Mobile Security Trends in the Workplace

Size: px
Start display at page:

Download "Mobile Security Trends in the Workplace"

Transcription

1 Mobile Security Trends in the Workplace June 2014

2 Table of Contents 2 Abstract... 3 Key Findings... 4 Mobile Security is a Top Priority for Organizations still navigating BYOD... 5 Mobile security solutions don t get the big picture: It s about the data... 6 Beyond the device: Focus on the apps... 7 Apple or Android... 8 Times are changing: Security vs. Privacy... 8 Conclusion

3 Abstract According to the TomiAhonen Almanac 2014, there are currently 7.1 Billion mobile subscriptions worldwide. With 7.1 Billion people on the planet, this means that the mobile subscription rate is at, or very very near, 100 percent. Furthermore because babies do not yet have mobile phone subscriptions (we don t think!) this means that some people have two or more accounts apiece. For further context, if you took every PC laptops, netbooks, tablets and added them together you d arrive at 1.5 Billion. This means that there are nearly five times as many phones out there as PCs. BYOD and BYOA, both in concept and practice, have been around for a while. By 2016, the number of smartphones is expected to surpass the number of people on the planet. Whether IT knows it or not, these devices are being used in the workplace. According to Gartner, 80 percent of all user access to the enterprise will be via mobile devices by Furthermore, according to a global survey of CIOs by Gartner, Inc.'s Executive Programs, 38 percent of companies expect to stop providing devices to workers by With this in mind, in February 2014, Bluebox surveyed more than 100 IT Professionals and Employees to better understand the role BYOD currently plays. Our findings and analysis of the landscape are included below. 3

4 Key Findings Mobile Security is a Top Priority for 2014 Of the IT Professionals surveyed 64 percent ranked mobile security as a top concern for 2014 with 36 percent reporting that mobile security is not a top 3 priority. In 2014, Mobile Security is My Top Priority 12% Less than a Top 3 Priority 36% A Top 3 Priority 52% 4

5 Organizations still navigating BYOD BYOD has undoubtedly infiltrated the enterprise; however the survey showed that organizations are still navigating the BYOD waters. While the IT Professionals surveyed reported that mobile security was a top concern, fewer than half (40 percent) reported having a policy in place. Alarmingly, but perhaps not surprisingly, a large number of their employees (33 percent) were not aware whether or not their organization had a BYOD policy in place. Meanwhile, an overwhelming majority of employees reported using their smartphones (90 percent) and personal tablets (35 percent) at work. Furthermore, 40 percent use two or more devices at work. Of those that had some knowledge of their organization s BYOD policy, a large number (40 percent) complain about their policy, with as many as six percent admitting to blatant disregard for known security policies. Since BYOD security partially depends on employee compliance, the disconnect between the enterprise policies and employee knowledge and compliance creates unwanted opportunities for unintended mobile data leakage. 5

6 Mobile security solutions don t get the big picture: It s about the data More than half of respondents (56 percent) listed securing mobile data as the most important success criterion for mobile security, yet only 13 percent felt that their current mobile security solution was effective in doing so. Additionally, while nearly 41 percent of respondents reported, reducing data loss as an important criterion, only 13 percent felt that their current solutions were effectively doing so Importance to Mobile Security Success Effectiveess of Curent Mobile Security Solution

7 Beyond the device: Focus on the apps While the entrance of personal devices in the workplace raises concerns over the security of corporate data, the apps used to modify and move this data on these devices compounds that concern. Interestingly, while 30.5 percent of IT Professionals believe that none of their employees are using unapproved apps, and only 17 percent believie that the majority or all of their employees are engaging in this behavior, the majority of employees (71 percent) are using anywhere from one to five apps to access or modify corporate data on their device. Unfortunately, without insight into which apps employees are actually using, IT really has no way of knowing what to secure, or how. Use of Unauthorized Apps IT's Perspective 40 Employee's Actual Zero 5 or fewer unsure

