CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

Similar documents
As Enterprise Mobility Usage Escalates, So Does Security Risk

BYOD Risks, Challenges and Solutions. The primary challenges companies face when it comes to BYOD and how these challenges can be handled

2018 Mobile Security Report

TRUSTED MOBILITY INDEX

ips.insight.com/healthcare Identifying mobile security challenges in healthcare

Sales Presentation Case 2018 Dell EMC

SDN-Based Open Networking Building Momentum Among IT Decision Makers

Trustlook Insights Q BYOD Trends & Practices

Modern Database Architectures Demand Modern Data Security Measures

Good Technology State of BYOD Report

THE RISE OF BYOD. BYOD increases employee mobility and, consequently, organizational flexibility, efficiency, and collaboration.

Tripwire State of Container Security Report

Security Solutions for Mobile Users in the Workplace

CLOSING IN FEDERAL ENDPOINT SECURITY

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Best Practices in Securing a Multicloud World

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

Why Enterprises Need to Optimize Their Data Centers

Securing Health Data in a BYOD World

Rethink Enterprise Endpoint Security In The Cloud Computing Era

2014 IT Priorities Mark Schlack Sr. VP, Editorial

Panda Security 2010 Page 1

Mobile Security Trends in the Workplace

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

THE STATE OF IT TRANSFORMATION FOR TELECOMMUNICATIONS

Fog Computing. ICTN6875: Emerging Technology. Billy Short 7/20/2016

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst

Enabling the Always-On Enterprise

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

What BYOD and CYOD mean for workplace transformation

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

IT Security: Managing a New Reality

Make security part of your client systems refresh

Shadow IT in the Enterprise

Spotlight Report. Information Security. Presented by. Group Partner

ENTERPRISE MOBILITY TRENDS

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

Consumer Opinions and Habits A XIRRUS STUDY

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

The Next Generation of Mobile Learning. Tamar Elkeles, Qualcomm Kevin Oakes, i4cp

Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

STUDY REVEALS GROWING DEMAND FOR HIGH-SPEED DATA COMMUNICATIONS

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

A Guide to Closing All Potential VDI Security Gaps

How to Enable and Secure in the Next Stage of BYOD: Reap the Benefits of Bring Your Own Laptop

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

The Data Protection Rule and Hybrid Cloud Backup

State of SMB IT 1H 2012

BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology

Industrial IoT Trends: WSN, LPWAN & Cloud Platforms

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Enterprise Mobility. BEYOND MDM: A MULTIDIMENSIONAL MOBILITY STRATEGY Why device-centric strategies no longer meet today s mobility needs

Who Better than Dell EMC to Offer Best-for-VMware Data Protection?

INDIA The Changing Face of the Workplace: Going Light and Mobile

Transforming Security Part 2: From the Device to the Data Center

Solid State Storage: Trends, Pricing Concerns, and Predictions for the Future

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Securing Today s Mobile Workforce

The future of UC&C on mobile

EM L01 Introduction to Mobile

2018 Database DevOps Survey DBmaestro 1

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket

Mobile Security: Move Beyond The Basics And Overcome Mobile Paralysis

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

Cloud Connect. Gain highly secure, performance-optimized access to third-party public and private cloud providers

Purchase Intentions Spring 2013 EMEA

Availability and the Always-on Enterprise: Why Backup is Dead

Top Priority for Hybrid IT

BELTUG Market Trends Survey Results V-ICT-OR members - August 2015

MDM is Calling: Does Your Business Have an Answer? arrival. Here To Go. Lunch Dinner. continue. Riiinnggg. Dec. 12

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

2013 InterWorks, Page 1

2010 Online Banking Security Survey:

2016 COOLING THE EDGE SURVEY. Conducted by Vertiv Publication Date: August 30, 2016

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

Simplified. Software-Defined Storage INSIDE SSS

SIEM: Five Requirements that Solve the Bigger Business Issues

One of the most challenging tasks for today s app developers is to ensure that users are actively engaging with their app.

