Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options

Size: px
Start display at page:

Download "Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options"

Transcription

1 Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options By Robin Gareiss Executive Vice President and Founder, Nemertes Research Executive Summary As more employees bring mobile devices with new types of apps into the workplace, IT must provide pervasive, policy- based access to these apps without compromising security policy, degrading performance, or significantly increasing cost. Most organizations use Mobile Device Management (MDM) and/or Mobile Application Management (MAM) solutions to address security requirements. But moving forward, IT leaders must rethink mobile security. Because organizations use both on- prem and cloud- based apps, they likely will end up with both cloud- based and on- premise security solutions. But unless these are tied together with unified policy and management, and address numerous types of mobile devices along with various threats, this is not a viable security strategy, particularly in a Bring- Your- Own- Device environment. A hybrid fixed and mobile workplace providing a mix of on- premise and cloud applications needs an array of security solutions directed by a flexible security policy that follows the user, regardless of device or location. And though the vast majority of companies (84.4%) see the benefit of a pervasive security solution, few (29.4%) say they re deploying such a solution today. The Issue All indicators are up when it comes to mobility: More devices, more users, more budget, more applications. Business and IT leaders are advancing on several fronts: employee- owned device policy, tablet plans, application development processes, use policies, and security to an extent. So far, most mobility security strategy has centered around shifting from BlackBerry Enterprise Server to multi- platform MDM and MAM solutions. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user- centric, universal policy that can apply to whatever devices and apps employees use, with flexibility based on the contextual risk factors. 1

2 The Facts: What s Happening With Mobility? The growth in mobility is causing numerous challenges in organizations. IT and business leaders must first understand the size and pace of mobility growth in order to determine the impact that growth will have on the network and applications. Budgets are up. More than two- thirds of companies are increasing spending, by an average of 19.7%, in In fact, mobility budgets now account for 7.7% of the overall IT budget. Nearly 60% of organizations expect the number of mobile devices they support to increase in 2013, and by about 35%. Likewise, half expect an increase in the number of employee- owned devices, going from an average of 39% of all devices used for work purposes today to 45% by (Already, 69% of companies support BYOD.),!"# +!"# 234)$56$2*789$&'9*)7:)$;7<:)=$>3$?5>.@)$A:7B)$!"#$ *!"# )!"# (!"# '!"# &!"# "%#$ "%#$ %!"# $!"#!"# &'()*')($$ +,-$ +./.01,-$ Figure 1: Type of Traffic Increase Smartphones, as a group, account for the majority of mobile devices, but tablets will grow rapidly from Specifically, iphones make up the highest percentage of total mobile devices within the organization (26.6%), followed by tablets (23.7%), Android phones (18.5%), and BlackBerry (17.8%). In some cases, the IT staff will provide some support for all devices whether owned by the company or the employee and in other cases, support only company- owned devices. This increase in devices, not surprisingly, causes an increase in the network traffic in at least 62.7% of organizations (11.8% were unsure, 25.5% say there is no increase in network traffic). The majority of traffic increase is happening on the Internet, followed equally by the WAN and the WLAN/LAN. The more autonomy employees get with their mobile devices, the more likely the technology team cannot accurately predict the network impact of those devices. Only 34.8% of those reporting 2

3 an increase in traffic say they re concerned about it. They have the tools to monitor the situation, optimization techniques to improve performance, or relatively low- cost bandwidth to boost the capacity when needed. We feel we are prepared for this type of traffic increase, says the CIO of a healthcare company, which is a heavy adopter of mobility. Those who are concerned cite bandwidth limitations, performance concerns, cost, and security issues. Organizations have in place many network management and monitoring tools that provide metrics around bandwidth utilization, and even predictive analysis for capacity planning. But it s not the same on the applications side. One of the key challenges facing the technology team is simply knowing which mobile applications employees use. Without that knowledge, it s difficult to appropriately size networks, assure productivity, and prevent employees from accessing potentially harmful apps. More than half (52.7%) of IT professionals say they do not know how many mobile apps their employees use. When asked why, nearly half (47%) say they have not built out a process for tracking the number and type of apps, while 42% say they have no tools available to track app usage, and another third say they have not thought about asking. Nonetheless, 74.5% of IT professionals say it is vital or very important to have a comprehensive, enterprise view of app utilization, including those used from mobile devices demonstrating a void between best practice and actual practice. $!"# =;>$?-,@.$A-0$B,-C$(-C$D),>$D-/12+$E336$E4+$F,$G6+H$ ($"#!"#$ (!"#!%#$ '$"# '!"# &&#$ &$"# &!"# %$"# %!"# $"# '#$!"# ()*+$,-.$/012.$-0.$ $ 7-4$)33$.4)581,9$ :-$.--26$)*)12)/2+$.-$.4)58$ )33$06)9+$ :+*+4$.;-09;.$)/-0.$)681,9$ <.;+4$ Figure 2: Reasons for Not Knowing Apps in Use What s clear, though, despite the lack of deep knowledge on the part of IT, is that the enterprise network is facing an influx of consumer applications riding atop 3