8 Apple or Android While ios devices (62 percent) have a slight lead over Android devices (53 percent) in the workplace, the combination of smartphones and tablets have created a fairly even playing field. This means that IT needs to be able to secure both types of devices in today s BYOD mobile landscape. 70% 60% 50% ios Android 40% Blackberry 30% 20% 10% 0% Times are changing: Security vs. Privacy When asked how they thought about security and employee issues now versus five years ago there was a clear shift. Today, there is a much greater balance between mitigating risk and addressing employee concerns and privacy. Five years ago 30 percent of IT professionals would have said it s all about risk mitigation. I don t factor in employee concerns. Today, only 17 percent take that stance. 8

9 However, the majority of IT professionals surveyed were overall unconcerned with employee privacy, with only 35 percent putting employees needs on par with security concerns and 17 percent not factoring employees needs into the equation at all. Security policy accommodates employee productivity 13% Security vs Privacy Don't factor eomployee concerns 17% Employee concerns equal to risk 22% Employee concerns secondary 48% Employees, however, voiced the polar opposite. Their top concerns: Device wipes removing personal data (82 percent), Invasion of Privacy (76 percent) and Restricted App Access (20 percent). While IT and employees align on concerns over data loss, their concerns and priorities are otherwise at odds. While technology solutions are part of the mobile security success equation, employee compliance and participation will continue to be a key component. Thus, enterprises that take employee concerns into account are likely to achieve better compliance than those that disregard their needs. 9

10 Employee Concerns App Restrictions 4% Non-native UX 2% Reimbursement 5% Privacy 54% Device Wipes 35% Conclusion Organizations are beginning to see the value of BYOD policies; however there is still a sizeable gap in IT s perception, and actual employee use, of personal device and unapproved apps for work. There is also a significant disconnect between employee privacy concerns on, and IT s consideration of, these concerns when it comes to developing policies. This can be traced back to IT s lack of insight into how employees are using their devices and apps. Without visibility, it s hard to have control, or to properly secure corporate data. The result is employees who, in a quest for increased productivity, use the devices and apps they want, working outside the bounds of IT and putting corporate data at risk. To remediate this, IT should continuously audit employee device and app usage for work and create and tune mobile policies accordingly. Once aligned, employees will gain the tools needed to work most efficiently, while IT keeps corporate data secure. 10

11 The results of this survey further underscore the need for IT to listen to the concerns of the end user. By ignoring or downplaying employee concerns over privacy, IT is all but ensuring that these users will continue to operate outside the bounds of IT and further put corporate data at risk the very thing IT is most concerned about. 11

12

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

As Enterprise Mobility Usage Escalates, So Does Security Risk

As Enterprise Mobility Usage Escalates, So Does Security Risk YOUR SECURITY. CONNECTED WHITE PAPER As Enterprise Mobility Usage Escalates, So Does Security Risk Even as more organizations embrace the use of mobile devices by employees and customers to access services

More information

Good Technology State of BYOD Report

Good Technology State of BYOD Report Good Technology State of BYOD Report New data finds Finance and Healthcare industries dominate BYOD picture and that users are willing to pay device and service plan costs if they can use their own devices

More information

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley Auditing Bring Your Own Devices (BYOD) Risks Shannon Buckley Agenda 1. Understanding the trend towards BYOD. 2. Weighing up the cost benefit vs. the risks. 3. Identifying and mitigating the risks. 4. Tips

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: June 2013 Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported and lost, while the

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,

More information

Why Enterprises Need to Optimize Their Data Centers

Why Enterprises Need to Optimize Their Data Centers White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals

More information

Shadow IT in the Enterprise

Shadow IT in the Enterprise Confessions from More than 1,000 Enterprise Users Introduction In today s work environment, the proliferation of smartphones and tablets is driving mobility and a corresponding culture of convenient, always

