Mobile Security: Move Beyond The Basics And Overcome Mobile Paralysis
|
|
- Clinton Turner
- 5 years ago
- Views:
Transcription
1 A Forrester Consulting Thought Leadership Paper Commissioned By Samsung December 2014 Mobile Security: Move Beyond The Basics And Overcome Mobile Paralysis
2 Table Of Contents Executive Summary... 1 Companies Must Get Beyond The Basics Of Mobile Security... 2 Data, App, And Network Security Concerns Hold Back Expansion... 4 Firms Are Finding Ways To Overcome Mobile Paralysis... 6 Key Recommendations... 9 Appendix A: Methodology Appendix B: Supplemental Material Appendix C: Demographics/Data Appendix D: Endnotes ABOUT FORRESTER CONSULTING Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit forrester.com/consulting. 2014, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester, Technographics, Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. For additional information, go to [1-Q0CAXY]
3 1 Executive Summary For many people, mobile devices are indispensable tools for both work and personal tasks. Being able to access relevant apps and data in a moment of need can be a huge productivity driver, and employees are increasingly demanding this access from their companies. Despite this, companies have been hesitant to roll out more mobile services and support bring-your-own-device (BYOD) programs or allow these devices to access corporate systems or data because of concerns around application and data security. Many firms have invested in mobile security tools, but those have largely been mobile device management (MDM) investments, which don t address mobile application, data, and network security. This has created paralysis for many firms that want to allow more access but are unable to because of limited existing security investments and the lack of a formal BYOD program with guidance to support those devices. beyond the basic core components of mobile device management and solve the extended mobile security problem at the application, network, and device level. Mobile security is more than mobile device management. Approximately half of enterprises have already adopted MDM technologies. Since adoption, they have learned that MDM is not the only layer of security needed to address their mobile management needs. Operating system manufacturers and third-party security solutions such as containerization and secure network gateway technologies will become important security deployment opportunities in the enterprise. In September 2014, Samsung commissioned Forrester Consulting to evaluate mobile security and BYOD trends and determine what firms are doing to evolve their mobile strategies. In conducting in-depth surveys with 100 IT decision-makers involved in mobile security and management at companies with mobile workforces, Forrester found that substantial barriers exist today to support BYOD devices and maintain app and data security. However, firms are increasing their mobile security budgets to expand their current security implementations beyond MDM into app, data, and network security. KEY FINDINGS Forrester s study yielded three key findings: Most BYOD devices today are getting limited or no support and limited access to corporate systems and data. Most companies don t fully support BYOD devices, but that hasn t stopped employees from using them for work. Without tools to maintain secure app and data usage on BYOD devices, firms will struggle with increased risk of data leaks and device compromises. Mobile security budgets are increasing. The majority of firms with mobile workforces are increasing their mobile security budgets. Over 64% of respondents expect their mobile security budget to increase in the next 12 months. The security budget expansion matches the need to move
4 2 Companies Must Get Beyond The Basics Of Mobile Security Mobile enablement is critical to employee productivity because it allows employees to access the right tools in their (and their customers ) moments of need. However, many companies have found themselves at an impasse, struggling to expand their mobile programs to allow more applications and data access without sacrificing security. Much of this struggle comes from the sheer number of considerations that need to be taken into account when deciding to expand. Multiple platforms, applications, locations, and both employee- and company-owned devices must be evaluated in order to properly support mobility within company environments. Mobile security is not just about securing the device; it s about having layered protection across the applications, data, and network as well. This means organizations need to expand their mobile security tools beyond MDM to address a wide range of workforce and IT trends: Smartphone and tablet work usage continues to climb. The nature of work is changing. More and more people work from multiple locations and use multiple devices in those locations to do work. This is driven by the way they rely on mobile devices in their personal lives and also drives expectations around how people accomplish both work and personal tasks. Employees know they can find mobile applications that help them get their jobs done, whether their company provides support for those applications or not. Companies plan to expand beyond mobile . For many companies early in the mobile journey, is the easiest place to start. It s relevant to the majority of employees, and all mobile platforms have an app available. However, most companies today stop there and don t