4 those consumer devices (BYOD or not). Public, consumer- focused apps can create and amplify security concerns in any network, and allowing them on mobile devices, which typically have fewer security controls than laptops/desktops, may put the network at significant new risk. Figure 3 shows the degree to which organizations support some common Web- based apps such as LinkedIn, Gmail, Facebook, Twitter, and YouTube, which often are used for official purposes by sales, marketing, and support staff. 45&'0-(6$#/0!""#$%&'$()708(09(+0*+"(,'30-&)&./30&)1:(,02()',(#;!""#$%&'$() *+""(,' -&)&./0&)10 2()',(# 0*+""(,'30-&)&./30 2()',(#!"#$%&'# ()*+, (-*),./*0, 123"4.(*5, (/*+, 0)*-, 637%899$ (/*+, (/*+, 0-*-, :;"<<%= (.*), 0)*-, 0.*-, >9?:?8% /*@, ()*+, 0.*-, :?284= ()*+, (.*), ((*@, A9B*#%< 0(*+, (-*), /*@, ":?#%C 0.*-, (.*), /*@, Figure 3: Company Support Levels for Mobile Apps Security managers must work with the lines of business to determine whether company policy should allow access to specific sites, such as Facebook or YouTube, during work hours and for whom. On one hand, they may decide in favor of access if the organization has a presence on the social media sites and certain (or all) employees must access the site. On the other hand, they may decide that such access doesn t apply to certain types of employees. And, of course, such sites are not monolithic, and both the lines of business and security staffs often want to allow access to some parts or apps in a site without having to automatically allow access to all. For example, they may want to allow access to Facebook but not the Farmville or Bingo apps. Crucial Crossroads: Addressing Mobile Security Today The large number of organizations without insight into the number or type of mobile applications running on mobile devices is an impediment to effective implementation of security policies. Without this basic knowledge, it is difficult to block specific apps, or to provide granular control of specific URLs. Nemertes has tracked mobile security in a few ways. As of the first half of 2012, about 46% of organizations used MDM to secure their mobile devices, and by September of 2012, nearly 55% were using any combination of MDM and MAM. Our projections have MDM adoption growing rapidly, to 84% by (Please see Figure 4.) MDM has become the catch- all phrase for mobility management and has grown 4

5 from simple device management (remote wipe, GPS and camera control, asset management, etc.) to broader device and application management. On- prem MDM solutions remain the most common (62.5%), but we expect cloud to grow (31.3% use cloud- based solutions today; 6.3% have hybrid environments). 90% 80% Mobile Device Management Adoption, Percent of companies using MDM (Projected) 84% 70% 60% 50% 40% 46% 56% 30% 20% 21% 10% 0% Figure 4:MDM Growth, IT professionals say the primary reason they use MDM/MAM is to manage and secure corporate apps (62.7%), followed by the need to secure sensitive corporate data (60.8%), track assets (49%) and deliver apps consistently to a range of platforms, including mobile devices (25.5%). These are fine as far as they go, but MDM/MAM tools generally do not provide a framework that includes context in security decisions; that is, a single set of policies dictating different rules for accessing apps based on the device, method of connectivity, or location of a device. What s more, MDM/MAM systems can be intrusive, generally requiring clients resident on the devices. As companies allow more employee- owned devices, the employees may resist adding clients to the devices or worse yet, figure out ways to disable the rules. Consider typical corporate scenarios: It s common for knowledge workers to use a laptop, tablet, and one to three additional networked smart devices. As organizations mobile- enable more business apps and corporate data, what policy is applied where? When an employee accesses a cloud- based corporate CRM app from his laptop in the office (either tethered or through the WLAN), how does the security policy differ from when he accesses that same app from a home office, from airport WiFi, or via 3G/4G broadband mobile data services? Today, most organizations have different policy enforcement points in the form of different tools the MDM on the 5