More information

State of Cloud Survey GERMANY FINDINGS

State of Cloud Survey GERMANY FINDINGS 2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff

More information

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CONTENTS: Enterprise Mobility Strategy and BYOD Policies Endpoint Vulnerabilities and Challenges Conclusion For several decades,

More information

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice

More information

THE REAL ROOT CAUSES OF BREACHES. Security and IT Pros at Odds Over AppSec

THE REAL ROOT CAUSES OF BREACHES. Security and IT Pros at Odds Over AppSec THE REAL ROOT CAUSES OF BREACHES Security and IT Pros at Odds Over AppSec EXECUTIVE SUMMARY Breaches still happen, even with today s intense focus on security. According to Verizon s 2016 Data Breach Investigation

More information

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled effectively. Contents Introduction.... 3 Primary Bring Your Own

More information

Consumer Opinions and Habits A XIRRUS STUDY

Consumer Opinions and Habits A XIRRUS STUDY Consumer Opinions and Habits A XIRRUS STUDY Executive Summary With more devices on the planet than people, it goes without saying that wireless is no longer a bonus - it s a necessity. By the end of 2015,

More information

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director

Webinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director Webinar: Mitigating the risks of uncontrolled content access from mobile devices Presented By: Brian Ulmer, Product Management Director 2013 1 Employees are going mobile Mobile devices are being used for

More information

The 2013 Digital Dilemma Report: Mobility, Security, Productivity Can We Have It All?

The 2013 Digital Dilemma Report: Mobility, Security, Productivity Can We Have It All? The 2013 Digital Dilemma Report: Mobility, Security, Productivity Can We Have It All? January 15, 2013 Sponsored by: www.mobileworkexchange.com 1 Introduction The Digital Government Strategy calls for

More information

3-Part Guide to Developing a BYOD Strategy

3-Part Guide to Developing a BYOD Strategy An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)

More information

Enterprise Mobility Management: Why Size Doesn t Matter

Enterprise Mobility Management: Why Size Doesn t Matter Enterprise Mobility Management: Why Size Doesn t Matter Introduction Whether your organization is ready for it or not, consumerization has come with a vengeance to the world of IT in the form of little

More information

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 An IT Architect s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy As the consumerization

More information

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

Sage Canadian SMB Survey on Mobile Devices March 2013

Sage Canadian SMB Survey on Mobile Devices March 2013 Sage Canadian SMB Survey on Mobile Devices March 2013 Summary Report Introduction Sage North America, a leading provider of business management software and services to more than 6 million small and midsized

More information

BlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet

BlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet Datasheet BlackBerry WorkLife Persona The Challenge An increasing number of employees today are using their own devices for work purposes, blurring the line between personal and business usage. This demand

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information

US 2013 Consumer Data Privacy Study Mobile Edition

US 2013 Consumer Data Privacy Study Mobile Edition RESEARCH REPORT US 2013 Consumer Data Privacy Study Mobile Edition 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0

More information

Security Solutions for Mobile Users in the Workplace

Security Solutions for Mobile Users in the Workplace Security Solutions for Mobile Users in the Workplace 1 1 Multitasking means multiple devices for busy end users Introduction Cloud computing helps organizations operate with less infrastructure, reducing

More information

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on Bring Your

More information

The future of UC&C on mobile

The future of UC&C on mobile SURVEY REPORT The future of UC&C on mobile Published by 2018 Introduction The future of UC&C on mobile report gives us insight into how operators and manufacturers around the world rate their unified communication

More information

Sage SMB Survey on Mobile Devices: Manufacturing and Distribution Industries. March 2013

Sage SMB Survey on Mobile Devices: Manufacturing and Distribution Industries. March 2013 Sage SMB Survey on Mobile Devices: Manufacturing and Distribution Industries Summary Report Page 2 Introduction The following is an analysis of small and midsized businesses in the manufacturing and distribution

