Mobile Security Trends in the Workplace
|
|
- Christina Banks
- 6 years ago
- Views:
Transcription
1 Mobile Security Trends in the Workplace June 2014
2 Table of Contents 2 Abstract... 3 Key Findings... 4 Mobile Security is a Top Priority for Organizations still navigating BYOD... 5 Mobile security solutions don t get the big picture: It s about the data... 6 Beyond the device: Focus on the apps... 7 Apple or Android... 8 Times are changing: Security vs. Privacy... 8 Conclusion
3 Abstract According to the TomiAhonen Almanac 2014, there are currently 7.1 Billion mobile subscriptions worldwide. With 7.1 Billion people on the planet, this means that the mobile subscription rate is at, or very very near, 100 percent. Furthermore because babies do not yet have mobile phone subscriptions (we don t think!) this means that some people have two or more accounts apiece. For further context, if you took every PC laptops, netbooks, tablets and added them together you d arrive at 1.5 Billion. This means that there are nearly five times as many phones out there as PCs. BYOD and BYOA, both in concept and practice, have been around for a while. By 2016, the number of smartphones is expected to surpass the number of people on the planet. Whether IT knows it or not, these devices are being used in the workplace. According to Gartner, 80 percent of all user access to the enterprise will be via mobile devices by Furthermore, according to a global survey of CIOs by Gartner, Inc.'s Executive Programs, 38 percent of companies expect to stop providing devices to workers by With this in mind, in February 2014, Bluebox surveyed more than 100 IT Professionals and Employees to better understand the role BYOD currently plays. Our findings and analysis of the landscape are included below. 3
4 Key Findings Mobile Security is a Top Priority for 2014 Of the IT Professionals surveyed 64 percent ranked mobile security as a top concern for 2014 with 36 percent reporting that mobile security is not a top 3 priority. In 2014, Mobile Security is My Top Priority 12% Less than a Top 3 Priority 36% A Top 3 Priority 52% 4
5 Organizations still navigating BYOD BYOD has undoubtedly infiltrated the enterprise; however the survey showed that organizations are still navigating the BYOD waters. While the IT Professionals surveyed reported that mobile security was a top concern, fewer than half (40 percent) reported having a policy in place. Alarmingly, but perhaps not surprisingly, a large number of their employees (33 percent) were not aware whether or not their organization had a BYOD policy in place. Meanwhile, an overwhelming majority of employees reported using their smartphones (90 percent) and personal tablets (35 percent) at work. Furthermore, 40 percent use two or more devices at work. Of those that had some knowledge of their organization s BYOD policy, a large number (40 percent) complain about their policy, with as many as six percent admitting to blatant disregard for known security policies. Since BYOD security partially depends on employee compliance, the disconnect between the enterprise policies and employee knowledge and compliance creates unwanted opportunities for unintended mobile data leakage. 5
6 Mobile security solutions don t get the big picture: It s about the data More than half of respondents (56 percent) listed securing mobile data as the most important success criterion for mobile security, yet only 13 percent felt that their current mobile security solution was effective in doing so. Additionally, while nearly 41 percent of respondents reported, reducing data loss as an important criterion, only 13 percent felt that their current solutions were effectively doing so Importance to Mobile Security Success Effectiveess of Curent Mobile Security Solution
7 Beyond the device: Focus on the apps While the entrance of personal devices in the workplace raises concerns over the security of corporate data, the apps used to modify and move this data on these devices compounds that concern. Interestingly, while 30.5 percent of IT Professionals believe that none of their employees are using unapproved apps, and only 17 percent believie that the majority or all of their employees are engaging in this behavior, the majority of employees (71 percent) are using anywhere from one to five apps to access or modify corporate data on their device. Unfortunately, without insight into which apps employees are actually using, IT really has no way of knowing what to secure, or how. Use of Unauthorized Apps IT's Perspective 40 Employee's Actual Zero 5 or fewer unsure
8 Apple or Android While ios devices (62 percent) have a slight lead over Android devices (53 percent) in the workplace, the combination of smartphones and tablets have created a fairly even playing field. This means that IT needs to be able to secure both types of devices in today s BYOD mobile landscape. 70% 60% 50% ios Android 40% Blackberry 30% 20% 10% 0% Times are changing: Security vs. Privacy When asked how they thought about security and employee issues now versus five years ago there was a clear shift. Today, there is a much greater balance between mitigating risk and addressing employee concerns and privacy. Five years ago 30 percent of IT professionals would have said it s all about risk mitigation. I don t factor in employee concerns. Today, only 17 percent take that stance. 8
