device Management Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs.

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs. CIBECS / IDG Connect 2014 DATA LOSS SURVEY The latest statistics and trends around user data protection for business. REPORT www.cibecs.com 2 Table of ontents EXECUTIVE 01 02 03 04 05 06 SUMMARY WHO PARTICIPATED

More information

Cyber Risks and Insurance Solutions Malaysia, November 2013

Cyber Risks and Insurance Solutions Malaysia, November 2013 Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Mobile and BYOD Strategy

Mobile and BYOD Strategy Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

The User is Evolving. July 12, 2011

The User is Evolving. July 12, 2011 McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0

More information

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion

More information

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Achieving Security in Workplace File Sharing Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Ponemon Institute Research Report Part 1. Introduction Achieving

More information

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies

Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Bring Your Own Device & the Consumerisation of IT: 2 Case Studies Mark Brockbank, IBM UK Ltd Email: mark.brockbank@uk.ibm.com Twitter: @MarkBrockbank Agenda CIO Challenges in Mobility BYOD Customer case

More information

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise

More information

Security and Privacy Considerations for BYOD

Security and Privacy Considerations for BYOD Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

Building a Mobile Information Management Strategy

Building a Mobile Information Management Strategy The SIMS Partnership Transforming Transforming health health care care delivery delivery Building a Mobile Information Management Strategy The Approach Taken by UHN to Balance Both Security and Practice

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

Lead Generation 2013 survey results

Lead Generation 2013 survey results Lead Generation Marketing Trends by Holger Schulze 2013 survey results Sponsored by Eloqua DiscoverOrg Strand Marketing Optify INTRODUCTION Welcome to the 2013 B2B Lead Generation Report! It s no secret

More information

Codeproof Mobile Security & SaaS MDM Platform

Codeproof Mobile Security & SaaS MDM Platform Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,

More information

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report

More information

security changes with Orange focus on your business, we focus on your security

security changes with Orange focus on your business, we focus on your security security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment

Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment Cloud Security Concerns and the Perceived Effectiveness of Traditional Security Solutions in a Cloud Environment Presented by: IDG Research Company: CloudPassage June 2015 METHODOLOGY & RESEARCH OBJECTIVES

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Mobile Security and Management Opportunities for Telcos and Service Providers

Mobile Security and Management Opportunities for Telcos and Service Providers Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile

More information

Mobile App Management:

Mobile App Management: Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management

More information

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly

More information

Tuesday, June 5, 12. Mobile Device Usage

Tuesday, June 5, 12. Mobile Device Usage Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.

More information

Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc.

Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc. Managing Mobile: BYOD, MDM, MAM, and more acronyms John H Sawyer Senior Security Analyst InGuardians, Inc. Who Am I? InGuardians Senior Security Analyst Penetration Testing Web, Network, Smart Grid, Mobile,

More information

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise) Plugging the Holes in Mobile Security: The Rising Threat Jennifer M. Pigg, VP of Research, Yankee Group Nick Wade, Group Product Manager, Symantec June 2011 Copyright 2011. Yankee Group Research, Inc.

More information

Speeding Office 365 Implementation Using Identity-as-a-Service

Speeding Office 365 Implementation Using Identity-as-a-Service August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com

More information

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite. White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table

More information

IBM United States Software Announcement 215-078, dated February 3, 2015

IBM United States Software Announcement 215-078, dated February 3, 2015 IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale. Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in

More information

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches Sean Horne CTO EMC UKI The leakage of Intellectual Property...and the risk of Privacy, Trustworthiness, Governance and Data Breaches 1 The business of Insurance is guided by Trust Insurance is a promise

More information

WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT

WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT Executive Summary The explosive growth of worker mobility is driving the rapid adoption of mobile devices

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD

More information

Cloud Security and Technology Adoption. By John Mathon VP, Enterprise Evangelism and Product Strategy May 2015

Cloud Security and Technology Adoption. By John Mathon VP, Enterprise Evangelism and Product Strategy May 2015 Cloud Security and Technology Adoption By John Mathon VP, Enterprise Evangelism and Product Strategy May 2015 About the Author o I am a 30+ year veteran of the computer industry, 10 patents, publish /

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Symantec Encryption Solutions for Email, Powered by PGP Technology

Symantec Encryption Solutions for Email, Powered by PGP Technology Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman

More information

Five Best Practices for Secure Enterprise Content Mobility

Five Best Practices for Secure Enterprise Content Mobility A N A C C E L L I O N W H I T E P A P E R Five Best Practices for Secure Enterprise Content Mobility Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com

More information

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment

More information

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Three Best Practices to Help Enterprises Overcome BYOD Challenges WHITE PAPER Three Best Practices to Help Enterprises Overcome BYOD Challenges Nearly 80% of white-collar workers in the United States use a mobile device for work and approximately 95% of IT organizations

More information

SAP White Paper Enterprise Mobility

SAP White Paper Enterprise Mobility SAP White Paper Enterprise Mobility Mobile Content and Document Management Best Practices and Decision Checklist Enterprise-Grade Solutions Give IT Much-Needed Security and Control Over Company Content

More information

Four Virtual Meeting Room Deployment Strategies for Technology Companies: Which Strategy is Best for You?

Four Virtual Meeting Room Deployment Strategies for Technology Companies: Which Strategy is Best for You? WHITE PAPER Four Virtual Meeting Room Deployment Strategies for Technology Companies: Which Strategy is Best for You? Firms can use the guidance offered in this paper to better understand four available

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

App Reputation Report February 2013 The Authority in App Security

App Reputation Report February 2013 The Authority in App Security App Reputation Report February 2013 The Authority in App Security Introduction The Appthority App Report for February 2013 provides an overview of the security risks behind 100 free ios and Android apps.

More information

Product Analysis: 2012 Frost & Sullivan Customer Value Enhancement Award in Mobile Device Management

Product Analysis: 2012 Frost & Sullivan Customer Value Enhancement Award in Mobile Device Management 2012 2012 North American Mobile Device Management Customer Value Enhancement Award 2012 Frost & Sullivan 1 We Accelerate Growth Customer Value Enhancement Award Mobile Device Management North America,

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected

More information

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted

More information