More information

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT 01. EXECUTIVE SUMMARY This report summarizes recent research on distributed denial of service (DDoS) attacks, which looks at data collated recently and

More information

2016 Survey: A Pulse on Mobility in Healthcare

2016 Survey: A Pulse on Mobility in Healthcare 2016 Survey: A Pulse on Mobility in Healthcare Introduction Mobile Trends in Healthcare Mobility in Healthcare Top Motivation for Implementing a Mobile Solution Impact of Mobility on Patient Experience

More information

Protecting Health Information

Protecting Health Information Agenda Protecting Health Information BRONSON HEALTHCARE GROUP INFORMATION TECHNOLOGY SECURITY ENGINEERING MICHAEL SMITH Personal device usage with sensitive data Mobile devices and BYOD Secure messaging

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more - Samsung Tablet Photo - Tablets Mean Business Survey of IT pros reflects growing trend toward tablets for workforce mobility and more Table of contents Introduction 2 Giving employees what they want pays

More information

Tripwire State of Container Security Report

Tripwire State of Container Security Report RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams

More information

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013 Securing Wireless Mobile Devices Lamaris Davis East Carolina University 11/15/2013 Attract As more employees prefer to use mobile devices in the workplace, organizations are starting to adopt the Bring

More information

BYOD. Transformation. Joe Leonard Director, Secure Networks. April 3, 2013

BYOD. Transformation. Joe Leonard Director, Secure Networks. April 3, 2013 BYOD Transformation April 3, 2013 Joe Leonard Director, Secure Networks Agenda Joe Leonard Introduction CIO Top 10 Tech Priorities What is BYOD? BYOD Trends BYOD Threats Security Best Practices HIPAA Security

More information

CICS insights from IT professionals revealed

CICS insights from IT professionals revealed CICS insights from IT professionals revealed A CICS survey analysis report from: IBM, CICS, and z/os are registered trademarks of International Business Machines Corporation in the United States, other

More information

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:

More information

TESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS

TESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS WHITE PAPER TESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS Today s online environments have created a dramatic new set of challenges for the software professionals responsible for the quality

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

The data quality trends report

The data quality trends report Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database

More information

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their

More information

Disaster Unpreparedness June 3, 2013

Disaster Unpreparedness June 3, 2013 Disaster Unpreparedness June 3, 2013 Underwritten by: Introduction Government relies on data and information to deliver mission success. Data loss means more than files simply missing from a database it

More information

Sage survey of the food and beverage industry sectors about their use of mobile technology 2014 Summary report

Sage survey of the food and beverage industry sectors about their use of mobile technology 2014 Summary report Sage survey of the food and beverage industry sectors about their use of mobile technology 2014 Summary report Sage survey of food and beverage industry usage of mobile technology Page 1 of 8 Introduction

More information

ENTERPRISE MOBILITY TRENDS

ENTERPRISE MOBILITY TRENDS ENTERPRISE MOBILITY TRENDS Raghuram Nair, Nandakishore Bellore Enterprise Mobility has emerged as a top technology trend globally. Every enterprise with a mobile workforce has an imperative to deploy a

More information

2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION

2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION 2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION 2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION The annual Jamf Trends Survey looked at Apple in higher education evaluating growth, key drivers

More information

Spotlight Report. Information Security. Presented by. Group Partner

Spotlight Report. Information Security. Presented by. Group Partner Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in

More information

RIS News Custom Research

RIS News Custom Research RIS News Custom Research Tablets on the RISE Have tablets transformed retail yet? Clear trends emerge as the rollout continues produced by By JOE SKORUPA Tablets on the Rise Have tablets transformed retail

More information

2018 Report The State of Securing Cloud Workloads

2018 Report The State of Securing Cloud Workloads 2018 Report The State of Securing Cloud Workloads 1 Welcome to our 2018 report on the state of securing cloud workloads A summary of the responses of close to 350 professionals whose primary areas of responsibility

