Source: Norton Mobile Insight data as of October 2014, Symantec
RISK
07
Centrally manage mobile threat protection to ensure devicesare protectedProactively detect and prevent mobile threats such as malware and risky appsWhitelist or blacklist apps based on app behaviorBlock access to enterprise apps and services if malwareis detected
SECURITYMEASURES
WHAT ARE THE RISKY BEHAVIORS?
MALICIOUS AND RISKY APPSApps are fun, helpful and the weakest entry point for cyber-criminals. Mobile apps are too often installed by users with little or no thought to the dangers they may pose.
3 MILLIONMalicious
Apps
8 MILLION
Apps withRisky Behaviors
Symantec™ Mobility : Suite
Deliver comprehensive mobile protection without compromising the user experience. So your data, apps and users stay connected, productive and secure.
Learn more at symantec.com/mobility
#GoEmpower
© 2015 Symantec Corporation. All rights reserved. 21345272
HeterogeneousEnvironment
Anywhere,AnytimeConnectivity
Loss and Theft
CompromisedDevices
Data Leaks
Bring YourOwn Apps
Malicious andRisky Apps
A: Steal InformationB: Track the UserC: Traditional ThreatsD: Send ContentE: Reconfigure Device
19%
A B C D E
22%26%
13% 13%
Employees are bringing their own apps to fill the gap of apps not provided by their employer
Source: Workforce Personas and the Mobile App Gap, Forrester, Nov 2013
25%
Mobile apps will fail basic security tests through 2015Source: Gartner, Sep 2014
75%
RISK
06
Provide a curated enterprise app store that provides easy access to approved in-house and third-party appsDeploy and manage user apps dependent on roleImplement app-level security policies for DLP, encryptionand authentication
BRING YOUR OWN APPSEmployees are relying on personal apps, such as file sync and sharingtools, for work purposes. This increases the risk of data loss andpotential breaches.
SECURITYMEASURES
IT leaders believe that unmanaged file sharingare causing data leaks
Source: Safe Sharing, Intralinks, June 2014
46%
IT professionals are concerned about mobile data leakage
Source: MobileCON 2013 Survey,Symantec, Oct 2013
87%
RISK
05
Implement mobile DLP policies like blocking copy and paste Manage “open in” controls to prevent content from being accessed by unapproved appsControl whether data is allowed to be stored locally or on a Micro-SD card
DATA LEAKSWorkers rely on mobile apps for work and personal use.
SECURITYMEASURES
iOS devices jailbroken within six weeks of jailbreak tool availability
Source: Forbes, Mar 2013
18MILLION
Mobile phones on corporate networksare jailbroken
Source: Webroot, Oct 2013
24%
RISK
04
Continuously monitor device compliancePrevent compromised devices from accessing enterprise networks and apps
SECURITYMEASURES
COMPROMISED DEVICESUsers can tamper with the device OS (jailbreak or root) to gain elevated privileges and install malicious apps from unauthorized app stores.
Smartphones were stolen in 2013, nearly doubled from 2012
Source: 2014 Annual State of the Net Survey, Consumer Reports, May 2014
3.1MILLION
2012 2013
RISK
03
Enforce password policies for devices and apps using multi-factor authenticationProvide seamless access to corporate apps and resources with certificates and single sign-onEncrypt corporate apps and data so they’re protected even if the device is compromisedFull or selective device wipe
Finders of lost devices tried to access corporate information Source: Smartphone Honey Stick Project, Symantec, Feb 2012
SECURITYMEASURES
LOSS AND THEFTDevices are small and portable, making them vulnerable to loss or theft.
All mobile communications flow over WiFi
Source: Wi-Fi Alliance
71%
RISK
02
Secure connectivity via certificate-based network accessPer-app VPNs that encrypt data in transit Deploy app and email proxies that block unauthorized or non-compliant device and apps
Public WiFi hotspots have inadequate security
Source: Forbes, May 2013
*90%
*estimated
SECURITYMEASURES
ANYWHERE, ANYTIME CONNECTIVITYMobile devices are hyper-connected and often access unsecured networks, increasing the risk of data loss.
HETEROGENEOUS ENVIRONMENTUnlike traditional endpoints, mobile is a motley collection of different devices and operating systems. Workers use multiple devices, which may or may not be owned by the company.RISK
01 Information workers use three or more devices for work Source: 2013 Mobile Workforce Adoption Trends, Forrester, Feb 2013
53%
Organizations allow the use of employee-owned devices in some form Source: Cisco IBSG Horizons Study, Cisco, May 2012
95%
Apply consistent policies across mobile operating systemsSeparate personal and corporate data
SECURITYMEASURES
TOP 7RISKSOF ENTERPRISE
MOBILITYHOW TO HELPPROTECTYOUR BUSINESS
8/10
Source: Symantec Intelligence Report, Symantec, Oct 2014
Go ahead, you've got
Top Related