1
Source: Norton Mobile Insight data as of October 2014, Symantec RISK 07 Centrally manage mobile threat protection to ensure devices are protected Proactively detect and prevent mobile threats such as malware and risky apps Whitelist or blacklist apps based on app behavior Block access to enterprise apps and services if malware is detected SECURITY MEASURES WHAT ARE THE RISKY BEHAVIORS? MALICIOUS AND RISKY APPS Apps are fun, helpful and the weakest entry point for cyber-criminals. Mobile apps are too often installed by users with little or no thought to the dangers they may pose. 3 MILLION Malicious Apps 8 MILLION Apps with Risky Behaviors SymantecMobility : Suite Deliver comprehensive mobile protection without compromising the user experience. So your data, apps and users stay connected, productive and secure. Learn more at symantec.com /mobility #GoEmpower © 2015 Symantec Corporation. All rights reserved. 21345272 Heterogeneous Environment Anywhere, Anytime Connectivity Loss and Theft Compromised Devices Data Leaks Bring Your Own Apps Malicious and Risky Apps A: Steal Information B: Track the User C: Traditional Threats D: Send Content E: Reconfigure Device 19 % A B C D E 22 % 26 % 13 % 13 % Employees are bringing their own apps to fill the gap of apps not provided by their employer Source: Workforce Personas and the Mobile App Gap, Forrester, Nov 2013 25 % Mobile apps will fail basic security tests through 2015 Source: Gartner, Sep 2014 75 % RISK 06 Provide a curated enterprise app store that provides easy access to approved in-house and third-party apps Deploy and manage user apps dependent on role Implement app-level security policies for DLP, encryption and authentication BRING YOUR OWN APPS Employees are relying on personal apps, such as file sync and sharing tools, for work purposes. This increases the risk of data loss and potential breaches. SECURITY MEASURES IT leaders believe that unmanaged file sharing are causing data leaks Source: Safe Sharing, Intralinks, June 2014 46 % IT professionals are concerned about mobile data leakage Source: MobileCON 2013 Survey, Symantec, Oct 2013 87 % RISK 05 Implement mobile DLP policies like blocking copy and paste Manage “open in” controls to prevent content from being accessed by unapproved apps Control whether data is allowed to be stored locally or on a Micro-SD card DATA LEAKS Workers rely on mobile apps for work and personal use. SECURITY MEASURES iOS devices jailbroken within six weeks of jailbreak tool availability Source: Forbes, Mar 2013 18 MILLION Mobile phones on corporate networks are jailbroken Source: Webroot, Oct 2013 24 % RISK 04 Continuously monitor device compliance Prevent compromised devices from accessing enterprise networks and apps SECURITY MEASURES COMPROMISED DEVICES Users can tamper with the device OS (jailbreak or root) to gain elevated privileges and install malicious apps from unauthorized app stores. Smartphones were stolen in 2013, nearly doubled from 2012 Source: 2014 Annual State of the Net Survey, Consumer Reports, May 2014 3.1 MILLION 2012 2013 RISK 03 Enforce password policies for devices and apps using multi-factor authentication Provide seamless access to corporate apps and resources with certificates and single sign-on Encrypt corporate apps and data so they’re protected even if the device is compromised Full or selective device wipe Finders of lost devices tried to access corporate information Source: Smartphone Honey Stick Project, Symantec, Feb 2012 SECURITY MEASURES LOSS AND THEFT Devices are small and portable, making them vulnerable to loss or theft. All mobile communications flow over WiFi Source: Wi-Fi Alliance 71 % RISK 02 Secure connectivity via certificate-based network access Per-app VPNs that encrypt data in transit Deploy app and email proxies that block unauthorized or non-compliant device and apps Public WiFi hotspots have inadequate security Source: Forbes, May 2013 * 90 % *estimated SECURITY MEASURES ANYWHERE, ANYTIME CONNECTIVITY Mobile devices are hyper-connected and often access unsecured networks, increasing the risk of data loss. HETEROGENEOUS ENVIRONMENT Unlike traditional endpoints, mobile is a motley collection of different devices and operating systems. Workers use multiple devices, which may or may not be owned by the company. RISK 01 Information workers use three or more devices for work Source: 2013 Mobile Workforce Adoption Trends, Forrester, Feb 2013 53 % Organizations allow the use of employee-owned devices in some form Source: Cisco IBSG Horizons Study, Cisco, May 2012 95 % Apply consistent policies across mobile operating systems Separate personal and corporate data SECURITY MEASURES TOP 7 RISKS OF ENTERPRISE MOBILITY HOW TO HELP PROTECT YOUR BUSINESS 8/10 Source: Symantec Intelligence Report, Symantec, Oct 2014 Go ahead, you've got

Evaluate Top Seven Risks of Enterprise Mobility

Embed Size (px)

Citation preview

Page 1: Evaluate Top Seven Risks of Enterprise Mobility

Source: Norton Mobile Insight data as of October 2014, Symantec

RISK

07

Centrally manage mobile threat protection to ensure devicesare protectedProactively detect and prevent mobile threats such as malware and risky appsWhitelist or blacklist apps based on app behaviorBlock access to enterprise apps and services if malwareis detected

SECURITYMEASURES

WHAT ARE THE RISKY BEHAVIORS?