6 mobile client may enforce application access policy on smartphones, while secure container services may control document access, while WLAN controllers may dictate access to the corporate LAN. Policies can (easily) be implemented inconsistently across the several tools, and tools may (easily) get out of sync with current policy, creating loopholes allowing erroneous access. MDM is not the only type of security that companies use for mobile devices, though it is the most common. IT professionals say they use a variety of techniques to secure mobile devices, including passwords, encryption, virtual desktop interface, VPNs, and network- based MDM (using the WLAN access to control mobile apps). A combination of techniques best implements robust policy, but a centralized policy engine one that reached across enforcement points, follows the user from device to device, location to location, and which can shape access decisions based on that contextual information is central to making a pervasive strategy practical. Figure 5: Type of Mobile Security in Use Though most organizations believe they adequately can address the effects mobility growth has on the network, nearly 70% say they are very concerned about the overall risks introduced into the organization by the growing number of mobile devices (and by extension, the applications they access). Despite the relatively widespread adoption of MDM/MAM, three of the top four most frequently cited concerns are securing the device (23.5%), securing the data (21.6%), and securing the apps (17.6%). So although organizations use various methods of security, IT organizations remain concerned about how to effectively secure the growing number of devices, along with the apps they use and data they access. (Please see Figure 6.) 6

7 Figure 6: Reasons of Those Concerned About Risk Introduced by Mobile Devices As Figure 6 further illustrates, we re at the early stages of mobile security policy development. Top of mind now are the basics: Securing devices, apps, and data; addressing the increase in network traffic; tracking costs. But like many emerging IT paradigm shifts, the small number of bleeding edge companies are concerned with more advanced issues because they already have addressed the basics. The bottom half of Figure 6 shows some of the more advanced concerns, including creating an employee use policy, controlling which apps are installed on the device and which apps the employee uses, device utilization reports, and obtaining granular application control. Shifting to the Cloud Though most apps today are run in the data center and remotely accessed (53.6%), these and other apps are increasingly moving to the cloud. As a result, companies must address how they will operate a centralized policy engine that controls access to both cloud- based and on- prem apps. Hosting applications and data in a cloud is a logical solution to the problems of serving mobile workers, as it leverages the Internet core more effectively to provide faster access to apps, while avoiding the cost increases of enhancing bandwidth, security, optimization, and server capacity on the corporate Internet link. The challenge, of course, is maintaining 7

8 the same policy- driven security when devices access cloud- based apps without going through the corporate network to do it. Cloud adoption of apps overall, at 74.3% (roughly the same this year as last), will spread a bit further next year as 82.1% of organizations plan to adopt Software as a Service. However, commitment to SaaS, as measured by number of SaaS applications in use, continues to climb steadily and quickly. The percentage of organizations with more than five SaaS applications rose from 19.7% to 28.6%. This year, 40% of organizations have two or fewer SaaS applications; by 2013 only 28.6% will. The average number of SaaS applications is rising from about six this year to eight in Compatibility and customization account for 39.1% of the challenges facing SaaS deployments, security 30.4%, and performance 17.4%. Data centricity and bandwidth remain concerns, as does data security, says an IT director in a midsize healthcare company. Figure 7: State of Deployment: Pervasive Security Moving Toward Pervasive Security A centralized policy engine is at the core of a pervasive security policy. IT professionals understand the value of such pervasive policy, but few have implemented one. Nemertes asked IT professionals: What is the state of deployment of pervasive security policy in your organization? We further defined a pervasive security policy as a consistent policy applied to all applications (cloud or on- prem) defining the ability of users to access and change information regardless of the device 8