9 However, the majority of IT professionals surveyed were overall unconcerned with employee privacy, with only 35 percent putting employees needs on par with security concerns and 17 percent not factoring employees needs into the equation at all. Security policy accommodates employee productivity 13% Security vs Privacy Don't factor eomployee concerns 17% Employee concerns equal to risk 22% Employee concerns secondary 48% Employees, however, voiced the polar opposite. Their top concerns: Device wipes removing personal data (82 percent), Invasion of Privacy (76 percent) and Restricted App Access (20 percent). While IT and employees align on concerns over data loss, their concerns and priorities are otherwise at odds. While technology solutions are part of the mobile security success equation, employee compliance and participation will continue to be a key component. Thus, enterprises that take employee concerns into account are likely to achieve better compliance than those that disregard their needs. 9
10 Employee Concerns App Restrictions 4% Non-native UX 2% Reimbursement 5% Privacy 54% Device Wipes 35% Conclusion Organizations are beginning to see the value of BYOD policies; however there is still a sizeable gap in IT s perception, and actual employee use, of personal device and unapproved apps for work. There is also a significant disconnect between employee privacy concerns on, and IT s consideration of, these concerns when it comes to developing policies. This can be traced back to IT s lack of insight into how employees are using their devices and apps. Without visibility, it s hard to have control, or to properly secure corporate data. The result is employees who, in a quest for increased productivity, use the devices and apps they want, working outside the bounds of IT and putting corporate data at risk. To remediate this, IT should continuously audit employee device and app usage for work and create and tune mobile policies accordingly. Once aligned, employees will gain the tools needed to work most efficiently, while IT keeps corporate data secure. 10
11 The results of this survey further underscore the need for IT to listen to the concerns of the end user. By ignoring or downplaying employee concerns over privacy, IT is all but ensuring that these users will continue to operate outside the bounds of IT and further put corporate data at risk the very thing IT is most concerned about. 11
12
MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner
MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use
More informationAs Enterprise Mobility Usage Escalates, So Does Security Risk
YOUR SECURITY. CONNECTED WHITE PAPER As Enterprise Mobility Usage Escalates, So Does Security Risk Even as more organizations embrace the use of mobile devices by employees and customers to access services
More informationGood Technology State of BYOD Report
Good Technology State of BYOD Report New data finds Finance and Healthcare industries dominate BYOD picture and that users are willing to pay device and service plan costs if they can use their own devices
More informationAuditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley
Auditing Bring Your Own Devices (BYOD) Risks Shannon Buckley Agenda 1. Understanding the trend towards BYOD. 2. Weighing up the cost benefit vs. the risks. 3. Identifying and mitigating the risks. 4. Tips
More informationTHE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:
June 2013 Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported and lost, while the
More informationTHE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:
October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,
More informationWhy Enterprises Need to Optimize Their Data Centers
White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals
More informationShadow IT in the Enterprise
Confessions from More than 1,000 Enterprise Users Introduction In today s work environment, the proliferation of smartphones and tablets is driving mobility and a corresponding culture of convenient, always
More informationState of Cloud Survey GERMANY FINDINGS
2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff
More informationCHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION
CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CONTENTS: Enterprise Mobility Strategy and BYOD Policies Endpoint Vulnerabilities and Challenges Conclusion For several decades,
More informationBYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips
Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice
More informationTHE REAL ROOT CAUSES OF BREACHES. Security and IT Pros at Odds Over AppSec
THE REAL ROOT CAUSES OF BREACHES Security and IT Pros at Odds Over AppSec EXECUTIVE SUMMARY Breaches still happen, even with today s intense focus on security. According to Verizon s 2016 Data Breach Investigation
More informationBYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled
BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled effectively. Contents Introduction.... 3 Primary Bring Your Own
More informationConsumer Opinions and Habits A XIRRUS STUDY
Consumer Opinions and Habits A XIRRUS STUDY Executive Summary With more devices on the planet than people, it goes without saying that wireless is no longer a bonus - it s a necessity. By the end of 2015,
More informationWebinar: Mitigating the risks of uncontrolled content access from mobile devices. Presented By: Brian Ulmer, Product Management Director
Webinar: Mitigating the risks of uncontrolled content access from mobile devices Presented By: Brian Ulmer, Product Management Director 2013 1 Employees are going mobile Mobile devices are being used for
More informationThe 2013 Digital Dilemma Report: Mobility, Security, Productivity Can We Have It All?