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

Agenda. BYOD, Texting & Social Media How to Keep BYODFrom Becoming OMG! Introduction BYOD Defined Trends By the Numbers

Agenda. BYOD, Texting & Social Media How to Keep BYODFrom Becoming OMG! Introduction BYOD Defined Trends By the Numbers BYOD, Texting & Social Media How to Keep BYODFrom Becoming OMG! Daniel M. Briley, CISSP, CIPP Managing Director Summit Security Group Agenda Introduction BYOD Defined Trends By the Numbers Common Risks

More information

Trustlook Insights Q BYOD Trends & Practices

Trustlook Insights Q BYOD Trends & Practices Trustlook Insights Q4 2016 BYOD Trends & Practices Overview BYOD is the practice of allowing employees to use personal devices at work. It gives employees freedom over where (and how) they work, and allows

More information

Key Authentication Considerations for Your Mobile Strategy

Key Authentication Considerations for Your Mobile Strategy Key Authentication Considerations for Your Mobile Strategy The Need for Mobile Authentication Reaches Critical Mass According to an old adage, consumers speak through their pocketbooks. While that saying

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS January 2018 Sponsored by Introduction 302 network professionals and IT strategists completed a global survey on Software Defined Networks (SDNs) to gather hard data on SDN adoption and operational challenges.

More information

Rethinking MDM in a BYOD World

Rethinking MDM in a BYOD World Rethinking MDM in a BYOD World 2012 Citrix and TechTarget Table of Contents Summary....................................................... 3 Introduction....................................................

More information

CO-OP Mobile: Mobile App for ipads. April 18, 2013

CO-OP Mobile: Mobile App for ipads. April 18, 2013 CO-OP Mobile: Mobile App for ipads April 18, 2013 1 Today s Presenters DIANEZABLIT Product Marketing Manager RANDYTHOMPSON Senior Product Manager 2 Agenda Marketplace Mobile Trends CO-OP Mobile Overview

More information

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe

Say Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe Say Goodbye to Enterprise IT: Welcome to the Mobile First World Sean Ginevan, Senior Director, Strategy Infosecurity Europe - 2015 Sean Ginevan Sr. Director, Strategy, MobileIron Linkedin.com/in/sginevan

More information

Just Like New: Understanding the Secondary Smartphone Market

Just Like New: Understanding the Secondary Smartphone Market Just Like New: Understanding the Secondary Smartphone Market William Stofega, Program Director, Mobile Device Technology and Trends Anthony Scarsella, Research Manager, Mobile Phones IDC Web Conference

More information

State of SMB IT 1H 2012

State of SMB IT 1H 2012 TM Voice of IT State of SMB IT 1H 2012 Semi-Annual Report On Small And Medium Business Technology Plans & Purchase Intent Spiceworks Inc., 7300 FM 2222, Bldg 3, Ste 100, Austin, TX 78730 Tel: 1-512-628-8280

More information

The Next Generation of Mobile Learning. Tamar Elkeles, Qualcomm Kevin Oakes, i4cp

The Next Generation of Mobile Learning. Tamar Elkeles, Qualcomm Kevin Oakes, i4cp The Next Generation of Mobile Learning Tamar Elkeles, Qualcomm Kevin Oakes, i4cp About i4cp i4cp focuses on the people practices that make high performance organizations unique. High-performance organizations

More information

WELCOME TO MYTOMCHAT.COM. World-Mobile Solutions Ltd, UK

WELCOME TO MYTOMCHAT.COM. World-Mobile Solutions Ltd, UK WELCOME TO MYTOMCHAT.COM Technology in every business sector is evolving at an ever increasing rate WHAT'S NEXT FOR BUSINESS COMMUNICATIONS? WELCOME TO YOUR NEW OFFICE Fixed communications are becoming

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop Executive Brief Summary There is a new development in the Bring Your Own Device (BYOD) movement in today s

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Should the users be informed? Differences in risk perception between Android and iphone users