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

270 Total Nodes. 15 Nodes Down 2018 CONTAINER ADOPTION SURVEY. Clusters Running. AWS: us-east-1a 23 nodes. AWS: us-west-1a 62 nodes

Why Continuity Matters

10 Hidden IT Risks That Might Threaten Your Business

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

THE CYBERSECURITY LITERACY CONFIDENCE GAP

Backup Deal Breakers An 8-Step Guide to Finding the Perfect Backup Partner

Get Smart about Backup & Recovery

The Future of Network Infrastructure & Management

State of Cloud Survey GERMANY FINDINGS

The Case for Virtualizing Your Oracle Database Deployment

BYOD: Focus on User Experience, Not the Device

Mastering The Endpoint

Transcription:

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CONTENTS: Enterprise Mobility Strategy and BYOD Policies Endpoint Vulnerabilities and Challenges Conclusion For several decades, computing has become increasingly mobile. As notebooks became both more powerful and more affordable, organizations increasingly outfitted their workforces with portable computers. Not only was the technology advancing rapidly, but mobility-based work processes also demanded the ability to work anywhere, at any time. But as first-generation mobile computing gave way to the bring-your-own-device (BYOD) phenomenon, new challenges emerged. Those challenges are highlighted in a research survey conducted with the TechTarget network of IT professionals in January 2015: While the survey results certainly support the growing trend toward mobility in general and BYOD in particular, it also highlights some potentially troubling byproducts of that movement. These include: While most companies have some form of policy in place in support of employees using personal mobile devices, those policies can vary widely from organization to organization. As a result, only a slim majority of organizations have a formal strategy for mobility solutions, even though most respondents say mobility is one of their key IT initiatives for 2015.

Even as consumer devices such as tablets and smartphones increasingly are used for business applications, IT professionals feel twice as vulnerable to endpoint security threats with those devices than they do with traditional endpoints such as desktops and notebooks. However, the research points out that respondents also feel a significant level of vulnerability in protecting their traditional PC endpoints. Data loss prevention is the feature survey respondents said was the most difficult to fully achieve, but they also noted that endpoint security is their single biggest concern for the coming year. The bottom line: Endpoint vulnerability is real and is increasing, particularly with the influx of users own tablets and smartphones. This is an important reality that is likely to become even more important in the coming years. By 2017, most employers will stop issuing corporate mobile devices to employees and instead will require their workers to supply their own mobile devices, according to Gartner Inc. 1 Combine this trend with additional data indicating that more than 80% of mobile devices face data loss vulnerabilities 2, and it s hard to overestimate the magnitude of the problem created by consumer-class mobile devices. Enterprise Mobility Strategy and BYOD Policies According to the TechTarget survey, slightly more than half of respondents organizations have a formal, enterprisewide strategy for mobility solutions. One third of the respondents said their organizations lacked a formal strategy. Organizations that lack a formal, updated and business process-aware strategy for mobility need to act fast, according to Forrester Research s Chris Sherman, who pointed out that many IT departments have revisited old strategies that no longer work for today s mobile users. 3 Does your organization have an enterprise-wide strategy for mobility solutions? Yes No 33% 9% 58% Unsure 1 Gartner Predicts by 2017, Half of Employers Will Require Employees to Supply Their Own Device for Work Purposes, Gartner Inc., May 2013 2 Press Release: More than 80% of Smartphones Remain Unprotected from Malware and Attacks, Juniper Research Finds, Aug. 10, 2013 3 Market Overview: Enterprise Endpoint Backup and Recovery Solutions, Forrester Research, July 2014 2

Of course, mobility is widely acknowledged as an increasingly important IT initiative. Sixty-six percent of survey respondents said mobility was either one of their most strategic initiatives or an important initiative for 2015, and only 22% said they had no strategic plans for mobility in the coming year. Undoubtedly, having some kind of policy for BYOD needs to be part of any enterprise-wide mobility strategy, but survey responses point to a number of different scenarios for how or if employee-owned devices are used for work tasks. For instance, while 78% of respondents said their organizations have some kind of policy on use of personal mobile devices, there is no consensus on what that policy may look like. For instance, respondents were about as likely to say their company had an informal, user-driven BYOD policy than they were to indicate that they had a more formal, ITdriven approach. Which best describes your organization s attitude toward BYOD? Formal policy endorsed and supported by IT Informal policy that is user-driven 22% 14% 30% 34% Require selection from pre-selected list of devices Don t allow use of personal devices Endpoint Vulnerabilities and Challenges The survey results point out that IT professionals acknowledge significant vulnerabilities in protecting their current endpoints and that they feel those vulnerabilities are significantly more pronounced for consumer-class devices such as tablets and smartphones than they are for traditional endpoints such as desktops and notebooks. However, it s important to note that nearly a third of the respondents acknowledge feeling either very vulnerable or vulnerable to potential security threats on their traditional PC endpoints (desktops and notebooks). This highlights the importance of having comprehensive mobility strategies that account for all types of endpoint devices desktops, notebooks, tablets, smartphones and other connected mobile devices. 3

