Upload
others
View
6
Download
0
Embed Size (px)
Citation preview
Mobile devices have given everyone smarter, better ways to work. They’ve also given security leaders bigger, messier threats to worry about.
A recent Mobile Security Report* looks at the threats mobile and IoT devices bring with them—and the solutions available to mitigate those risks.
This is what we found.
More and more companies allow their employees to use their own mobile devices for work. It makes sense—it’s convenient for both the business and the employee, and it has massive benefits.
A bring-your-own-device policy doesn’t come without significant security risks. We asked more than 2000 cybercrime professionals about their concerns.
…and the list actually goes on. And they’re right to be concerned, because those threats are very real.
The increase in mobile phone usage is actually driving a rise in cybercrime.
Those threats are significant enough that 30% of respondents cited information security concerns as the number one inhibitor to establishing a ‘bring your own device’ policy at work.
(An additional 14% are concerned about employee privacy, and 11% about support costs.)
If you can’t detect them, how can you hope to stop them?
Allowing your employees to use their mobile phones for work is great...
…but it paints a target on your back
Because cybercriminals love mobile.
And security professionals are struggling to detect those threats.
And here are the key capabilities a Mobile Threat Management solution should have.
When it comes to mobile security, these are the essentials according to our respondents.
Serious about mobile security? Here’s the biggest pain points you need to address.
Find out what Sprint Security Solutions can do for you. Contact your local Sprint representative today to learn more.Call 877-924-9360 or see more details at https://business.sprint.com/solutions/secure-mobile-ai/
And if you’re looking for a better way to manage BYOD, visit https://business.sprint.com/solutions/sprint-multiline/
Let’s talk
How AI-powered mobile security can help
Mobile devices at work are a huge boon—but their growing prevalence is not without challenges, from managing them to tackling security threats.
Artificial Intelligence eases the burden of detecting those threats. On-device threat detection apps continuously monitor device behavior, analyze data, identify threats, and deliver quick incident response recommendations.
66%Logging, monitoring and reporting
66%Malware reporting
61%Ease of deployment
61%Network/Wi-Fi attack defense
55%Device configuration
52%Integration with other Endpoint Management Systems
52%Vulnerability exploit defense
52%Role-based access control
74% 49%54% 19%Improved employee mobility and productivity
Greater employee satisfaction
Reduced costs Reduced security risk
Cybersecurity professionals simply don’t know if mobile devices were exposed to security threats in the past.
4/10
Of respondents saw a moderate or significant increase in mobile device threats in the last 12 months.
51%
A solution that detects threats and remediates them based on corporate policy.
43%Protection
IntegrationA mobile security solution that integrates with our existing network, endpoint or IT Service Management platforms (like System Center, for instance).
27%
VisibilityA solution that lets you see all the a�ected devices and types of threats.
17%
42%Aren’t sure if mobile devices were involved in security breaches in their organization
43%Aren’t sure if they’ve had malware downloads on any devices previously
48%Aren’t sure if any devices have been connected to malicious Wi-Fi networks in the past
And they’re already taking action to protect their data, systems and users. The following mobile security technologies are already in place or planned in a number of organizations.
51%Malware
61%Data leakage/loss
53%Users download unsafe apps or content
52%Lost or stolen devices
49%Vulnerability exploits
41%Inability to control endpoint security
53%Unauthorized access to company data and systems
68%Password protection
62%Endpoint security tools
56%Remote wipe
56%Mobile device management
50%Device encryption
Your mobile workforce is a security threat.
* 2018 Mobile Security Report from Zimperium