1
Mobile devices have given everyone smarter, better ways to work. They’ve also given security leaders bigger, messier threats to worry about. A recent Mobile Security Report* looks at the threats mobile and IoT devices bring with them—and the solutions available to mitigate those risks. This is what we found. More and more companies allow their employees to use their own mobile devices for work. It makes sense—it’s convenient for both the business and the employee, and it has massive benefits. A bring-your-own-device policy doesn’t come without significant security risks. We asked more than 2000 cybercrime professionals about their concerns. …and the list actually goes on. And they’re right to be concerned, because those threats are very real. The increase in mobile phone usage is actually driving a rise in cybercrime. Those threats are significant enough that 30% of respondents cited information security concerns as the number one inhibitor to establishing a ‘bring your own device’ policy at work. (An additional 14% are concerned about employee privacy, and 11% about support costs .) If you can’t detect them, how can you hope to stop them? Allowing your employees to use their mobile phones for work is great... …but it paints a target on your back Because cybercriminals love mobile. And security professionals are struggling to detect those threats. And here are the key capabilities a Mobile Threat Management solution should have. When it comes to mobile security, these are the essentials according to our respondents. Serious about mobile security? Here’s the biggest pain points you need to address. Find out what Sprint Security Solutions can do for you. Contact your local Sprint representative today to learn more. Call 877-924-9360 or see more details at https://business.sprint.com/solutions/secure-mobile-ai/ And if you’re looking for a better way to manage BYOD, visit https://business.sprint.com/solutions/sprint-multiline/ Let’s talk How AI-powered mobile security can help Mobile devices at work are a huge boon—but their growing prevalence is not without challenges, from managing them to tackling security threats. Artificial Intelligence eases the burden of detecting those threats. On-device threat detection apps continuously monitor device behavior, analyze data, identify threats, and deliver quick incident response recommendations. 66 % Logging, monitoring and reporting 66 % Malware reporting 61 % Ease of deployment 61 % Network/Wi-Fi attack defense 55 % Device configuration 52 % Integration with other Endpoint Management Systems 52 % Vulnerability exploit defense 52 % Role-based access control 74 % 49 % 54 % 19 % Improved employee mobility and productivity Greater employee satisfaction Reduced costs Reduced security risk Cybersecurity professionals simply don’t know if mobile devices were exposed to security threats in the past. 4/10 Of respondents saw a moderate or significant increase in mobile device threats in the last 12 months. 51 % A solution that detects threats and remediates them based on corporate policy. 43 % Protection Integration A mobile security solution that integrates with our existing network, endpoint or IT Service Management platforms (like System Center, for instance). 27 % Visibility A solution that lets you see all the affected devices and types of threats. 17 % 42 % Aren’t sure if mobile devices were involved in security breaches in their organization 43 % Aren’t sure if they’ve had malware downloads on any devices previously 48 % Aren’t sure if any devices have been connected to malicious Wi-Fi networks in the past And they’re already taking action to protect their data, systems and users. The following mobile security technologies are already in place or planned in a number of organizations. 51 % Malware 61 % Data leakage/loss 53 % Users download unsafe apps or content 52 % Lost or stolen devices 49 % Vulnerability exploits 41 % Inability to control endpoint security 53 % Unauthorized access to company data and systems 68 % Password protection 62 % Endpoint security tools 56 % Remote wipe 56 % Mobile device management 50 % Device encryption Your mobile workforce is a security threat. * 2018 Mobile Security Report from Zimperium

Your mobile workforce is a security threat. · signi˜icant security risks. We asked more than 2000 cybercrime professionals about their concerns. …and the list actually goes on

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Your mobile workforce is a security threat. · signi˜icant security risks. We asked more than 2000 cybercrime professionals about their concerns. …and the list actually goes on

Mobile devices have given everyone smarter, better ways to work. They’ve also given security leaders bigger, messier threats to worry about.

A recent Mobile Security Report* looks at the threats mobile and IoT devices bring with them—and the solutions available to mitigate those risks.

This is what we found.

More and more companies allow their employees to use their own mobile devices for work. It makes sense—it’s convenient for both the business and the employee, and it has massive benefits.

A bring-your-own-device policy doesn’t come without significant security risks. We asked more than 2000 cybercrime professionals about their concerns.

…and the list actually goes on. And they’re right to be concerned, because those threats are very real.

The increase in mobile phone usage is actually driving a rise in cybercrime.

Those threats are significant enough that 30% of respondents cited information security concerns as the number one inhibitor to establishing a ‘bring your own device’ policy at work.

(An additional 14% are concerned about employee privacy, and 11% about support costs.)

If you can’t detect them, how can you hope to stop them?

Allowing your employees to use their mobile phones for work is great...

…but it paints a target on your back

Because cybercriminals love mobile.

And security professionals are struggling to detect those threats.

And here are the key capabilities a Mobile Threat Management solution should have.

When it comes to mobile security, these are the essentials according to our respondents.

Serious about mobile security? Here’s the biggest pain points you need to address.

Find out what Sprint Security Solutions can do for you. Contact your local Sprint representative today to learn more.Call 877-924-9360 or see more details at https://business.sprint.com/solutions/secure-mobile-ai/

And if you’re looking for a better way to manage BYOD, visit https://business.sprint.com/solutions/sprint-multiline/

Let’s talk

How AI-powered mobile security can help

Mobile devices at work are a huge boon—but their growing prevalence is not without challenges, from managing them to tackling security threats.

Artificial Intelligence eases the burden of detecting those threats. On-device threat detection apps continuously monitor device behavior, analyze data, identify threats, and deliver quick incident response recommendations.

66%Logging, monitoring and reporting

66%Malware reporting

61%Ease of deployment

61%Network/Wi-Fi attack defense

55%Device configuration

52%Integration with other Endpoint Management Systems

52%Vulnerability exploit defense

52%Role-based access control

74% 49%54% 19%Improved employee mobility and productivity

Greater employee satisfaction

Reduced costs Reduced security risk

Cybersecurity professionals simply don’t know if mobile devices were exposed to security threats in the past.

4/10

Of respondents saw a moderate or significant increase in mobile device threats in the last 12 months.

51%

A solution that detects threats and remediates them based on corporate policy.

43%Protection

IntegrationA mobile security solution that integrates with our existing network, endpoint or IT Service Management platforms (like System Center, for instance).

27%

VisibilityA solution that lets you see all the a�ected devices and types of threats.

17%

42%Aren’t sure if mobile devices were involved in security breaches in their organization

43%Aren’t sure if they’ve had malware downloads on any devices previously

48%Aren’t sure if any devices have been connected to malicious Wi-Fi networks in the past

And they’re already taking action to protect their data, systems and users. The following mobile security technologies are already in place or planned in a number of organizations.

51%Malware

61%Data leakage/loss

53%Users download unsafe apps or content

52%Lost or stolen devices

49%Vulnerability exploits

41%Inability to control endpoint security

53%Unauthorized access to company data and systems

68%Password protection

62%Endpoint security tools

56%Remote wipe

56%Mobile device management

50%Device encryption

Your mobile workforce is a security threat.

* 2018 Mobile Security Report from Zimperium