provide support for additional mobile applications. Our survey data shows that 56% of companies with mobile workforces support mobile and 52% support mobile browsers, but only 34% support office tools (see Figure 1). However, companies have plenty of interest in expanding the use of mobile applications for business functions. Many companies plan to support a number of mobile apps in the coming years. Companies that do not plan to support more applications in the future risk falling behind those willing to do so. FIGURE 1 A Majority Of Companies With Mobile Workforces Support And Mobile Browsing Today But Lack Support For Other Mobile Apps How interested is your organization in providing or supporting the following mobile applications to drive workforce productivity? Implemented, expanding, or upgrading implementation Planning to implement Interested but no plans to implement Not interested Don t know/ not applicable , calendar, contacts 56% 36% 5% 3% Web browser 52% 37% 3%5% 3% Employee intranet or company portal 39% 53% 4%3% 1% Web meeting or webconferencing 38% 46% 13% 3% Word processing, spreadsheets, presentation tools 34% 49% 8% 8% 1% Note-taking applications 32% 39% 16% 8% 5% Timesheet reporting 29% 46% 7% 16% 2% File sync/sharing 29% 50% 9% 8% 4% Expense tracking and/or approvals 29% 48% 12% 8% 3% Customer/client management/crm 29% 44% 12% 11% 4% Team document-sharing sites 28% 53% 7% 5% 7% Voice/video chat or instant messaging service 25% 55% 8% 8% 4% Travel planning and status 25% 45% 11% 14% 5% Employee benefits and services 24% 50% 14% 8% 4% Data dashboard or business intelligence app 21% 54% 15% 5% 5% Public social networks 18% 43% 15% 23% 1% Video storage and/or streaming service 15% 47% 10% 21% 7%
5 3 BYOD continues to grow in the enterprise. Driven by increased worker productivity and flexibility, many firms are pursuing BYOD initiatives. According to our survey, 39% of companies with mobile workforces have a formal BYOD program for smartphones today, while 42% have plans to implement a program within the next two years. 1 However, just because a company has a BYOD program doesn t mean those devices receive the same IT support as company-owned devices. While 67% of firms offer full support for corporate-owned smartphones, only 16% fully support employee-owned smartphones, with similar results for tablets as well (see Figure 2). Most BYOD devices today are getting limited or no support, if they re even allowed at all. This means there is an increasing amount of devices that IT has no insight into or control over and, if left unmanaged, can easily introduce more risk. Formal mobile security programs are a priority for many firms. Driven by the desire to expand the number of mobile applications for work, properly manage BYOD, and alleviate fears over data security, many companies are looking to expand or implement a mobile security program. Forty-eight percent of firms with mobile workforces are expanding or upgrading their mobile security programs for smartphones, while another 44% plan to implement mobile security within the next two years (see Figure 3). This includes evaluating not only new products and services that need to be supported, but also the policy and tools that must be in place in order to manage the mobile environment. FIGURE 3 Many Firms Have Implemented Or Plan To Implement A Mobile Security Program For Smartphones And Tablets What are your organization s plans to implement each of the following types of mobile security programs? Implemented, expanding, or upgrading implementation Planning to implement in 12 to 24 months Not interested Security program for laptop computers Mobile security program for smartphones Mobile security program for tablets Planning to implement in the next 12 months Interested but no plans to implement 68% 23% 6% Base: 100 US IT decision-makers at companies with a mobile workforce responsible for mobile management Source: A commissioned study conducted by Forrester Consulting on behalf of Samsung, October % 1% 48% 31% 13% 7% 1% 41% 30% 19% 8% 2% FIGURE 2 Bring Your Own Support: Personal Devices Get Limited Support Compared With Corporate Owned Devices What level of support do you provide for the following devices? Allowed, full support Allowed, limited support Allowed, no support We do not have an official policy Not allowed Don t know/ not applicable Corporate-owned smartphones 67% 19% 11% 3% Corporate-owned tablets 62% 26% 4%5% Personal tablets 16% 33% 29% 6% 16% 1% 2% Personal smartphones 16% 36% 29% 7% 12%
6 4 Data, App, And Network Security Concerns Hold Back Expansion Companies use MDM for the basics of mobile security: device configuration, password enforcement, and remote lock and wipe. This allows them to at least offer , calendar, and browser access on mobile devices. However, employees quickly demand more access to corporate data and more applications to get their jobs done. For IT, meeting those demands is much more challenging than just delivering because not all employees need the same types of applications or data. This means IT needs to ensure sensitive data is secure at rest and in transit, personal apps and work apps won t share data, and employees can access the data they need in a useful way. The introduction of so many layers of complexity often paralyzes companies from adopting or expanding their mobile programs for a number of reasons (see Figure 4): Data security is the ultimate goal. Enterprises deploying mobile solutions are concerned first and