9 or network they use. Nearly 30% of organization state they have already implemented one, and another 60.8% are planning to implement or are evaluating. However, in conversations with IT executives, many said they had not explicitly determined which vendors they would use, how they would architect the solution, or what their detailed requirements were. Several said they did not know, weren t sure, or were still researching which vendors offer products and services in this emerging space. Vendors explicitly cited as providing what IT professionals define as pervasive security solutions include Blue Coat, Cisco, Citrix, Dell, HP, IBM, McAfee, Microsoft, Oracle, Symantec. A few were developing in- house solutions either solo or with the help of a vendor. What is clear, however, is IT professionals generally say they require the benefits a pervasive security strategy would afford them. For example, we asked: Do you need to be able to follow a user on any device, on any network, and use policies to manage access to apps? Nearly 60% of IT professionals say they do. Even more profound, 84.4% say they see the benefits of a user policy that is universal across desktop, laptop, and mobile devices depending on the time of day, user group, location, and other factors. Effectively, this means either a) an agent that can monitor all activity on the device, or b) a redirect to a network- based proxy that implements security policy, or c) a required VPN access that can ensure connectivity to a secured network. Defining the behavior of the agent and/or VPN- connected network requires an identity- based directory. If this sounds familiar, it is. This is how most modern MDM solutions work. The key difference, however, is that the security is pervasive and flexible. Pervasive security implies context- awareness above and beyond simple, role- based security. To help separate security from pervasive security, let s examine a common scenario. Facebook can be an excellent networking tool, or a gateway for accidental dissemination of corporate information. The difference is in the context, or how an employee uses the app. Pervasive security takes a granular look at the information Facebook is attempting to share (or the URL), checking against a set of rules and either blocking or allowing the action. The permission may change based on the device or location, as well. Such context- aware security makes for a much better security model than brute force blocking of all or even specific apps. In doing so, pervasive security solutions control policy and operations around popular apps, ensure user choice and maintain privacy. IT staffs should not develop their mobile security strategy in isolation. Ideally, there is a single set of security policies governing all users, devices, locations, applications, and data. In fact, 72.6% of IT professionals say it s vital or very important to have a mobile security solution with unified policy and reporting with the corporate security solution. 9

10 Conclusions and Recommendations Companies that are power users of mobility and UC, and highly distributed, are pioneers of the move to cloud- based applications and security. By seeking a solution that provides appropriate security levels granularly, with a flexible policy engine able to address contextual factors such as location, use cases, job roles, access methods, and more, organizations can unify their security strategies while expanding the benefits of mobility. The time is ripe for unified, cloud- enabled solutions, but educating the market on growth patterns, costs, and risk avoidance is paramount to success. Business technology leaders should consider the following: Understand your organization s metrics. What are the security and mobility budgets, and do they align with the growth in mobile devices and apps? Track the effect mobility has on your corporate network, and make adjustments regularly. Track with granularity what mobile apps employees use, how they re changing, and what effect they have on the network. Regularly revisit security policies based on change in apps, user behavior, and network capacity. Though MDM/MAM solutions are the most common way to address mobile security today, evaluate network and security vendors whose pervasive mobile security solutions address demand for a more comprehensive security strategy. Evaluate the vendor s architectural solution. Where do the policies reside? Where are the policy enforcement points? Is there a cloud- based solution, replicating policies across a provider s network so as to bring the policies closer to the users? Does enforcement require routing traffic through the provider s network? How is that network distributed? What are the cost differentials of the different types of architectures? About Nemertes Research: Nemertes Research is a research- advisory and strategic- consulting firm that specializes in analyzing and quantifying the business value of emerging technologies. You can learn more about Nemertes Research at our Website, or contact us directly at research@nemertes.com. 10

Tablets: Will They Replace PCs?

Tablets: Will They Replace PCs? Tablets: Will They Replace PCs? By Phil Clarke Research Analyst, Nemertes Research Executive Summary As mobility becomes more prevalent within the enterprise, tablets are becoming crucial tools with specific

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere

More information

BYOD: Infrastructure Requirements & the Effect on Business Processes

BYOD: Infrastructure Requirements & the Effect on Business Processes BYOD: Infrastructure Requirements & the Effect on Business Processes By Philip Clarke Research Analyst, Nemertes Research Executive Summary Increasingly, employees no longer must be tethered to an Ethernet

More information

The Ultralight Branch

The Ultralight Branch The Ultralight Branch By John E. Burke Principal Research Analyst, Nemertes Research Executive Summary The distributed, virtualizing enterprise seeks to limit or break the relationship between physical

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Business Benefits of Smarter Networks for Smarter Branches

Business Benefits of Smarter Networks for Smarter Branches Business Benefits of Smarter Networks for Smarter Branches By John Burke CIO and Principal Research Analyst, Nemertes Research Executive Summary The next iteration of the WAN and the branch is an opportunity

More information

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers 1 Today s Workforce 79% employees favor

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

A guide to enterprise mobile device management.

