1
Is It Time for a Mobile Security Assessment? The current state of mobility 59% of C-level security leaders describe their business as either partially or fully mobile. 1 64% report that mobility has increased productivity and efficiency. 2 28% of CIOs say that their organization doesn't even have a mobile strategy. 3 63% say enterprise mobility has surfaced a greater number of security risks and concerns than anticipated. 4 **** Among the top challenges that enterprises face with mobility are: Protecting data Application security concerns Separation of work and personal data Organizations feel the effect of these challenges in a number of ways. 67% of organizations said a data breach likely resulted from employees using their mobile devices to access sensitive company information. 5 33% of employees say they have more access to confidential or classified documents, while only 8 percent of IT says that employees have this access. 6 20% of BYOD programs will fail because IT is trying to implement MDM solutions that are too restrictive. 7 Enterprises need a mobile security plan to strategically balance risk and employee productivity. This involves right sizing mobile policies, leveraging tools to manage risks and where possible enabling more open environments for better user experience. A comprehensive mobile security assessment: Know your needs Legal policies and regulatory requirements Mobility infrastructure Mobility applications Data protection Mobility end points Risk and threat management The Samsung/Booz Allen Hamilton security assessment The seven fundamentals of mobile security: Samsung has partnered with Booz Allen company security protocols and improve your overall security position. Don't leave your security situation to chance — get the answers you need. A partnership you can trust market consolidation. 7 Given this scenario, companies with long-standing security records like Samsung and Booz Allen Hamilton can give you confidence over the long term. "2016 Mobile Security & Business Transformation Study," Information Security Media Group, 2016, http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03118usen/WGL03118USEN.PDF. Ibid. Josh Brost, "1 in 4 CIOs Say Their Organization Doesn't Have a Mobile Strategy," Robert Half Technology, March 25, 2014, https://www.roberthalf.com/technology/blog/ 1-in-4-cios-say-their-organization-has-no-mobile-strategy. "2016 Mobile Security & Business Transformation Study," Information Security Media Group, 2016, http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03118usen/WGL03118USEN.PDF. "The Economic Risk of Confidential Information on Mobile Devices in the Workplace," Ponemon Institute, Feb. 2016. Ibid. "Gartner Predicts 20% of BYOD Programs Will Fail in the Next Two Years," Unified Communication Strategies, Jan. 14, 2014, http://www.ucstrategies.com/unified-communications- newsroom/gartner-predicts-20-of-byod-programswill-fail-in-the-next-two-years.aspx. 1 2 3 4 5 6 7 We’ll assess not only the security effectiveness in these areas, but how security protocols align with overarching business needs. Mobile device management (MDM) Mobile application management (MAM) Security and threat protection across the organization As part of its assessment, Samsung and evaluate: 1 7 6 5 4 3 2 Business management and governance Learn more about the Samsung and Booz Allen Hamilton security assessment services: samsung.com/mobile-security-assessment boozallen.com/cybersolutions Download our white paper, “The Mobile Security Evolution” to understand how you can move your approach to mobile security from tactical to strategic.

Is It Time for a Mobile Security Assessment? · 2017-06-23 · Is It Time for a Mobile Security Assessment? The current state of mobility 59% of C-level security leaders describe

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Is It Time for a Mobile Security Assessment? · 2017-06-23 · Is It Time for a Mobile Security Assessment? The current state of mobility 59% of C-level security leaders describe

Is It Time for a Mobile Security Assessment?

The current state of mobility

59%of C-level security leaders describe their business as either partially or fully mobile.1

64%report that mobility has increased productivity and efficiency.2

28%of CIOs say that their organization doesn't even have a mobile strategy.3

63%say enterprise mobility has surfaced a greater number of security risks and concerns than anticipated.4

****

Among the top challenges that enterprises face with mobility are:

Protecting data

Application security

concerns

Separation of work and

personal data

Organizations feel the effect of these challenges in a number of ways.

67%of organizations said a data breach likely resulted from employees using their mobile devices to access sensitive company information.5

33%of employees say they have more access to confidential or classified documents, while only 8 percent of IT says that employees have this access.6

20%of BYOD programs will fail because IT is trying to implement MDM solutions that are too restrictive.7

Enterprises need a mobile security plan to strategically balance risk and employee productivity. This involves right sizing mobile policies, leveraging tools to manage risks and where possible enabling more open environments for better user experience.

A comprehensive mobile security assessment: Know your needs

Legal policies and regulatory requirements

Mobility infrastructure

Mobility applications

Data protection

Mobility end points

Risk and threat management

The Samsung/Booz Allen Hamilton security assessment

The seven fundamentals of mobile security:

Samsung has partnered with Booz Allen

company security protocols and improve your overall security position. Don't leave

your security situation to chance — get the answers you need.

A partnership you can trust

market consolidation.7 Given this scenario, companies with long-standing security records like Samsung and Booz Allen Hamilton can give you confidence over the long term.

"2016 Mobile Security & Business Transformation Study," Information Security Media Group, 2016, http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03118usen/WGL03118USEN.PDF.

Ibid.

Josh Brost, "1 in 4 CIOs Say Their Organization Doesn't Have a Mobile Strategy," Robert Half Technology, March 25, 2014, https://www.roberthalf.com/technology/blog/ 1-in-4-cios-say-their-organization-has-no-mobile-strategy.

"2016 Mobile Security & Business Transformation Study," Information Security Media Group, 2016, http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03118usen/WGL03118USEN.PDF.

"The Economic Risk of Confidential Information on Mobile Devices in the Workplace," Ponemon Institute, Feb. 2016.

Ibid.

"Gartner Predicts 20% of BYOD Programs Will Fail in the Next Two Years," Unified Communication Strategies, Jan. 14, 2014, http://www.ucstrategies.com/unified-communications- newsroom/gartner-predicts-20-of-byod-programswill-fail-in-the-next-two-years.aspx.

1

2

3

4

5

6

7

We’ll assess not only the security effectiveness in these areas, but how security protocols align with overarching business needs.

Mobiledevice

management (MDM)

Mobile application

management (MAM)

Security and threat protection

across the organization

As part of its assessment,

Samsung and

evaluate:

1

7

6

5 4

3

2

Business management and governance

Learn more about the Samsung and Booz Allen Hamilton security assessment services:

samsung.com/mobile-security-assessmentboozallen.com/cybersolutions

Download our white paper, “The Mobile Security Evolution” to understand how you can move your approach to mobile security from tactical to strategic.