foremost with the security of their enterprise data. Fiftytwo percent of companies with mobile workforces stated that their leading challenge with planning and/or deploying a mobile security program is the security of the data (see Figure 5). Classification, tracking, and the overall security of sensitive data as it travels through the mobile ecosystem are a point of pain. Ideally, strong data security would allow for both a device- and operating system-agnostic stance. Securing the data directly is difficult without deep integration into each layer of the mobile platform. In the mobile ecosystem, network security is limited by an eroding perimeter. Mobility increases the quantity of sensitive corporate data that travels through networks outside of the enterprise sphere of security control. When we asked enterprises what is stopping them from implementing mobility or expanding their current mobile presence, 32% stated that network security concerns are a primary risk driver. Traditional network security controls such as firewalls are useless in a mobile world where the perimeter is completely decentralized. As the enterprise FIGURE 4 Device, Data, And Network Security Concerns Lead A Long List Of Factors Deterring Mobile Adoption Which of the factors below are deterring your organization from adopting or expanding a mobility program? (Select all that apply) Mobile device security concerns 40% Mobile data security concerns 35% Network security concerns 32% Data breach security concerns 32% Keeping up with the rate of change (OS, devices, life-cycle management) 27% The separation of work and personal data 26% Mobile application security concerns 25% Controlling employee use of mobile applications Jailbreak or rooting concerns Cost of training Reimbursement and usage monitoring 24% 24% 23% Expense of implementing and maintaining applications 23% OS fragmentation 21% Obtaining executive stakeholder sponsorship 21% Addressing industry-specific regulatory requirements (e.g., financial services, healthcare) 20% Difficulty building the business case 17% Difficulty integrating with back-end corporate systems 16% License management for mobile applications 14% No factors are deterring our organization from adopting a mobile solution 11% Addressing country-specific regulations 10% Do not know/not applicable 1% 23%
7 5 FIGURE 5 Mobile Data Concerns Are A Barrier To Mobile Security Deployment For Over Half Of Respondents What are the challenges or barriers your organization faces as you are planning and/or deploying your mobile security program(s)? (Select all that apply) Mobile data security concerns 52% Network security concerns 44% The separation of work and personal data 40% Mobile application security concerns Mobile device security concerns Justifying the ROI for a mobile program 36% Expense of implementing and maintaining applications Controlling employee use of mobile applications Cost of help desk support License management for mobile applications Managing and maintaining an approved device list 32% Network and/or server infrastructure costs 31% Mobile application development costs Obtaining executive stakeholder sponsorship Cost of training 28% 27% Addressing regulatory requirements 27% Employee privacy 25% Difficulty integrating with back-end corporate systems 24% 27% 33% 33% 35% 35% 38% 38% embraces work from anywhere, anytime cultures, the difficulty in delivering network security controls is increased. Mobile apps are the first line of defense against data compromise. Mobile apps are the direct line to mobile data. Our survey shows that nearly two-thirds of companies with mobile workforces rated mobile application security as challenging or extremely challenging. 2 Apps live at the closest logical level to the data, making malicious repackaged apps a primary target against enterprise mobility. The number of apps in use by enterprise users continues to expand with the growth of BYOD and bring-your-own-application implementations. Release cycles for mobile applications are much shorter than their nonmobile counterparts, limiting the scalability of enterprise mobile app security analysis programs. Firms are hesitant about expanding to more platforms. Enterprises are slowing or delaying deployment of additional mobile platforms because of the lack of confidence in the ability to secure the platform and content, concerns around malware, and the negative user experience associated with needed security controls (see Figure 6). When we asked respondents what is delaying mobile platform deployment, they cited an inability to properly secure the device and data (35%) more often than they cited a lack of demand for a specific mobile platform (29%). 3 The demand for mobile is present, but the enterprise is unable to be confident in the security of the deployment. Mobile security requires more than mobile device management. Approximately half of enterprises have already adopted MDM technologies. Since adopting, they have learned that MDM is not a security solution, and they are asking for deeper security integration in future products. MDM must expand to encompass both management and security by implementing technologies that secure the operating system, mobile apps, and data both on the device and in transit on the network. Alternatively, operating system manufacturers and thirdparty security solutions such as containerization and secure network gateway technologies will become important security deployment opportunities in the enterprise.