Should the users be informed? Differences in risk perception between Android and iphone users Should the users be informed? Differences in risk perception between Android and iphone users Workshop on Risk Perception at SOUPS 2013, Newcastle upon Tyne Zinaida Benenson, Lena Reinfelder IT Security

More information

Mobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence

Mobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence Mobile Experience and Security - A Delicate Balance Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence Admin Items Please put phones on vibrate Please take calls

More information

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk Assure the board your company won t be the next data breach Introduction A solid vulnerability management program is critical

More information

BYOD WORK THE NUTS AND BOLTS OF MAKING. Brent Gatewood, CRM

BYOD WORK THE NUTS AND BOLTS OF MAKING. Brent Gatewood, CRM THE NUTS AND BOLTS OF MAKING BYOD Mobile technology is changing at an astonishing rate, and employees are increasingly using their personally owned devices for business purposes sanctioned or not. Organizations,

More information

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals 2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

Vulnerability Management Survey

Vulnerability Management Survey Vulnerability Management Survey Executive Summary November 1 st, 2006 Conducted by Trusted Strategies for Shavlik Technologies LLC Author: Bill Bosen About Trusted Strategies is a research and advisory

More information

Top Network Considerations for Enterprise Mobility and BYOD

Top Network Considerations for Enterprise Mobility and BYOD Top Network Considerations for Enterprise Mobility and BYOD Survey pinpoints struggle to support BYOD and other worker-friendly technologies while achieving security & performance goals 1 Top Network Considerations

More information

South Central Power Notification Effectiveness Study. Study conducted by Metrix Matrix

South Central Power Notification Effectiveness Study. Study conducted by Metrix Matrix South Central Power Notification Effectiveness Study Study conducted by Metrix Matrix South Central Power Background Member-owned electric cooperative Standard Practice: HVCA to report outages staff to

More information

Securing the SMB Cloud Generation

Securing the SMB Cloud Generation Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product

More information

2013, Healthcare Intelligence Network

2013, Healthcare Intelligence Network Note: This is an authorized excerpt from 2013 Healthcare Benchmarks: Mobile Health. To download the entire report, go to http://store.hin.com/product.asp?itemid=4586 or call 888-446-3530. 2013, Healthcare

More information

2013 InterWorks, Page 1

2013 InterWorks, Page 1 2013 InterWorks, Page 1 The BYOD Phenomenon 68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets. IT organizations

More information

2018 Mobile Security Report

2018 Mobile Security Report 2018 Mobile Security Report CONTENTS Introduction 3 Businesses suspect their mobile workers are being hacked 4 Cafés, airports and hotels: a hotspot for Wi-Fi related security incidents 5 BYOD: Bring Your

More information

Make security part of your client systems refresh

Make security part of your client systems refresh Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for

More information

Next Generation Authentication

Next Generation Authentication Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%

More information

Survey Results: Virtual Insecurity

Survey Results: Virtual Insecurity Best Practices SURVEY Survey Results: Virtual Insecurity May 2013 Executive Summary: Virtual Assets Could Bring Real Risk Virtualization technologies have reshaped how IT offers and delivers their services

More information

Mobility Advantage: Why Secure Your Mobile Devices?

Mobility Advantage: Why Secure Your Mobile Devices? white paper Mobility Advantage: Why Secure Your Mobile Devices? www.sybase.com Table of Contents Mobile Insecurity The Elephant in the Room 1 Understanding Mobility Risks and Remedies 1 Risks related to

More information

Taming the Mobile File Sharing Beast

Taming the Mobile File Sharing Beast White Paper File and Networking Services Taming the Mobile File Sharing Beast To Whom Should You Entrust the Enterprise Goods? Mobile file access and sharing is not only the rage, but it s fast becoming

More information

Healthcare Information and Management Systems Society HIMSS. U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002

Healthcare Information and Management Systems Society HIMSS. U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002 Healthcare Information and Management Systems Society HIMSS U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002 HIMSS / Phoenix Health Systems Healthcare Industry Quarterly

More information

Consolidated Edition. 5th Annual State of Application Security Report Perception vs. Reality

Consolidated Edition. 5th Annual State of Application Security Report Perception vs. Reality Consolidated Edition 5th Annual State of Application Security Report Perception vs. Reality January 2016 State of Application Security Report Consolidated Edition 2 Table of Contents Executive Summary...