The 2013 Digital Dilemma Report: Mobility, Security, Productivity Can We Have It All? January 15, 2013 Sponsored by: www.mobileworkexchange.com 1 Introduction The Digital Government Strategy calls for
More information3-Part Guide to Developing a BYOD Strategy
An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)
More informationEnterprise Mobility Management: Why Size Doesn t Matter
Enterprise Mobility Management: Why Size Doesn t Matter Introduction Whether your organization is ready for it or not, consumerization has come with a vengeance to the world of IT in the form of little
More informationTHREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017
THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 An IT Architect s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy As the consumerization
More informationThe Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationSage Canadian SMB Survey on Mobile Devices March 2013
Sage Canadian SMB Survey on Mobile Devices March 2013 Summary Report Introduction Sage North America, a leading provider of business management software and services to more than 6 million small and midsized
More informationBlackBerry WorkLife Persona. The Challenge. The Solution. Datasheet
Datasheet BlackBerry WorkLife Persona The Challenge An increasing number of employees today are using their own devices for work purposes, blurring the line between personal and business usage. This demand
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationUS 2013 Consumer Data Privacy Study Mobile Edition
RESEARCH REPORT US 2013 Consumer Data Privacy Study Mobile Edition 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0
More informationSecurity Solutions for Mobile Users in the Workplace
Security Solutions for Mobile Users in the Workplace 1 1 Multitasking means multiple devices for busy end users Introduction Cloud computing helps organizations operate with less infrastructure, reducing
More informationMOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)
MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on Bring Your
More informationThe future of UC&C on mobile
SURVEY REPORT The future of UC&C on mobile Published by 2018 Introduction The future of UC&C on mobile report gives us insight into how operators and manufacturers around the world rate their unified communication
More informationSage SMB Survey on Mobile Devices: Manufacturing and Distribution Industries. March 2013
Sage SMB Survey on Mobile Devices: Manufacturing and Distribution Industries Summary Report Page 2 Introduction The following is an analysis of small and midsized businesses in the manufacturing and distribution
More informationDDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT
DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT 01. EXECUTIVE SUMMARY This report summarizes recent research on distributed denial of service (DDoS) attacks, which looks at data collated recently and
More information2016 Survey: A Pulse on Mobility in Healthcare
2016 Survey: A Pulse on Mobility in Healthcare Introduction Mobile Trends in Healthcare Mobility in Healthcare Top Motivation for Implementing a Mobile Solution Impact of Mobility on Patient Experience
More informationProtecting Health Information
Agenda Protecting Health Information BRONSON HEALTHCARE GROUP INFORMATION TECHNOLOGY SECURITY ENGINEERING MICHAEL SMITH Personal device usage with sensitive data Mobile devices and BYOD Secure messaging
More informationFundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL
Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day
More information- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more
- Samsung Tablet Photo - Tablets Mean Business Survey of IT pros reflects growing trend toward tablets for workforce mobility and more Table of contents Introduction 2 Giving employees what they want pays
More informationTripwire State of Container Security Report
RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams
More informationSecuring Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013
Securing Wireless Mobile Devices Lamaris Davis East Carolina University 11/15/2013 Attract As more employees prefer to use mobile devices in the workplace, organizations are starting to adopt the Bring
More informationBYOD. Transformation. Joe Leonard Director, Secure Networks. April 3, 2013
BYOD Transformation April 3, 2013 Joe Leonard Director, Secure Networks Agenda Joe Leonard Introduction CIO Top 10 Tech Priorities What is BYOD? BYOD Trends BYOD Threats Security Best Practices HIPAA Security