8 6 FIGURE 6 Top Barriers To Adopting New Mobile Platforms Are Malware Threats And Negative User Experience Of Security Which features or characteristics would prevent you from supporting a specific mobile platform? (Select all that apply) Mobile malware threats 53% Negative user experience of security controls 51% Negative user experience of operating system 38% Lack of hardware-based security features 35% Limited or no support for network security controls 32% Addressing industry-specific regulatory requirements (e.g., financial services, healthcare) Limited or no support for app wrapping 29% Limited or no support for data containerization 28% Mobile use cases do not fit my enterprise day-to-day workflow 27% Fear of operating system or hardware vendor decreasing support 27% Addressing country- or state-specific regulations 24% Other (please specify) 1% 30% Firms Are Finding Ways To Overcome Mobile Paralysis must enable additional productivity from mobile, diversify mobile platforms, and meet industry-specific security compliance requirements. In order to move past the paralysis, companies are expanding their mobile security budgets to invest in tools that can properly manage and secure corporate data as it moves through the network, between apps, and on employee-owned devices. Our survey revealed that: Mobile security budgets are increasing, paving the way for expanded security implementations. The majority of firms with mobile workforces are increasing their mobile security budgets. Sixty-four percent of respondents expect their mobile security budget to increase in the next 12 months (see Figure 7). The security budget expansion matches the need to move beyond the basic core components of mobile device management and solve the extended mobile security problem at the application, network, and device level. Mobile security technologies will expand beyond basic management technology. Today, MDM is most often used to manage mobile initiatives; in 12 to 24 months, multipersona technology and virtualization are expected to increase in use. 4 Over 30% of enterprises are expanding virtualization, mobile app reputation, data leak prevention (DLP), dual-persona, and mobile gateway deployments (see Figure 8). The mobile security expansion brings new features. The mobile security features most needed by firms are data and device encryption, secure mail, VPN, and secure content. Companies leverage mobile to gain additional productivity from the workforce. Mobile security
9 7 FIGURE 7 Sixty-Four Percent Of Respondents Expect Mobile Security Budgets To Increase How do you expect your mobile security budget to change over the next 12 months? Increase by greater than 15% 12% Increase by up to 15% 52% No change 23% Decrease by up to 15% 13% Decrease by greater than 15% 0% Why do you expect your mobile security budget to increase? (Select all that apply) (n = 64) To expand access beyond , contacts, calendars 63% To support additional mobile platforms 58% To address industry-specific regulatory requirements 45% To extend beyond MDM into application layer mobile security technologies To implement/expand our BYOD program 42% To extend beyond MDM into network layer mobile security technologies To support additional form factors 28% To address country- or state-specific regulations 28% Breaches at other organizations 22% Breaches at our organization 14% 36% 42%
10 8 FIGURE 8 Mobile Security Technologies Will Expand Beyond Basic Management Technology In The Future Please identify the types of technology your firm currently has/will implement to help manage your company s mobile initiatives. (Select all that apply) Mobile device management Mobile antimalware 46% Mobile endpoint security 44% Mobile application management 42% Mobile authentication solutions 41% Secure mobile content sharing 40% License management for mobile applications 39% Secure mobile network gateway 38% Reimbursement and usage monitoring Today 35% Secure application containers 33% Application wrapping 31% 49% In 12 to 24 months Multi- or dual-persona technology to separate work and personal 35% applications and data Mobile virtualization 32% Mobile application reputation system Secure mobile network gateway 28% Mobile device reputation services 27% Mobile application reputation services Secure mobile content sharing 23% 26% Secure application containers 26% Mobile static code analysis 25% 32% Mobile DLP 31% Application hardening 31% Mobile virtualization 28% Mobile endpoint security 23% Mobile device reputation services Mobile application reputation services Mobile static code analysis Application hardening 24% 23% 23% Mobile DLP 22% Multi- or dual-persona technology to separate work and personal 17% applications and data Mobile application reputation system 17% None. We do not have a mobile security strategy in place 2% Do not know/not applicable 1% 28% Mobile antimalware 23% Application wrapping 22% Mobile application management 22% License management for mobile applications Mobile authentication solutions 21% Reimbursement and usage monitoring Mobile device management 18% Do not know/not applicable 7% None. We do not have a mobile security strategy in place 2% 21% 19%
11 9 Key Recommendations In an enterprise mobile environment, it is very clear that location, device ownership, platform, usage, and access are not separate problems for IT; they must be addressed together. Employees can be much more productive with additional mobile tools beyond ; therefore, mobile device management must be only a piece of the larger mobile security tool set. Smartphones and tablets only scratch the surface of the devices employees will use for work in the future, but all of these devices will require access to corporate applications and data. Forrester s surveys with IT executives looking to plan for this future yielded several important observations: BYOD is here to stay plan for it. Work is not a single place for many people; it s a thing they do in many different locations and scenarios. Having the flexibility and choice on how and where to work is extremely important for productive employees. In some cases, that means being able to use their own devices. BYOD isn t something your company should actively fight. It might not be appropriate for all companies in all scenarios, but all companies will have some situations in which personal devices are used. This means IT must balance many different scenarios where work and personal data exist on the same device. Therefore, having tools that can maintain the separation of work and personal data, regardless of ownership, is critical. Prioritize app security to accelerate app deployment. While is a great work tool, it s not the only work tool. If we look at the tools available on an employee s laptop versus a mobile device, the difference is glaring. In order for mobile devices to become primary computing devices for more employees, companies need to prioritize mobile application access. This means adopting tools that offer application security functionality like mobile VPN, single sign-on, and containerization options. These tools will help extend application access on company-owned, employee-owned, and even partner or contractor devices. Secure data in transit and at rest. Application security can help with securing data at rest, but employees working from coffee shops, hotels, or anywhere outside of the corporate network still introduce risk. Securing data as it travels through the mobile ecosystem is a point of concern for many companies. To overcome this, you need a mobile security tool that can bring together network gateway technologies, encryption, device management, and app management technologies, along with data classification and tracking.