A guide to enterprise mobile device management. WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Video Conferencing: A TCO Analysis

Video Conferencing: A TCO Analysis Video Conferencing: A TCO Analysis A Look at What Companies Really Spend By Irwin Lazar, Vice President & Research Director, Nemertes Research Philip Clarke, Research Analyst, Nemertes Research Executive

More information

Storgrid EFS Access all of your business information securely from any device

Storgrid EFS Access all of your business information securely from any device Datasheet Storgrid EFS Access all of your business information securely from any device September 2014 2014 STORGRID International Holding BV. This document is created with the utmost care. To prevent

More information

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that

More information

IT Agility that Drives Business Forward

IT Agility that Drives Business Forward IT Agility that Drives Business Forward Richard Stiennon Chief Research Analyst Introduction There are six factors that drive the ever changing information technology space: Growth in Users Bandwidth Processing

More information

TRUE COST OF OWNERSHIP FOR UNIFIED COMMUNICATIONS

TRUE COST OF OWNERSHIP FOR UNIFIED COMMUNICATIONS brought to you by ISSUE PAPER TRUE COST OF OWNERSHIP FOR UNIFIED COMMUNICATIONS How Vendor Selection Impacts ROI By Robin Gareiss President, Nemertes Research Q2 15 True Cost of Ownership for Unified Communication

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

Secure Your Mobile Device Access with Cisco BYOD Solutions

Secure Your Mobile Device Access with Cisco BYOD Solutions Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

EasiShare Whitepaper - Empowering Your Mobile Workforce

EasiShare Whitepaper - Empowering Your Mobile Workforce Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for

More information

BYOD(evice) without BYOI(nsecurity)

BYOD(evice) without BYOI(nsecurity) BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

Key Requirements of Enterprise Mobility Management Solutions

Key Requirements of Enterprise Mobility Management Solutions Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:

More information

How To Make Your Computer System More Secure And Secure

How To Make Your Computer System More Secure And Secure Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management

More information

Three Best Practices to Help Enterprises Overcome BYOD Challenges

Three Best Practices to Help Enterprises Overcome BYOD Challenges WHITE PAPER Three Best Practices to Help Enterprises Overcome BYOD Challenges Nearly 80% of white-collar workers in the United States use a mobile device for work and approximately 95% of IT organizations

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

How cloud computing can transform your business landscape

How cloud computing can transform your business landscape How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not

More information

Device Independence - BYOD -

Device Independence - BYOD - Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring

More information

A CIO s Guide To Mobility Management

A CIO s Guide To Mobility Management The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202

More information

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

Three Best Practices to Help Government Agencies Overcome BYOD Challenges WHITE PAPER This paper discusses how IT managers in government can address the challenges of the new Bring-Your-Own-Device (BYOD) environment as well as best practices for ensuring security and productivity.

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags) perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

http://www.velocis.in Extending Collaboration to BYOD Devices

http://www.velocis.in Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

What Is Cisco Mobile Workspace Solution?

What Is Cisco Mobile Workspace Solution? Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Mobile Device Security Risks and RemediaAon Approaches

Mobile Device Security Risks and RemediaAon Approaches Mobile Device Security Risks and RemediaAon Approaches Raj Chaudhary, Principal, Crowe Horwath LLP In- Depth Seminars D11 CRISC CGEIT CISM CISA Informal Poll What is your Atle/role? Internal Audit IT Audit

More information

Enterprise Mobility How the mobile world drives business

Enterprise Mobility How the mobile world drives business Enterprise Mobility How the mobile world drives business Enterprise Mobility How the mobile world drives business white paper 1 Executive summary More and more employees carry their own smartphone into

More information

Comparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. sales@intermedia.net CALL US EMAIL US ON THE WEB

Comparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. sales@intermedia.net CALL US EMAIL US ON THE WEB for -Grade CALL US EMAIL US ON THE WEB 1.800.379.7729 sales@intermedia.net intermedia.net for -Grade Goal of this report This report compares and contrasts various alternatives for file sharing in a business

More information

Voice and Video over IP: Leveraging Network Convergence for Collaboration

Voice and Video over IP: Leveraging Network Convergence for Collaboration ISSUE PAPER Voice and Video over IP: Leveraging Network Convergence for Collaboration By Melanie Turek, Senior Vice President & Founding Partner Nemertes Research Executive Summary For several years, the

