The Global Enterprise Mobility Community
The Five Myths of Enterprise MobilityTuesday 6th March, 2012
10am - 11am (GMT)
with Sharon Clancy, Editor-in-Chief of the Enterprise Mobility Network, Nick McQuire, Principal Analyst at IDC and
Andrew Moloney, Security Expert and CEO at Artisan Consulting.
10.00-10.10am Welcome & introductions by Sharon Clancy
10.10-10.20am Introduction to the Enterprise Mobility Network
10.20-10.45am Interview with Sharon Clancy, Nick McQuire and Andrew Moloney
10.45-10.55am Q&A
10.55-11.00am Closing remarks
Sharon ClancyEditor-in-Chief, Enterprise Mobility Network
Nick McQuire, Research Director, IDC
Andrew MoloneyCEO, Artisan Consulting
Nick McQuireResearch Director, IDC
Andrew MoloneyCEO, Artisan Consulting
Sharon Clancy, Editor-in-Chief, Enterprise Mobility Network
The Five Myths of Enterprise Mobility
Nick McQuireResearch Director, IDC
The Five Myths of Enterprise Mobility
1. Companies can afford to wait until technology has stabilised before deploying a mobility strategy
The Five Myths of Enterprise Mobility
2. Increased mobility for workforces means increased risk of security breaches
3. The consumerisation of IT is having no impact on sectors that use rugged mobile devices
The Five Myths of Enterprise Mobility
4. A Mobile Device Management strategy is an optional extra, not an essential tool
5. Enterprises can manage mobility in-house behind the firewall without outsourcing to a cloud-based platform
Nick McQuire Research Director, IDC
Andrew MoloneyCEO, Artisan Consulting
Sharon Clancy, Editor-in-Chief, Enterprise Mobility Network
Andrew MoloneyCEO, Artisan Consulting
Why Enabling your Mobile Workforce may actually make you more Secure
Identifying the risks
Getting a handle on your informationA holistic assessment of your information
security postureRisk brought about by processRisk brought about by practice
Five Steps to Improving Mobile Security
1. Define your “Playground”
2. Put a basic mobile policy in place
3. Put in place a basic Mobile Device Management (MDM) platform
4. Apply some basic security controls
5. Assert identity
How “Going Mobile” can improve information security
1. Encryption
2. Geolocation
3. Biometrics
4. OTP (One Time Passcode/ Password)
5. OOB (Out of Band)
6. Secure Element
FIVE KEY REMINDERS
1. Assess how Information is already at risk in your business - through Process - through Practice
2. Don't assume that broader market trends will not impact your business - plan accordingly
3. Think holistically about “End Points” - extend systems, policies, process and strategies to encompass them
4. Think holistically about the broader security benefits
5. Don't Panic. The sky isn't falling...
Any Questions?
Closing Remarks
Thank You!www.enterprisemobilitynetwork.com
Top Related