12 10 Appendix A: Methodology In this study, Forrester conducted an online survey of 100 organizations with mobile workforces in the US to evaluate mobile security and BYOD trends. Survey participants included IT decision-makers involved in security, mobile security, and mobile management at organizations whose workforce uses mobile devices like smartphones and tablets. The study began in September 2014 and was completed in October Appendix B: Supplemental Material RELATED FORRESTER RESEARCH Habitat For Engagement: Unleash Workforce Potential With Agile Enablement, Forrester Research, Inc., May 10, 2013 Appendix C: Demographics/Data FIGURE 9 Survey Demographics: Company Size, Title, Industry Using your best estimate, how many employees work for your firm/organization worldwide? 20,000 or more employees 5,000 to 19,999 employees 1,000 to 4,999 employees 500 to 999 employees 17% 20% 21% Which title best describes your position at your organization? C-level executive Vice president Director Manager 12% 20% 31% 37% 42% Which of the following best describes the industry to which your company belongs? Financial services and insurance 19% Retail 17% Manufacturing and materials 16% Healthcare 10% Business or consumer services 9% Telecommunications services 5% Transportation and logistics 5% Other (please specify) 3% Government 3% Energy, utilities, and waste management 3% Construction 3% Consumer product manufacturing 3% Education and nonprofits 2% Advertising or marketing 1% Chemicals and metals 1%
13 11 FIGURE 10 Survey Demographics: IT Role, Mobile Management Responsibility, Workforce Mobility Which of the following describes your current position/department in IT? (Select all that apply) IT operations professional IT infrastructure professional IT security professional Networking/telecommunications Cloud infrastructure/operations/architect Solution/application architecture Information and knowledge management professional Sourcing and vendor management professional Application development and delivery Software testing and QA Business analyst 30% 37% 40% 40% What is your level of responsibility around mobile management? I am often the final decision-maker for mobile management I provide significant input to the final decisionmaker around mobile management 40% 45% 44% 50% 49% 61% 60% 70% 69% Approximately what percentage of your workforce uses the following devices for work-related activities on a daily basis? 81% to 100% 21% 61% to 80% 19% Desktop Smartphone Tablet 41% to 60% 17% 0% to 20% 12% 21% to 40% 31% 81% to 100% 17% 61% to 80% 11% 41% to 60% 24% 0% to 20% 6% 21% to 40% 42% 61% to 80% 5% 41% to 60% 11% 21% to 40% 28% 81% to 100% 3% 0% to 20% 53% Averages: Desktop: 56% Smartphone: 51% Tablet: 28% Appendix D: Endnotes Source: TechRadar : Enterprise Mobile Security, Q4 2014, Forrester Research, Inc., November 3, 2014.
Operationalize Security To Secure Your Data Perimeter
Operationalize Security To Secure Your Data Perimeter GET STARTED Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business.