More information

Table of Contents. Location-Based Engagement 2-7. Responding to advertising 2. Usage of Mobile Apps 4. Mobile Shopping 5. Smartphone Owners 7

Table of Contents. Location-Based Engagement 2-7. Responding to advertising 2. Usage of Mobile Apps 4. Mobile Shopping 5. Smartphone Owners 7 Table of Contents Location-Based Engagement 2-7 Responding to advertising 2 Usage of Mobile Apps 4 Mobile Shopping 5 Smartphone Owners 7 Connected Device Trends and Adoption 8-10 U.S. Highlights 8 U.K.

More information

State of Report

State of  Report State of Email Report Overview The following Edison State of Email report offers an in depth analysis of national consumer behaviors and sentiments associated with using email. The research demonstrates

More information

CommTech White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync

CommTech White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync CommTech White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync October 2015 Copyright 2015 CommTech Introduction The rapid adoption of consumer-grade file sync services

More information

ACL Interpretive Visual Remediation

ACL Interpretive Visual Remediation January 2016 ACL Interpretive Visual Remediation Innovation in Internal Control Management SOLUTIONPERSPECTIVE Governance, Risk Management & Compliance Insight 2015 GRC 20/20 Research, LLC. All Rights

More information

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization

More information

Get Ready for Wearables at Work. Survey of IT pros reveals drivers, benefits, and challenges of supporting wearables in the workforce

Get Ready for Wearables at Work. Survey of IT pros reveals drivers, benefits, and challenges of supporting wearables in the workforce - Samsung Tablet Photo - Get Ready for Wearables at Work Survey of IT pros reveals drivers, benefits, and challenges of supporting wearables in the workforce Table of contents Introduction 2 The move to

More information

THE RISE OF BYOD. BYOD increases employee mobility and, consequently, organizational flexibility, efficiency, and collaboration.

THE RISE OF BYOD. BYOD increases employee mobility and, consequently, organizational flexibility, efficiency, and collaboration. The rise of the cloud has enabled employees to perform an ever-growing amount of work from mobile devices, forcing organizations to rethink how they protect their data. Bring your own device (BYOD), whereby

More information

2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results. October

2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results. October 2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results October 2013 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Carina Bustamente,

More information

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic KEY FINDINGS INTERACTIVE GUIDE Uncovering Hidden Threats within Encrypted Traffic Introduction In a study commissioned by A10 Networks, Ponemon surveyed 1,023 IT and IT security practitioners in North

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

The State of the Trust Gap in 2015

The State of the Trust Gap in 2015 The State of the Trust Gap in 2015 The widespread use of mobile devices for work has driven a profound change in how employees think about the privacy of their personal data on mobile devices. Ten years

More information

June 2017 intel.com schneider-electric.com

June 2017 intel.com schneider-electric.com DCIM Solution Deployment June 2017 intel.com schneider-electric.com DCIM Solution Deployment Introduction Current state of data center management Do you currently have a solution deployed? 20% 80% The

More information

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today White Paper As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile devices.

More information

Operationalize Security To Secure Your Data Perimeter

Operationalize Security To Secure Your Data Perimeter Operationalize Security To Secure Your Data Perimeter GET STARTED Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business.

More information

Toward an Automated Future

Toward an Automated Future 2017 State of the Network Engineer: Toward an Automated Future netbraintech.com Executive Summary Today s enterprises have reached a tipping point when it comes to network management. Networks are growing

More information