How vulnerable does your organization believe your endpoint devices are to potential security threats? Desktops/Notebooks Tablets/Smartphones Very vulnerable 11% 25% Vulnerable 20% 20% Somewhat vulnerable 35% 33% Not very vulnerable 32% 16% Not vulnerable at all 2% 5% Not applicable 1% (non-pc endpoints are not part of our endpoint infrastructure) Respondents were more than twice as likely (25%, compared with 11%) to consider their workers tablets and smartphones to be very vulnerable to endpoint security risks than their desktops and notebooks. A related issue to keep in mind is the fact that survey respondents said their IT departments, for the most part, are not responsible for data backup and recovery from non-pc endpoints. Is IT responsible for backing up and recovering data on non-pc endpoints? Yes No 27% 9% 64% Unsure This finding reveals another vulnerability with organizations endpoint security when they have embraced BYOD: If IT isn t part of regular data backup processes for consumer devices, that puts an enormous burden on the organization to educate its users about proper backup procedures they should be taking on their own. Of course, chances are that while many technically savvy users are well aware of the need to do frequent backups, a great deal of users live with a false sense of security that their data is adequately protected through public cloud services. 4

For instance, consider the popularity of cloud-based sync-and-share storage services. IT organizations may be aware that many of their users are employing these cloud-based services for storing not only personal data, but business information as well. But that awareness by the IT department isn t always equivalent to taking responsibility for endpoint security and backup. After all, doing so requires that IT organizations understand and be willing to work with the intricacies of different cloud storage services, from Google Drive and Apple icloud to Amazon Web Services AWS Storage and Dropbox. Which of the following sync-and-share storage services does your IT organization allow/support for work applications? Google Drive 35% Dropbox 32% icloud 22% OneDrive 22% Box 17% AWS Storage 16% SugarSync 4% Other 36% 0% 10% 20% 30% 40% While consumer devices present their own unique challenges, the survey results also highlight the need for IT organizations to confront a variety of potential problem areas with their traditional PC-based endpoints. For instance, data loss prevention heads the list of capabilities that IT respondents believe still is difficult to achieve for PC endpoints, followed by backup and recovery, endpoint security and compliance/e-discovery. 5

Which features/capabilities are difficult to achieve for PC endpoints? Data loss prevention 49% Backup/recovery Endpoint security 45% 45% Compliance/e-discovery 39% Endpoint device management 35% Endpoint administration 32% Anywhere/anytime access to enterprise apps 27% Endpoint use analytics Endpoint service 20% 19% 0% 10% 20% 30% 40% 50% Conclusion In an environment increasingly marked by pervasive, anytime/anywhere mobility, IT organizations are under significant challenge to protect their endpoints against a wide range of threats. The accelerating momentum of BYOD and other technologies characterized as the consumerization of IT, however, is dramatically raising the stakes for organizations that want to provide users with flexible yet secure options for endpoint device usage. Data from research firm IDC notes that recovery-point objectives and recovery-time objectives are becoming increasingly stringent in all-sized organizations, and that edge protection must be a central element in helping to avoid downtime and the considerable financial, operational and reputational costs associated with it. 4 The challenges identified in the TechTarget survey results quoted throughout this paper require IT and security professionals to take a long, hard look at not only endpoint data protection, but also how to address endpoint-related issues as part of an overall enterprise mobility framework. Organizations should seek out, investigate, pilot and deploy endpoint data protection solutions that recognize the vastly different issues for protecting non-pc endpoints than those often seen with desktops and notebooks. However, it remains essential that IT and security professionals come up with comprehensive endpoint data protection strategies and look for relevant solutions that can address all forms of endpoint devices when defining what data can be accessed, from which device. 4 The Critical Need for Edge Data Protection, IDC, October 2014 6