More informationCICS insights from IT professionals revealed
CICS insights from IT professionals revealed A CICS survey analysis report from: IBM, CICS, and z/os are registered trademarks of International Business Machines Corporation in the United States, other
More informationSECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE
SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:
More informationTESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS
WHITE PAPER TESTING TRENDS IN 2015: A SURVEY OF SOFTWARE PROFESSIONALS Today s online environments have created a dramatic new set of challenges for the software professionals responsible for the quality
More informationHearing Voices: The Cybersecurity Pro s View of the Profession
SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International
More informationThe data quality trends report
Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database
More informationSurvey Guide: Businesses Should Begin Preparing for the Death of the Password
Survey Guide: Businesses Should Begin Preparing for the Death of the Password Survey Guide: Businesses Should Begin Preparing for the Death of the Password The way digital enterprises connect with their
More informationDisaster Unpreparedness June 3, 2013
Disaster Unpreparedness June 3, 2013 Underwritten by: Introduction Government relies on data and information to deliver mission success. Data loss means more than files simply missing from a database it
More informationSage survey of the food and beverage industry sectors about their use of mobile technology 2014 Summary report
Sage survey of the food and beverage industry sectors about their use of mobile technology 2014 Summary report Sage survey of food and beverage industry usage of mobile technology Page 1 of 8 Introduction
More informationENTERPRISE MOBILITY TRENDS
ENTERPRISE MOBILITY TRENDS Raghuram Nair, Nandakishore Bellore Enterprise Mobility has emerged as a top technology trend globally. Every enterprise with a mobile workforce has an imperative to deploy a
More information2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION
2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION 2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION The annual Jamf Trends Survey looked at Apple in higher education evaluating growth, key drivers
More informationSpotlight Report. Information Security. Presented by. Group Partner
Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in
More informationRIS News Custom Research
RIS News Custom Research Tablets on the RISE Have tablets transformed retail yet? Clear trends emerge as the rollout continues produced by By JOE SKORUPA Tablets on the Rise Have tablets transformed retail
More information2018 Report The State of Securing Cloud Workloads
2018 Report The State of Securing Cloud Workloads 1 Welcome to our 2018 report on the state of securing cloud workloads A summary of the responses of close to 350 professionals whose primary areas of responsibility
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationAgenda. BYOD, Texting & Social Media How to Keep BYODFrom Becoming OMG! Introduction BYOD Defined Trends By the Numbers
BYOD, Texting & Social Media How to Keep BYODFrom Becoming OMG! Daniel M. Briley, CISSP, CIPP Managing Director Summit Security Group Agenda Introduction BYOD Defined Trends By the Numbers Common Risks
More informationTrustlook Insights Q BYOD Trends & Practices
Trustlook Insights Q4 2016 BYOD Trends & Practices Overview BYOD is the practice of allowing employees to use personal devices at work. It gives employees freedom over where (and how) they work, and allows
More informationKey Authentication Considerations for Your Mobile Strategy
Key Authentication Considerations for Your Mobile Strategy The Need for Mobile Authentication Reaches Critical Mass According to an old adage, consumers speak through their pocketbooks. While that saying
More informationA Global Look at IT Audit Best Practices
A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory
More informationSDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS
January 2018 Sponsored by Introduction 302 network professionals and IT strategists completed a global survey on Software Defined Networks (SDNs) to gather hard data on SDN adoption and operational challenges.
More informationRethinking MDM in a BYOD World
Rethinking MDM in a BYOD World 2012 Citrix and TechTarget Table of Contents Summary....................................................... 3 Introduction....................................................