More informationMastering The Endpoint
Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More
More informationModern Database Architectures Demand Modern Data Security Measures
Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing
More informationEvolve Your Security Operations Strategy To Account For Cloud
Evolve Your Security Operations Strategy To Account For Cloud GET STARTED The growth of cloud computing and proliferation of complex service delivery models continue to accelerate as companies recognize
More informationRethink Enterprise Endpoint Security In The Cloud Computing Era
A Forrester Consulting Thought Leadership Spotlight Commissioned By Google September 2017 Rethink Enterprise Endpoint Security In The Cloud Computing Era Project Director: Karin Fenty, Senior Market Impact
More informationModern Compute Is The Foundation For Your IT Transformation
A Forrester Consulting Thought Leadership Paper Commissioned By Dell EMC And Intel February 2018 Modern Compute Is The Foundation For Your IT Transformation Failure To Update Can Stunt Your Growth Table
More informationVulnerability Management Trends In APAC
GET STARTED Introduction In the age of the customer, the threat landscape is constantly evolving. Attackers are out to steal your company s data, and the ever-expanding number of devices and technologies
More informationConverged Infrastructure Matures And Proves Its Value
A Custom Technology Adoption Profile Commissioned By Hewlett-Packard May 2013 Introduction Converged infrastructure (CI) solutions have been widely adopted by a range of enterprises, and they offer significant
More informationBusiness Success Through Embedded Communication Technology
Business Success Through Embedded Communication Technology How WebRTC Delivers Value To Organizations Today GET STARTED Released May 2016 1 2 Introduction More and more activities in our day-to-day lives
More informationMOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner
MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use
More informationSupporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems
A Custom Technology Adoption Profile Commissioned By IBM September 2013 Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems 1 Introduction
More informationEvolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility
Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility GET STARTED Tackling A New Breed Of Threats High-profile, targeted attacks from malicious actors now occur with
More informationUnlock The Value Of Cloud
A Forrester Consulting Thought Leadership Paper Commissioned By Intel August 2017 Unlock The Value Of Cloud How To Expand Your Hybrid Cloud With Consistency, High Performance, And Security Everywhere Table
More informationUnlock The Value Of Cloud: A Spotlight On IT Executives
A Forrester Consulting Thought Leadership Paper Commissioned By Intel November 2017 Unlock The Value Of Cloud: A Spotlight On IT Executives How To Expand Your Hybrid Cloud With Consistency, High Performance,
More informationFact Or Fiction: The State Of GDPR Compliance
A Forrester Consulting Thought Leadership Paper Commissioned By RSA December 2017 Fact Or Fiction: The State Of GDPR Compliance GDPR Compliance Requires More Than IT Table Of Contents 1 2 6 9 12 13 Executive
More informationBuild Your Zero Trust Security Strategy With Microsegmentation
Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver
More informationMaaS360 Secure Productivity Suite
MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity
More informationDigital Transformation Drives Distributed Store Networks To The Breaking Point
Digital Transformation Drives Distributed Store Networks To The GET STARTED Overview Forward-looking retailers are realizing the value of cloud- and data center-based applications as they move high-priority
More informationImplementing Your BYOD Mobility Strategy An IT Checklist and Guide
Implementing Your BYOD Mobility Strategy An IT Checklist and Guide 2012 Enterproid IBYOD: 120221 Content 1. Overview... 1 2. The BYOD Checklist... 1 2.1 Application Choice... 1 2.2 Installation and Configuration...
More information- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more
- Samsung Tablet Photo - Tablets Mean Business Survey of IT pros reflects growing trend toward tablets for workforce mobility and more Table of contents Introduction 2 Giving employees what they want pays
More informationSD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast
SD-WAN Enabling the Enterprise to Overcome Barriers to Digital Transformation An IDC InfoBrief Sponsored by Comcast SD-WAN Is Emerging as an Important Driver of Business Results The increasing need for
More informationRed Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization
Forrester Total Economic Impact Study Commissioned by Red Hat January 2017 Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Technology organizations are rapidly seeking
More informationRHM Presentation. Maas 360 Mobile device management
RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership
More informationINDIA The Changing Face of the Workplace: Going Light and Mobile
An IDC InfoBrief May 2016 Commissioned by Executive Summary In today s hypercompetitive business environment, organizations are pushing for greater efficiencies to drive business growth. The growing diversity
More informationGood Technology State of BYOD Report
Good Technology State of BYOD Report New data finds Finance and Healthcare industries dominate BYOD picture and that users are willing to pay device and service plan costs if they can use their own devices
More informationThe State of Cloud Monitoring
REPORT The State of Cloud Monitoring Survey Reveals Visibility is Key to Cloud Security and Performance INTRODUCTION Ixia, a Keysight business, commissioned Dimensional Research to conduct a survey measuring
More informationA Guide to Closing All Potential VDI Security Gaps
Brought to you by A Guide to Closing All Potential VDI Security Gaps IT and security leaders are embracing virtual desktop infrastructure (VDI) as a way to improve security for an increasingly diverse
More informationEnterprise Mobility Management
B L A C K B E R R Y K E E P S Y O U R B U S I N E S S M O V I N G Enterprise Mobility Management Perfectly balancing end-user and corporate needs 800.972.3922 + Enterprise mobility is enabling organizations
More informationInnovation Leaders Need IT Services To Drive Transformative Outcomes
A Forrester Consulting Thought Leadership Paper Commissioned By Dell EMC February 2019 Innovation Leaders Need IT Services To Drive Transformative Outcomes Partnering With IT Service Providers Enables
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationCLOSING IN FEDERAL ENDPOINT SECURITY
CLOSING IN FEDERAL ENDPOINT SECURITY More than half of agency IT officials worry about cyberattacks involving endpoint devices as a means of accessing agency networks. Yet many aren t taking advantage
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the
More informationTHE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS
THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at telecommunication organizations transform to business-focused service
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More information2018 Report The State of Securing Cloud Workloads
2018 Report The State of Securing Cloud Workloads 1 Welcome to our 2018 report on the state of securing cloud workloads A summary of the responses of close to 350 professionals whose primary areas of responsibility
More informationMicrosoft 365 Security & Compliance For Small- and Mid-Sized Businesses
Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses The reality for your business today, and the importance of proactive security Cyberthreats are becoming more of a reality each day.
