1 / 17

Mobility In the Enterprise Friend or Foe?

Mobility In the Enterprise Friend or Foe?. Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio , 2012 Barcelona, España. Mobile Device Demand. iPhone Timeline. Android Timeline. Apple Product Timeline. Mobile Device Experience. Mobile Banking.

giulio
Download Presentation

Mobility In the Enterprise Friend or Foe?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España

  2. Mobile Device Demand

  3. iPhone Timeline

  4. Android Timeline

  5. Apple Product Timeline

  6. Mobile Device Experience

  7. Mobile Banking

  8. Benefits and Concerns Business Benefits • Cost shifts to employee • Worker satisfaction Concerns • Loss of Control • Regulatory Compliance • Information Leakage • Application Quality

  9. Security Issues

  10. Mobile Malware Infection

  11. Mobile Malware

  12. Android Malware Case June 18, 2012 Android Malware Scam Nets $265K, Lands IT Execs in Tokyo Jail “Half a dozen men located in Tokyo reportedly worked together to create a piece of Android malware that they then disguised as a video player and distributed through an adult website starting in December 2011. The software presumably offered adult videos or other related content, but once the app was installed it stole users' personal information, including phone numbers and e-mail addresses, which were then stored on a server hosted outside of Japan.”

  13. Security Issues June 18, 2012 BYOD Security, Management an Issue for IT: Gartner “According to the survey, the security top issues included the use of privately owned devices and deployment of new enterprise mobile platforms. Gartner recommended focusing on mobile data protection (MDP), network access control (NAC), and mobile device management (MDM) tools. Survey results also indicate enterprises are providing support for BYOD programs, offering technical support for 32 percent of smartphones, 37 percent of tablets and 44 percent of laptops. However, the report noted that support varied greatly by region.”

  14. Mobile Security Vendors

  15. Getting Started • Financial Benefits • High-Performance Network Infrastructure • Identify Tools That Support End-to-End Security • Prioritize Technology To Be Supported • Prioritize Applications • Set Access Policies • Ability to Manage Life-Cycle

  16. Questions To Ask • Do we have cross-platform (iOS, Windows Mobile, and Android) knowledge, tools, and apps? • How will we distribute applications to and manage applications on employee devices? • How will we develop secure applications for mobile devices? • What applications should we deploy—email, time and expense management, corporate directories, CRM? • Will we provide intranet access to BYOD users? • What types of users will be provided with BYOD devices? Will we provide them to everyone, or a select group that has a greater need for mobility? • What levels of access to applications and services will be afforded to each group of users? Source: Bring Your Own Devices Best Practices Guide, Good Technology

  17. Friend or Foe? Gracias! bob.west@echelonone.net 513.328.7430

More Related