Mobility In the Enterprise Friend or Foe?

Post on 16-Feb-2016

44 views 0 download

Tags:

description

Mobility In the Enterprise Friend or Foe?. Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio , 2012 Barcelona, España. Mobile Device Demand. iPhone Timeline. Android Timeline. Apple Product Timeline. Mobile Device Experience. Mobile Banking. - PowerPoint PPT Presentation

Transcript of Mobility In the Enterprise Friend or Foe?

Mobility In the Enterprise Friend or

Foe?Bob West, CEO, Echelon One

2012 Workshop on Cyber Security and Global Affairs

20 Junio, 2012Barcelona, España

2

Mobile Device Demand

3

iPhone Timeline

4

Android Timeline

5

Apple Product Timeline

6

Mobile Device Experience

7

Mobile Banking

8

Benefits and ConcernsBusiness BenefitsCost shifts to employeeWorker satisfaction

ConcernsLoss of ControlRegulatory Compliance Information LeakageApplication Quality

9

Security Issues

10

Mobile Malware Infection

11

Mobile Malware

12

Android Malware Case

“Half a dozen men located in Tokyo reportedly worked together to create a piece of Android malware that they then disguised as a video player and distributed through an adult website starting in December 2011. The software presumably offered adult videos or other related content, but once the app was installed it stole users' personal information, including phone numbers and e-mail addresses, which were then stored on a server hosted outside of Japan.”

June 18, 2012Android Malware Scam Nets $265K, Lands IT Execs in Tokyo Jail

13

Security Issues“According to the survey, the security top issues included the use of privately owned devices and deployment of new enterprise mobile platforms. Gartner recommended focusing on mobile data protection (MDP), network access control (NAC), and mobile device management (MDM) tools. Survey results also indicate enterprises are providing support for BYOD programs, offering technical support for 32 percent of smartphones, 37 percent of tablets and 44 percent of laptops. However, the report noted that support varied greatly by region.”

June 18, 2012BYOD Security, Management an Issue for IT: Gartner

14

Mobile Security Vendors

15

Getting StartedFinancial BenefitsHigh-Performance Network

Infrastructure Identify Tools That Support End-

to-End SecurityPrioritize Technology To Be

SupportedPrioritize ApplicationsSet Access PoliciesAbility to Manage Life-Cycle

16

Questions To Ask Do we have cross-platform (iOS, Windows Mobile, and Android)

knowledge, tools, and apps? How will we distribute applications to and manage applications on

employee devices? How will we develop secure applications for mobile devices? What applications should we deploy—email, time and expense

management, corporate directories, CRM? Will we provide intranet access to BYOD users? What types of users will be provided with BYOD devices? Will we provide

them to everyone, or a select group that has a greater need for mobility? What levels of access to applications and services will be afforded to

each group of users?

Source: Bring Your Own Devices Best Practices Guide, Good Technology

17

Friend or Foe?Gracias!

bob.west@echelonone.net

513.328.7430