More informationSpotlight Report. Information Security. Presented by. Group Partner
Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in
More informationWHITEPAPER. How to secure your Post-perimeter world
How to secure your Post-perimeter world WHAT IS THE POST-PERIMETER WORLD? In an increasingly cloud and mobile focused world, there are three key realities enterprises must consider in order to move forward
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationMake security part of your client systems refresh
Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for
More informationMOVING MISSION IT SERVICES TO THE CLOUD
MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights
More informationEnabling Zero Trust Security Through Network Virtualization And Micro- Segmentation
A Forrester Consulting Thought Leadership Paper Commissioned By VMware January 2018 Enabling Zero Trust Security Through Network Virtualization And Micro- Segmentation Table Of Contents 1 2 3 6 7 8 9 Executive
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationTransform your network and your customer experience. Introducing SD-WAN Concierge
Transform your network and your customer experience Introducing SD-WAN Concierge Optimize your application performance, lower your total cost of ownership and simplify your network management. 2X Bandwith
More informationFive Tips to Mastering Enterprise Mobility
Five Tips to Mastering Enterprise Mobility Table of Contents Introduction Tip 1: Assess Your Environment Tip 2: Review Security Protocols Tip 3: Be Smart About BYOD Tip 4: Consider Customized Mobility
More informationSecuring Health Data in a BYOD World
Business White Paper Securing Health Data in a BYOD World Five strategies to minimize risk Page 2 of 9 Securing Health Data in a BYOD World Table of Contents Page 2 Introduction Page 3 BYOD Adoption Drivers
More informationSecuring The Enterprise With Machine Identity Protection
A Forrester Consulting Thought Leadership Paper Commissioned By Venafi June 2018 Securing The Enterprise With Machine Identity Protection Table Of Contents 1 2 3 7 9 11 Executive Summary Automated And
More informationTHE STATE OF IT TRANSFORMATION FOR RETAIL
THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State
More informationWhy Enterprises Need to Optimize Their Data Centers
White Paper Why Enterprises Need to Optimize Their Data Centers Introduction IT executives have always faced challenges when it comes to delivering the IT services needed to support changing business goals
More informationPredictive Insight, Automation and Expertise Drive Added Value for Managed Services
Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging
More informationMid-Market Data Center Purchasing Drivers, Priorities and Barriers
Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales
More informationForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.
Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationENTERPRISE MOBILITY TRENDS
ENTERPRISE MOBILITY TRENDS Raghuram Nair, Nandakishore Bellore Enterprise Mobility has emerged as a top technology trend globally. Every enterprise with a mobile workforce has an imperative to deploy a
More informationGaps in Resources, Risk and Visibility Weaken Cybersecurity Posture
February 2019 Challenging State of Vulnerability Management Today: Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture In the last two years, businesses and governments have seen data breaches
More informationHybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018
V REPORT : HPE Hybrid IT for SMBs HPE addressing SMB and channel partner Hybrid IT demands October 2018 ANALYST ANURAG AGRAWAL Data You Can Rely On Analysis You Can Act Upon HPE addressing SMB and partner
More informationSay Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
More information70% of professionals will conduct their work on personal smart devices by 2018 (Source: Gartner)
Corporate Profile PRINT SIMPLY ANYWHERE Increase mobility and ensure print productivity for your organization PrinterOn is Secure Print, Tracking and Management - with Mobile First PrinterOn is the premier
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More information2013 InterWorks, Page 1
2013 InterWorks, Page 1 The BYOD Phenomenon 68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets. IT organizations
More informationMulti-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-Platform Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility is enabling organizations to
More informationTransform your network and your customer experience. Introducing SD-WAN Concierge
Transform your network and your customer experience Introducing SD-WAN Concierge Optimize your application performance, lower your total cost of ownership and simplify your network management. 2X Bandwith
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationBYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips
Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice
More informationIT Security: Managing a New Reality
IT Security: Managing a New Reality Kevin Lonergan #IDCDirections IDC You re Only as Strong as Your Weakest Link Locks Only Work if you Know How to Use Them IDC 2 Millions Canadian Security Market Forecast:
More informationConsumer Opinions and Habits A XIRRUS STUDY
Consumer Opinions and Habits A XIRRUS STUDY Executive Summary With more devices on the planet than people, it goes without saying that wireless is no longer a bonus - it s a necessity. By the end of 2015,
More informationAs Enterprise Mobility Usage Escalates, So Does Security Risk
YOUR SECURITY. CONNECTED WHITE PAPER As Enterprise Mobility Usage Escalates, So Does Security Risk Even as more organizations embrace the use of mobile devices by employees and customers to access services
More informationHow to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop
How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop Executive Brief Summary There is a new development in the Bring Your Own Device (BYOD) movement in today s
More informationVMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment
VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment RELIABLE, FAMILIAR INFRASTRUCTURE BACKED BY VMWARE AND DELIVERED THROUGH PARTNERS HELPS OPTIMIZE CLOUD INVESTMENTS AS ENTERPRISES
More informationThe Connected Worker and the Enterprise of Things
The Connected Worker and the Enterprise of Things Todd Berger Sr. Director Technical Solutions January 2018 2007 2 Apple iphone 2017 BlackBerry. All Rights Reserved. 2 2017 Apple iphone X 2017 BlackBerry.