MALICIOUS AND RISKY APPSApps are fun, helpful and the weakest entry point for cyber-criminals. Mobile apps are too often installed by users with little or no thought to the dangers they may pose.

3 MILLIONMalicious

Apps

8 MILLION

Apps withRisky Behaviors

Symantec™ Mobility : Suite

Deliver comprehensive mobile protection without compromising the user experience. So your data, apps and users stay connected, productive and secure.

Learn more at symantec.com/mobility

#GoEmpower

© 2015 Symantec Corporation. All rights reserved. 21345272

HeterogeneousEnvironment

Anywhere,AnytimeConnectivity

Loss and Theft

CompromisedDevices

Data Leaks

Bring YourOwn Apps

Malicious andRisky Apps

A: Steal InformationB: Track the UserC: Traditional ThreatsD: Send ContentE: Reconfigure Device

19%

A B C D E

22%26%

13% 13%

Employees are bringing their own apps to fill the gap of apps not provided by their employer

Source: Workforce Personas and the Mobile App Gap, Forrester, Nov 2013

25%

Mobile apps will fail basic security tests through 2015Source: Gartner, Sep 2014

75%

RISK

06

Provide a curated enterprise app store that provides easy access to approved in-house and third-party appsDeploy and manage user apps dependent on roleImplement app-level security policies for DLP, encryptionand authentication

BRING YOUR OWN APPSEmployees are relying on personal apps, such as file sync and sharingtools, for work purposes. This increases the risk of data loss andpotential breaches.

SECURITYMEASURES

IT leaders believe that unmanaged file sharingare causing data leaks

Source: Safe Sharing, Intralinks, June 2014

46%

IT professionals are concerned about mobile data leakage

Source: MobileCON 2013 Survey,Symantec, Oct 2013

87%

RISK

05

Implement mobile DLP policies like blocking copy and paste Manage “open in” controls to prevent content from being accessed by unapproved appsControl whether data is allowed to be stored locally or on a Micro-SD card

DATA LEAKSWorkers rely on mobile apps for work and personal use.

SECURITYMEASURES

iOS devices jailbroken within six weeks of jailbreak tool availability

Source: Forbes, Mar 2013

18MILLION

Mobile phones on corporate networksare jailbroken

Source: Webroot, Oct 2013

24%

RISK

04

Continuously monitor device compliancePrevent compromised devices from accessing enterprise networks and apps

SECURITYMEASURES

COMPROMISED DEVICESUsers can tamper with the device OS (jailbreak or root) to gain elevated privileges and install malicious apps from unauthorized app stores.

Smartphones were stolen in 2013, nearly doubled from 2012

Source: 2014 Annual State of the Net Survey, Consumer Reports, May 2014

3.1MILLION

2012 2013

RISK

03

Enforce password policies for devices and apps using multi-factor authenticationProvide seamless access to corporate apps and resources with certificates and single sign-onEncrypt corporate apps and data so they’re protected even if the device is compromisedFull or selective device wipe

Finders of lost devices tried to access corporate information Source: Smartphone Honey Stick Project, Symantec, Feb 2012

SECURITYMEASURES

LOSS AND THEFTDevices are small and portable, making them vulnerable to loss or theft.

All mobile communications flow over WiFi

Source: Wi-Fi Alliance

71%

RISK

02

Secure connectivity via certificate-based network accessPer-app VPNs that encrypt data in transit Deploy app and email proxies that block unauthorized or non-compliant device and apps

Public WiFi hotspots have inadequate security

Source: Forbes, May 2013

*90%

*estimated

SECURITYMEASURES

ANYWHERE, ANYTIME CONNECTIVITYMobile devices are hyper-connected and often access unsecured networks, increasing the risk of data loss.

HETEROGENEOUS ENVIRONMENTUnlike traditional endpoints, mobile is a motley collection of different devices and operating systems. Workers use multiple devices, which may or may not be owned by the company.RISK

01 Information workers use three or more devices for work Source: 2013 Mobile Workforce Adoption Trends, Forrester, Feb 2013

53%

Organizations allow the use of employee-owned devices in some form Source: Cisco IBSG Horizons Study, Cisco, May 2012

95%

Apply consistent policies across mobile operating systemsSeparate personal and corporate data

SECURITYMEASURES

TOP 7RISKSOF ENTERPRISE

MOBILITYHOW TO HELPPROTECTYOUR BUSINESS

8/10

Source: Symantec Intelligence Report, Symantec, Oct 2014

Go ahead, you've got