The Global Enterprise Mobility Community. The Five Myths of Enterprise Mobility Tuesday 6 th March,...

19
The Global Enterprise Mobility Community

Transcript of The Global Enterprise Mobility Community. The Five Myths of Enterprise Mobility Tuesday 6 th March,...

The Global Enterprise Mobility Community

The Five Myths of Enterprise MobilityTuesday 6th March, 2012

10am - 11am (GMT)

with Sharon Clancy, Editor-in-Chief of the Enterprise Mobility Network, Nick McQuire, Principal Analyst at IDC and

Andrew Moloney, Security Expert and CEO at Artisan Consulting.

10.00-10.10am Welcome & introductions by Sharon Clancy

10.10-10.20am Introduction to the Enterprise Mobility Network

10.20-10.45am Interview with Sharon Clancy, Nick McQuire and Andrew Moloney

10.45-10.55am Q&A

10.55-11.00am Closing remarks

Sharon ClancyEditor-in-Chief, Enterprise Mobility Network

Nick McQuire, Research Director, IDC

Andrew MoloneyCEO, Artisan Consulting

emma

Nick McQuireResearch Director, IDC

Andrew MoloneyCEO, Artisan Consulting

Sharon Clancy, Editor-in-Chief, Enterprise Mobility Network

The Five Myths of Enterprise Mobility

Nick McQuireResearch Director, IDC

The Five Myths of Enterprise Mobility

1. Companies can afford to wait until technology has stabilised before deploying a mobility strategy

The Five Myths of Enterprise Mobility

2. Increased mobility for workforces means increased risk of security breaches

3. The consumerisation of IT is having no impact on sectors that use rugged mobile devices

The Five Myths of Enterprise Mobility

4. A Mobile Device Management strategy is an optional extra, not an essential tool

5. Enterprises can manage mobility in-house behind the firewall without outsourcing to a cloud-based platform

Nick McQuire Research Director, IDC

Andrew MoloneyCEO, Artisan Consulting

Sharon Clancy, Editor-in-Chief, Enterprise Mobility Network

Andrew MoloneyCEO, Artisan Consulting

Why Enabling your Mobile Workforce may actually make you more Secure

Identifying the risks

Getting a handle on your informationA holistic assessment of your information

security postureRisk brought about by processRisk brought about by practice

Five Steps to Improving Mobile Security

1. Define your “Playground”

2. Put a basic mobile policy in place

3. Put in place a basic Mobile Device Management (MDM) platform

4. Apply some basic security controls

5. Assert identity

How “Going Mobile” can improve information security

1. Encryption

2. Geolocation

3. Biometrics

4. OTP (One Time Passcode/ Password)

5. OOB (Out of Band)

6. Secure Element

FIVE KEY REMINDERS

1. Assess how Information is already at risk in your business - through Process - through Practice

2. Don't assume that broader market trends will not impact your business - plan accordingly

3. Think holistically about “End Points” - extend systems, policies, process and strategies to encompass them

4. Think holistically about the broader security benefits

5. Don't Panic. The sky isn't falling...

Any Questions?

Closing Remarks

Thank You!www.enterprisemobilitynetwork.com