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationFormulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
More informationSensitive Data Loss is NOT Inevitable
Sensitive Data Loss is NOT Inevitable Dan Geer, CISO In-Q-Tel Featured Speaker Heidi Shey, Security Analyst, Forrester Research Agenda Introduction Time for a Change Dan Geer, In-Q-Tel How to Overcome
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationQ&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai
TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL An interview with John Summers, Enterprise VP and GM, Akamai Q&A What are the top things that business leaders need to understand about today s cybersecurity
More informationTHE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:
June 2013 Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported and lost, while the
More informationA Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper
A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today White Paper As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile devices.
More information3-Part Guide to Developing a BYOD Strategy
An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)
More informationBeyond Your Device. Control, Connect, Experience. BT GS Analyst and consultant call 2 July 2013
Beyond Your Device Control, Connect, Experience BT GS Analyst and consultant call 2 July 2013 Agenda Welcome & situation in the market Neil Sutton, Vice President Portfolio Our solution Connect Jayne Smith,
More informationHybrid Cloud for Business Communications
Hybrid Cloud for Business Communications THE ESSENTIAL GUIDE So you re considering hybrid cloud for your business communications. You re not alone! In fact, more and more businesses are turning to cloud
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationManaging Devices and Corporate Data on ios
Managing Devices and Corporate Data on ios Overview Businesses everywhere are empowering their employees with iphone and ipad. Contents Overview Management Basics Separating Work and Personal Data Flexible
More informationCHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION
CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CONTENTS: Enterprise Mobility Strategy and BYOD Policies Endpoint Vulnerabilities and Challenges Conclusion For several decades,
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationFive Reasons It s Time For Secure Single Sign-On
Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide
More informationTripwire State of Container Security Report
RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams
More informationPurchase Intentions Spring 2013 EMEA
Consumerization of IT and BYOD Plans Purchase Intentions Spring 2013 EMEA 1 Key Takeaways: Primary drivers of BYOD: - To make workers more productive - To make worker collaboration better - Pressure from
More informationThe Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationHealthcare in the Public Cloud DIY vs. Managed Services
Business White Paper Healthcare in the Public Cloud DIY vs. Managed Services Page 2 of 9 Healthcare in the Public Cloud DIY vs. Managed Services Table of Contents Page 2 Healthcare Cloud Migration Page
More informationZero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers
Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationMobilize your corporate content and apps
IBM Security Thought Leadership White Paper Mobilize your corporate content and apps Enable simple and protected mobile collaboration for business Mobilize your corporate content and apps Mobile strategy
More informationSecure Access for Microsoft Office 365 & SaaS Applications
Best Practices Guide Secure Access for Microsoft Office 365 & SaaS Applications Implement Robust Compliance for All Users, All Devices, and All Data This guide illustrates best practices for secure Office
More informationMobile Device Management: A Real Need for the Mobile World
Mobile Device Management: A Real Need for the Mobile World In today s modern workplace, employees are utilizing a variety of mobile devices both in and out of the office. Gone are the days when employees
More informationBUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology
BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology ebook BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS
More informationMobility Solutions Extend Cisco Unified Communications
Mobility Solutions Extend Cisco Unified Communications Organizations worldwide have used powerful new technologies such as the Internet, IP communications, and mobility to improve their business processes.
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More information