enterprise it professionals consider mobile security as top priority

2

Click here to load reader

Upload: laurenellis

Post on 07-Jul-2015

19 views

Category:

Entertainment & Humor


0 download

DESCRIPTION

Mobile Security is increasingly becoming a top concern for chief information officers and information technology teams worldwide. Recently, More than 300 chief information officers and information technology professionals who participated in the 2014 InformationWeek Mobile Security Survey, voiced their opinions.

TRANSCRIPT

Page 1: Enterprise it professionals consider mobile security as top priority

Enterprise IT Professionals Consider Mobile Security asTop Priority

Mobile Security is increasingly becoming a top concern for chief information officers and

information technology teams worldwide. Recently, More than 300 chief information

officers and information technology professionals who participated in the 2014

InformationWeek Mobile Security Survey, voiced their opinions. Notably a trend was

that IT teams were concerned over the potential vulnerabilities regarding unauthorized

access to company information via mobile devices; less concern was placed on the

hardware type of mobile devices.

According to the survey, securing highly confidential company information is rated as

very important by 68% of the respondents. This response is notable 21 points ahead of

two other options: “Securing devices themselves” & “using anti-malware or MDM client

software”. Furthermore, it was found that 72% of respondents consider that their

foremost concern for mobile security is the compromise of company information as a

result of a lost or stolen employee device.

Furthermore, it was found in the study that nearly half of the respondents confidently find

that their current security platforms and services employed are effective at monitoring

and protecting data. However, 40% of respondents are concerned with employees who

may send confidential company information to cloud storage services. This leads to a

tricky predicament for the information technology team. As bring your own device

(BYOD) policies are becoming increasingly promoted and prevalent in the enterprise, the

security holes and hurdles mobile platforms give arise to can be difficult to tackle at

company-wide scale.

Furthermore, questions that information technology teams should discuss and find

definitive answers to include: Should we permit personal devices to connect to the

internal company network? Should we block off access to certain highly sensitive files in

the cloud? What are the most appropriate mobile security measures? Peaklight research

Page 2: Enterprise it professionals consider mobile security as top priority

analyst Otis Bard chimes in on the concerns, “Enterprises must take the proper

precautions to prepare for company data actions that their employees might put them in.

Mobile security platforms and services fulfill that crucial need.” One notable respondent

to the InformationWeek Mobile Security Survey stated, “Many of these questions ask if

we 'allow' types of behavior. We don't. However, the fact that we have nothing in place to

prevent it constitutes permission."

According to the survey, about 50% of respondents strictly prohibit company information

to be stored on employees’ personal devices. However, of the subset of folks who do

allow such behavior, they require that the company data be enclosed in a container. With

the rise of BYOD policies, the enterprise utilization of company data is bound to shift to

adopt more data in the container type methods.

In summary, information technology professionals in the enterprise are forcefully facing

difficult mobile security issues. Given the consumer adoption of mobile phones,

tablets, and wearable computers which is growing at light speed pace – it’s important the

enterprise protect their assets and sensitive information. Its important the IT teams look to

mobile security platforms and services to assure high levels of protection as seamlessly as

possible, to avoid potential company-marring data leaks, threats, and attacks.