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,

More information

Mobile Device. Management-

Mobile Device. Management- Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly

More information

Productive and Secure Enterprise Mobility with Cisco and Citrix

Productive and Secure Enterprise Mobility with Cisco and Citrix Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers

More information

www.fedtechmagazine.com/article/2012/05/locking-down-byod

www.fedtechmagazine.com/article/2012/05/locking-down-byod CASE STUDIES TACTICAL ADVICE RESOURCES Infrastructure Optimization Security Storage Networking Mobile & Wireless Hardware & Software Management CURRENT ISSUE Subscribe 1/8 5 Next Level Data Consolidation

More information

Optus Future of Business 2013. Mobility Insights Paper Maximise the potential of your mobile workforce

Optus Future of Business 2013. Mobility Insights Paper Maximise the potential of your mobile workforce Optus Future of Business 2013 Mobility Insights Paper Maximise the potential of your mobile workforce Contents CONTENTS 01 Methodology 01 Executive summary 02 4G mobility enables new ways of working 03

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

Riding technology waves

Riding technology waves BT Assure Riding technology waves Making the bring your own device (BYOD) trend work for you Making the bring your own device (BYOD) trend work for you Your data is everywhere. It s on devices you own

More information

Securing Health Data in a BYOD World

Securing Health Data in a BYOD World BUSINESS WHITE PAPER Securing Health Data in a BYOD World Five strategies to minimize risk Securing Health Data in a BYOD World Table of Contents 2 Introduction 3 BYOD adoption drivers 4 BYOD security

More information

Technology Shifts. Mainframe Windows Desktop Internet

Technology Shifts. Mainframe Windows Desktop Internet Technology Shifts Mainframe Windows Desktop Internet 1975 1980 1985 1990 1995 2000 2005 Mobile Technology Shift March 12, 2010 March 7, 2012 How Significant? Declining PC Sales In the wake of Apple s ipad

More information

SA Series SSL VPN Virtual Appliances

SA Series SSL VPN Virtual Appliances SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by

More information

Practical Enterprise Mobility

Practical Enterprise Mobility Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

How cloud computing can transform your business landscape.

How cloud computing can transform your business landscape. How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about

More information

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013 WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Why Cloud Computing Needs a Cloud-Intelligent Network

Why Cloud Computing Needs a Cloud-Intelligent Network Why Cloud Computing Needs a Cloud-Intelligent Network April 2012 Prepared by: Zeus Kerravala Why Cloud Computing Needs a Cloud-Intelligent Network 2 Why Cloud Computing Needs a Cloud-Intelligent Network

More information

UNIFIED COMMUNICATION COMPARISON GUIDE. Unified Messaging, Mobile Integration & Unified User Interface

UNIFIED COMMUNICATION COMPARISON GUIDE. Unified Messaging, Mobile Integration & Unified User Interface UNIFIED COMMUNICATION COMPARISON GUIDE Unified Messaging, Mobile Integration & Unified User Interface Introduction Unified communications is one of the most promising and powerful business technologies

More information

BYOD: Focus on User Experience, Not the Device

BYOD: Focus on User Experience, Not the Device BYOD: Focus on User Experience, Not the Device May 2012 Prepared by: Zeus Kerravala BYOD: Focus on User Experience, Not the Device by Zeus Kerravala May 2012 º º º º º º º º º º º º º º º º º º º º º º

More information

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the

More information

The Truth About Enterprise Mobile Security Products

The Truth About Enterprise Mobile Security Products The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing

More information

Internet Exchange Between IT and Business Requirements

Internet Exchange Between IT and Business Requirements Mobile Content Becomes a Key Chris Marsh, Principal Analyst, cmarsh@yankeegroup.com Highlights Mobility has reached a critical mass in the workplace. Fifty- seven percent of all employees are using a smartphone

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

HOLDING ON TO YOUR BANDWIDTH

HOLDING ON TO YOUR BANDWIDTH HOLDING ON TO YOUR BANDWIDTH USING APPLICATION CONTROL TO PRIORITIZE YOUR ORGANIZATION'S WIRELESS USAGE Perry Correll, Xirrus, Principal Technologist 1 WI-FI USAGE HAS EVOLVED 2 WI-FI - NO, IT S NOT ALL

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved

More information

Secure Mobile Solutions

Secure Mobile Solutions Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Hosted Desktop for Business

Hosted Desktop for Business Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy

More information

DUBEX CUSTOMER MEETING

DUBEX CUSTOMER MEETING DUBEX CUSTOMER MEETING JOHN YUN Director, Product Marketing Feb 4, 2014 1 AGENDA WebPulse Blue Coat Cloud Service Overview Mobile Device Security 2 WEBPULSE 3 GLOBAL THREAT PROTECTION NEGATIVE DAY DEFENSE

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Enterprise mobility trends 2015 and beyond

Enterprise mobility trends 2015 and beyond Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources

More information

Enterprise Mobility: A Market Perspective!!