More informationCO-OP Mobile: Mobile App for ipads. April 18, 2013
CO-OP Mobile: Mobile App for ipads April 18, 2013 1 Today s Presenters DIANEZABLIT Product Marketing Manager RANDYTHOMPSON Senior Product Manager 2 Agenda Marketplace Mobile Trends CO-OP Mobile Overview
More informationSay Goodbye to Enterprise IT: Welcome to the Mobile First World. Sean Ginevan, Senior Director, Strategy Infosecurity Europe
Say Goodbye to Enterprise IT: Welcome to the Mobile First World Sean Ginevan, Senior Director, Strategy Infosecurity Europe - 2015 Sean Ginevan Sr. Director, Strategy, MobileIron Linkedin.com/in/sginevan
More informationJust Like New: Understanding the Secondary Smartphone Market
Just Like New: Understanding the Secondary Smartphone Market William Stofega, Program Director, Mobile Device Technology and Trends Anthony Scarsella, Research Manager, Mobile Phones IDC Web Conference
More informationState of SMB IT 1H 2012
TM Voice of IT State of SMB IT 1H 2012 Semi-Annual Report On Small And Medium Business Technology Plans & Purchase Intent Spiceworks Inc., 7300 FM 2222, Bldg 3, Ste 100, Austin, TX 78730 Tel: 1-512-628-8280
More informationThe Next Generation of Mobile Learning. Tamar Elkeles, Qualcomm Kevin Oakes, i4cp
The Next Generation of Mobile Learning Tamar Elkeles, Qualcomm Kevin Oakes, i4cp About i4cp i4cp focuses on the people practices that make high performance organizations unique. High-performance organizations
More informationWELCOME TO MYTOMCHAT.COM. World-Mobile Solutions Ltd, UK
WELCOME TO MYTOMCHAT.COM Technology in every business sector is evolving at an ever increasing rate WHAT'S NEXT FOR BUSINESS COMMUNICATIONS? WELCOME TO YOUR NEW OFFICE Fixed communications are becoming
More informationTHE CYBERSECURITY LITERACY CONFIDENCE GAP
CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks
More informationHow to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop
How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop Executive Brief Summary There is a new development in the Bring Your Own Device (BYOD) movement in today s
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationShould the users be informed? Differences in risk perception between Android and iphone users
Should the users be informed? Differences in risk perception between Android and iphone users Workshop on Risk Perception at SOUPS 2013, Newcastle upon Tyne Zinaida Benenson, Lena Reinfelder IT Security
More informationMobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence
Mobile Experience and Security - A Delicate Balance Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence Admin Items Please put phones on vibrate Please take calls
More informationwhitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk
whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk Assure the board your company won t be the next data breach Introduction A solid vulnerability management program is critical
More informationBYOD WORK THE NUTS AND BOLTS OF MAKING. Brent Gatewood, CRM
THE NUTS AND BOLTS OF MAKING BYOD Mobile technology is changing at an astonishing rate, and employees are increasingly using their personally owned devices for business purposes sanctioned or not. Organizations,
More information2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals
2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals Sponsored by Contents Introduction....3 Key Takeaways from the 2017 Report:....3 Security
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationVulnerability Management Survey
Vulnerability Management Survey Executive Summary November 1 st, 2006 Conducted by Trusted Strategies for Shavlik Technologies LLC Author: Bill Bosen About Trusted Strategies is a research and advisory
More informationTop Network Considerations for Enterprise Mobility and BYOD
Top Network Considerations for Enterprise Mobility and BYOD Survey pinpoints struggle to support BYOD and other worker-friendly technologies while achieving security & performance goals 1 Top Network Considerations
More informationSouth Central Power Notification Effectiveness Study. Study conducted by Metrix Matrix
South Central Power Notification Effectiveness Study Study conducted by Metrix Matrix South Central Power Background Member-owned electric cooperative Standard Practice: HVCA to report outages staff to
More informationSecuring the SMB Cloud Generation
Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product
More information2013, Healthcare Intelligence Network
Note: This is an authorized excerpt from 2013 Healthcare Benchmarks: Mobile Health. To download the entire report, go to http://store.hin.com/product.asp?itemid=4586 or call 888-446-3530. 2013, Healthcare
More information2013 InterWorks, Page 1
2013 InterWorks, Page 1 The BYOD Phenomenon 68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets. IT organizations
More information2018 Mobile Security Report
2018 Mobile Security Report CONTENTS Introduction 3 Businesses suspect their mobile workers are being hacked 4 Cafés, airports and hotels: a hotspot for Wi-Fi related security incidents 5 BYOD: Bring Your
More informationMake security part of your client systems refresh
Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for
More informationNext Generation Authentication
Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%
More informationSurvey Results: Virtual Insecurity
Best Practices SURVEY Survey Results: Virtual Insecurity May 2013 Executive Summary: Virtual Assets Could Bring Real Risk Virtualization technologies have reshaped how IT offers and delivers their services
More informationMobility Advantage: Why Secure Your Mobile Devices?
