Managing Mobile Business Insecurities

1
Don’t fear mobile device usage in the workplace. The benefits far outweigh the risks, as increased productivity helps boost revenue and the tech security opportunities go beyond simple passwords. With mobile adoption, more secure systems and an improved workforce are on the horizon. SOURCES: www.akuity.com | www.ciscomcon.com | www.cbsnews.com | 2013 Norton Report | www.infosecbuddy.com will adopt BRING YOUR OWN DEVICE (BYOD) solutions by 2017. of Americans use PERSONAL MOBILE DEVICES for work. 51% of United States smartphone users CONNECT TO UNSECURED WIRELESS NETWORKS. WIRELESS NETWORKS 40% of people don’t PASSWORD-PROTECT their smartphones. 27% of adults’ mobile devices have been LOST OR STOLEN. CLUMSINESS & MISFORTUNE 49% of businesses see security as the BIGGEST CONCERN for the cloud. THE CLOUD 57% of mobile device users don’t know that SECURITY SOLUTIONS exist for their devices. EMPLOYEE IGNORANCE 35% of people STORE WORK EMAIL PASSWORDS on their phones. PASSWORD NEGLECT LEAKS IN SECURITY LEAKS IN SECURITY CORPORATE-LEVEL SOLUTIONS Hundreds of millions of people use smartphones for everyday tasks. As more people use their phones for personal and business purposes, the number of uncontrolled smart phones is growing. will have SECURITY APPLICATIONS installed by 2018. of mobile apps WILL FAIL THE MOST BASIC SECURITY TESTS IN 2015. 75% 1.3 BILLION MOBILE DEVICES LOOKING AHEAD 81% 81% will be SHIPPED WORLDWIDE IN 2016. 65% will be used for personal and business purposes. 480 MILLION SMARTPHONES 2 IN 3 COMPANIES WITH BYOD ON THE RISE, CONSIDERING ITS EFFECTS ON YOUR CORPORATE DATA’S SECURITY IS IMPORTANT. • Rolls out native mobile applications at scale without compromising security • Utilizes a standards-based API access management system ENSURE NATIVE APPLICATIONS ARE SECURE • Secures corporate credentials to give easy access to corporate apps with a single click • Reduces passwords, improves productivity, and strengthens security • Uses smartphones to provide a second factor for improved security • Great end-user experience • Easy rollout and low cost of administration START WITH MOBILE DEVICE MANAGEMENT EXTEND SINGLE SIGN-ON (SSO) TO MOBILE • Partitions work and personal data, as well as applications • Enables enterprise to control work partition (policy, wipe, etc.) • Is a good start, but not sufficient MANAGING MOBILE BUSINESS INSECURITIES How Vulnerable Are Your Employees’ Mobile Devices? LEVERAGE MOBILE FOR STRONG AND MULTI-FACTOR AUTHENTICATION

Transcript of Managing Mobile Business Insecurities

Page 1: Managing Mobile Business Insecurities

Don’t fear mobile device usage in the workplace. The bene�ts far outweigh the risks, as increased productivity helps boost revenue and the tech security opportunities go beyond simple passwords. With mobile adoption, more secure systems and an improved workforce are on the horizon.

SOURCES: www.akuity.com | www.ciscomcon.com | www.cbsnews.com | 2013 Norton Report | www.infosecbuddy.com

will adopt BRING YOUR OWN DEVICE (BYOD) solutions by 2017.

of Americans use PERSONAL MOBILE DEVICES for work.

51%of United States smartphone users CONNECT TO UNSECURED WIRELESS NETWORKS.

WIRELESS NETWORKS

40%of people don’t PASSWORD-PROTECT their smartphones.

27%of adults’ mobile devices have been LOST OR STOLEN.

CLUMSINESS &MISFORTUNE

49% of businesses see security as the BIGGEST CONCERN for the cloud.

THE CLOUD

57%of mobile device users don’t know that SECURITY SOLUTIONS exist for their devices.

EMPLOYEEIGNORANCE

35%of people STORE WORK EMAIL PASSWORDS on their phones.

PASSWORD NEGLECT

LEAKS IN SECURITYLEAKS IN SECURITY

CORPORATE-LEVEL SOLUTIONS

Hundreds of mill ions of people use smartphones for everyday tasks. As more people use their phones for personal and business purposes, the number of uncontrolled smart phones is growing.

will have SECURITY APPLICATIONSinstalled by 2018.

of mobile apps WILL FAIL THE MOST BASIC SECURITY TESTS IN 2015.75%

1.3 BILLION MOBILE DEVICES

LOOKING AHEAD

81%81%

will be SHIPPED WORLDWIDE IN 2016. 65% will be used for personal and business purposes.

480 MILLIONSMARTPHONES 2 IN 3 COMPANIES

WITH BYOD ON THE RISE, CONSIDERING ITS EFFECTS ON YOUR CORPORATE DATA’S SECURITY IS IMPORTANT.

• Rol l s out nat ive mobi le appl icat ions at sca le wi thout compromis ing secur i ty

• Ut i l i zes a s tandards-based API access management system

ENSURE NATIVEAPPLICATIONS ARE SECURE

• Secures corporate c redent ia ls to g ive easy access to corporate apps wi th a s ing le c l i ck

• Reduces passwords, improves product iv i ty, and s t rengthens secur i ty

• Uses smartphones to provide a second factor for improved security

• Great end-user experience

• Easy rol lout and low cost of administration

START WITH MOBILE DEVICE MANAGEMENT

EXTEND SINGLE SIGN-ON (SSO) TO MOBILE

• Par t i t ions work and personal data , as wel l as appl icat ions

• Enables enterpr i se to contro l work par t i t ion (po l i cy, wipe, e tc . )

• I s a good s tar t , but not suf�c ient

MANAGING MOBILEBUSINESS INSECURITIESHow Vulnerable Are Your Employees’ Mobile Devices?

LEVERAGE MOBILE FOR STRONGAND MULTI-FACTOR AUTHENTICATION