Enterprise Mobility: A Market Perspective!! Enterprise Mobility: A Market Perspective!! Paul Black Director Telecommunications and Media IDC Middle East, Africa & Turkey Email: pblack@idc.com Direct: +971 4 446 3106 3 rd Platform Trillions of Things

More information

Mobilize SharePoint Securely: Top 5 Enterprise Requirements

Mobilize SharePoint Securely: Top 5 Enterprise Requirements AN ACCELLION WHITE PAPER Mobilize SharePoint Securely: Top 5 Enterprise Requirements Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto,

More information

A 3-STEP PLAN FOR MOBILE SECURITY

A 3-STEP PLAN FOR MOBILE SECURITY A 3-STEP PLAN FOR MOBILE SECURITY A 3-STEP PLAN FOR MOBILE SECURITY 2 A complex problem that requires a holistic approach Mobility is here. Mobility is now. Mobility (along with cloud and social media)

More information

Mobile Performance Testing Approaches and Challenges

Mobile Performance Testing Approaches and Challenges NOUS INFOSYSTEMS LEVERAGING INTELLECT Mobile Performance Testing Approaches and Challenges ABSTRACT Mobile devices are playing a key role in daily business functions as mobile devices are adopted by most

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

WHITE PAPER AUGUST 2014

WHITE PAPER AUGUST 2014 THE DEFINITIVE GUIDE TO CLOUD ACCESS SECURITY BROKERS WHITE PAPER AUGUST 2014 For many enterprises, security and compliance concerns hamper adoption of cloud applications. Furthermore, cloud applications

More information

Information Technology 2016-2021 Strategic Plan

Information Technology 2016-2021 Strategic Plan Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...

More information

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY DATASHEET HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY Gold level EMM for BlackBerry Regulated-level security for BlackBerry 10 devices Ultimate security. BlackBerry 10 devices managed by BES10 with

More information

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions

More information

2012 Unified Communications & Collaboration SURVEY. Exclusive Research from

2012 Unified Communications & Collaboration SURVEY. Exclusive Research from 2012 Unified Communications & Collaboration SURVEY Exclusive Research from EXECUTIVE SUMMARY Productivity Improvements, Flexibility Key Drivers of Unified Communications and Collaboration Investments Size

More information

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment

I D C V E N D O R S P O T L I G H T. T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment I D C V E N D O R S P O T L I G H T T a m i n g t h e C onsumerization of IT w ith C l o u d - B a s e d M obile De vi c e M a n a g e ment July 2011 Adapted from Worldwide Mobile Device Management Enterprise

More information

The Holistic Guide to BYOD in Your Business Jazib Frahim

The Holistic Guide to BYOD in Your Business Jazib Frahim The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R A d v a n c e d I P S e r v i c e s w i t h A T & T ' s M P L S - E n a b l e

More information

Application Performance Management: New Challenges Demand a New Approach

Application Performance Management: New Challenges Demand a New Approach Application Performance Management: New Challenges Demand a New Approach Introduction Historically IT management has focused on individual technology domains; e.g., LAN, WAN, servers, firewalls, operating

More information

How To Secure Your Mobile Devices

How To Secure Your Mobile Devices SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R F l e x i b l e N e t w o r k - B a s e d, E n t e r p r i s e - C l a s s I P

More information

Bring Your Own Device:

Bring Your Own Device: Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some

More information

Best practices for WiFi in K-12 schools

Best practices for WiFi in K-12 schools Best practices for WiFi in K-12 schools Contents Introduction... 3 The top 10 list... 3 1. Create a five-year plan for the network.... 3 2. Identify wireless coverage requirements... 3 3. Opt for 802.11ac

More information

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD FORTINET Enabling Secure BYOD PAGE 2 Executive Summary Bring Your Own Device (BYOD) is another battle in the war between security

More information

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document

More information