white paper Mobility Advantage: Why Secure Your Mobile Devices? www.sybase.com Table of Contents Mobile Insecurity The Elephant in the Room 1 Understanding Mobility Risks and Remedies 1 Risks related to
More informationTaming the Mobile File Sharing Beast
White Paper File and Networking Services Taming the Mobile File Sharing Beast To Whom Should You Entrust the Enterprise Goods? Mobile file access and sharing is not only the rage, but it s fast becoming
More informationHealthcare Information and Management Systems Society HIMSS. U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002
Healthcare Information and Management Systems Society HIMSS U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002 HIMSS / Phoenix Health Systems Healthcare Industry Quarterly
More informationConsolidated Edition. 5th Annual State of Application Security Report Perception vs. Reality
Consolidated Edition 5th Annual State of Application Security Report Perception vs. Reality January 2016 State of Application Security Report Consolidated Edition 2 Table of Contents Executive Summary...
More informationTable of Contents. Location-Based Engagement 2-7. Responding to advertising 2. Usage of Mobile Apps 4. Mobile Shopping 5. Smartphone Owners 7
Table of Contents Location-Based Engagement 2-7 Responding to advertising 2 Usage of Mobile Apps 4 Mobile Shopping 5 Smartphone Owners 7 Connected Device Trends and Adoption 8-10 U.S. Highlights 8 U.K.
More informationState of Report
State of Email Report Overview The following Edison State of Email report offers an in depth analysis of national consumer behaviors and sentiments associated with using email. The research demonstrates
More informationCommTech White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync
CommTech White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync October 2015 Copyright 2015 CommTech Introduction The rapid adoption of consumer-grade file sync services
More informationACL Interpretive Visual Remediation
January 2016 ACL Interpretive Visual Remediation Innovation in Internal Control Management SOLUTIONPERSPECTIVE Governance, Risk Management & Compliance Insight 2015 GRC 20/20 Research, LLC. All Rights
More informationSay Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
More informationGet Ready for Wearables at Work. Survey of IT pros reveals drivers, benefits, and challenges of supporting wearables in the workforce
- Samsung Tablet Photo - Get Ready for Wearables at Work Survey of IT pros reveals drivers, benefits, and challenges of supporting wearables in the workforce Table of contents Introduction 2 The move to
More informationTHE RISE OF BYOD. BYOD increases employee mobility and, consequently, organizational flexibility, efficiency, and collaboration.
The rise of the cloud has enabled employees to perform an ever-growing amount of work from mobile devices, forcing organizations to rethink how they protect their data. Bring your own device (BYOD), whereby
More information2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results. October
2013 ISACA IT Risk/Reward Barometer Mexico Consumer Results October 2013 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org Carina Bustamente,
More informationKEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic
KEY FINDINGS INTERACTIVE GUIDE Uncovering Hidden Threats within Encrypted Traffic Introduction In a study commissioned by A10 Networks, Ponemon surveyed 1,023 IT and IT security practitioners in North
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationThe State of the Trust Gap in 2015
The State of the Trust Gap in 2015 The widespread use of mobile devices for work has driven a profound change in how employees think about the privacy of their personal data on mobile devices. Ten years
More informationJune 2017 intel.com schneider-electric.com
DCIM Solution Deployment June 2017 intel.com schneider-electric.com DCIM Solution Deployment Introduction Current state of data center management Do you currently have a solution deployed? 20% 80% The
More informationA Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper
A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today White Paper As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile devices.
More informationOperationalize Security To Secure Your Data Perimeter
Operationalize Security To Secure Your Data Perimeter GET STARTED Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business.
More informationToward an Automated Future
2017 State of the Network Engineer: Toward an Automated Future netbraintech.com Executive Summary Today s enterprises have reached a tipping point when it comes to network management. Networks are growing
More information