Evaluate Top Seven Risks of Enterprise Mobility

Preview:

Citation preview

Source: Norton Mobile Insight data as of October 2014, Symantec

RISK

07

Centrally manage mobile threat protection to ensure devicesare protectedProactively detect and prevent mobile threats such as malware and risky appsWhitelist or blacklist apps based on app behaviorBlock access to enterprise apps and services if malwareis detected

SECURITYMEASURES

WHAT ARE THE RISKY BEHAVIORS?

MALICIOUS AND RISKY APPSApps are fun, helpful and the weakest entry point for cyber-criminals. Mobile apps are too often installed by users with little or no thought to the dangers they may pose.

3 MILLIONMalicious

Apps

8 MILLION

Apps withRisky Behaviors

Symantec™ Mobility : Suite

Deliver comprehensive mobile protection without compromising the user experience. So your data, apps and users stay connected, productive and secure.

Learn more at symantec.com/mobility

#GoEmpower

© 2015 Symantec Corporation. All rights reserved. 21345272

HeterogeneousEnvironment

Anywhere,AnytimeConnectivity

Loss and Theft

CompromisedDevices

Data Leaks

Bring YourOwn Apps

Malicious andRisky Apps

A: Steal InformationB: Track the UserC: Traditional ThreatsD: Send ContentE: Reconfigure Device

19%

A B C D E

22%26%

13% 13%

Employees are bringing their own apps to fill the gap of apps not provided by their employer

Source: Workforce Personas and the Mobile App Gap, Forrester, Nov 2013

25%

Mobile apps will fail basic security tests through 2015Source: Gartner, Sep 2014

75%

RISK

06

Provide a curated enterprise app store that provides easy access to approved in-house and third-party appsDeploy and manage user apps dependent on roleImplement app-level security policies for DLP, encryptionand authentication

BRING YOUR OWN APPSEmployees are relying on personal apps, such as file sync and sharingtools, for work purposes. This increases the risk of data loss andpotential breaches.

SECURITYMEASURES

IT leaders believe that unmanaged file sharingare causing data leaks

Source: Safe Sharing, Intralinks, June 2014

46%

IT professionals are concerned about mobile data leakage

Source: MobileCON 2013 Survey,Symantec, Oct 2013

87%

RISK

05

Implement mobile DLP policies like blocking copy and paste Manage “open in” controls to prevent content from being accessed by unapproved appsControl whether data is allowed to be stored locally or on a Micro-SD card

DATA LEAKSWorkers rely on mobile apps for work and personal use.

SECURITYMEASURES

iOS devices jailbroken within six weeks of jailbreak tool availability

Source: Forbes, Mar 2013

18MILLION

Mobile phones on corporate networksare jailbroken

Source: Webroot, Oct 2013

24%

RISK

04

Continuously monitor device compliancePrevent compromised devices from accessing enterprise networks and apps

SECURITYMEASURES

COMPROMISED DEVICESUsers can tamper with the device OS (jailbreak or root) to gain elevated privileges and install malicious apps from unauthorized app stores.

Smartphones were stolen in 2013, nearly doubled from 2012

Source: 2014 Annual State of the Net Survey, Consumer Reports, May 2014

3.1MILLION

2012 2013

RISK

03

Enforce password policies for devices and apps using multi-factor authenticationProvide seamless access to corporate apps and resources with certificates and single sign-onEncrypt corporate apps and data so they’re protected even if the device is compromisedFull or selective device wipe

Finders of lost devices tried to access corporate information Source: Smartphone Honey Stick Project, Symantec, Feb 2012

SECURITYMEASURES

LOSS AND THEFTDevices are small and portable, making them vulnerable to loss or theft.

All mobile communications flow over WiFi

Source: Wi-Fi Alliance

71%

RISK

02

Secure connectivity via certificate-based network accessPer-app VPNs that encrypt data in transit Deploy app and email proxies that block unauthorized or non-compliant device and apps

Public WiFi hotspots have inadequate security

Source: Forbes, May 2013

*90%

*estimated

SECURITYMEASURES

ANYWHERE, ANYTIME CONNECTIVITYMobile devices are hyper-connected and often access unsecured networks, increasing the risk of data loss.

HETEROGENEOUS ENVIRONMENTUnlike traditional endpoints, mobile is a motley collection of different devices and operating systems. Workers use multiple devices, which may or may not be owned by the company.RISK

01 Information workers use three or more devices for work Source: 2013 Mobile Workforce Adoption Trends, Forrester, Feb 2013

53%

Organizations allow the use of employee-owned devices in some form Source: Cisco IBSG Horizons Study, Cisco, May 2012

95%

Apply consistent policies across mobile operating systemsSeparate personal and corporate data

SECURITYMEASURES

TOP 7RISKSOF ENTERPRISE

MOBILITYHOW TO HELPPROTECTYOUR BUSINESS

8/10

Source: Symantec Intelligence Report, Symantec, Oct 2014

Go ahead, you've got

Recommended