managing mobile business insecurities
TRANSCRIPT
Don’t fear mobile device usage in the workplace. The bene�ts far outweigh the risks, as increased productivity helps boost revenue and the tech security opportunities go beyond simple passwords. With mobile adoption, more secure systems and an improved workforce are on the horizon.
SOURCES: www.akuity.com | www.ciscomcon.com | www.cbsnews.com | 2013 Norton Report | www.infosecbuddy.com
will adopt BRING YOUR OWN DEVICE (BYOD) solutions by 2017.
of Americans use PERSONAL MOBILE DEVICES for work.
51%of United States smartphone users CONNECT TO UNSECURED WIRELESS NETWORKS.
WIRELESS NETWORKS
40%of people don’t PASSWORD-PROTECT their smartphones.
27%of adults’ mobile devices have been LOST OR STOLEN.
CLUMSINESS &MISFORTUNE
49% of businesses see security as the BIGGEST CONCERN for the cloud.
THE CLOUD
57%of mobile device users don’t know that SECURITY SOLUTIONS exist for their devices.
EMPLOYEEIGNORANCE
35%of people STORE WORK EMAIL PASSWORDS on their phones.
PASSWORD NEGLECT
LEAKS IN SECURITYLEAKS IN SECURITY
CORPORATE-LEVEL SOLUTIONS
Hundreds of mill ions of people use smartphones for everyday tasks. As more people use their phones for personal and business purposes, the number of uncontrolled smart phones is growing.
will have SECURITY APPLICATIONSinstalled by 2018.
of mobile apps WILL FAIL THE MOST BASIC SECURITY TESTS IN 2015.75%
1.3 BILLION MOBILE DEVICES
LOOKING AHEAD
81%81%
will be SHIPPED WORLDWIDE IN 2016. 65% will be used for personal and business purposes.
480 MILLIONSMARTPHONES 2 IN 3 COMPANIES
WITH BYOD ON THE RISE, CONSIDERING ITS EFFECTS ON YOUR CORPORATE DATA’S SECURITY IS IMPORTANT.
• Rol l s out nat ive mobi le appl icat ions at sca le wi thout compromis ing secur i ty
• Ut i l i zes a s tandards-based API access management system
ENSURE NATIVEAPPLICATIONS ARE SECURE
• Secures corporate c redent ia ls to g ive easy access to corporate apps wi th a s ing le c l i ck
• Reduces passwords, improves product iv i ty, and s t rengthens secur i ty
• Uses smartphones to provide a second factor for improved security
• Great end-user experience
• Easy rol lout and low cost of administration
START WITH MOBILE DEVICE MANAGEMENT
EXTEND SINGLE SIGN-ON (SSO) TO MOBILE
• Par t i t ions work and personal data , as wel l as appl icat ions
• Enables enterpr i se to contro l work par t i t ion (po l i cy, wipe, e tc . )
• I s a good s tar t , but not suf�c ient
MANAGING MOBILEBUSINESS INSECURITIESHow Vulnerable Are Your Employees’ Mobile Devices?
LEVERAGE MOBILE FOR STRONGAND MULTI-FACTOR AUTHENTICATION