Upload
cisco-business-insights
View
3.139
Download
2
Tags:
Embed Size (px)
Citation preview
CIO Roadmap to Mobile Security
A Top Concern for IT and Business Leaders
Dimension Data guest blog series highlighting essential policy and programs
#MobileSecurity
Darryl WilsonDirector, Enterprise Mobility for Dimension
Data Americas
Stefaan HinderyckxDirector, Network Integration and Security
for Dimension Data Europe
Dimension Data Authors
Jason HarrisPrincipal Consultant for Security and
Enterprise Mobility for Dimension Data Americas
Rory DuncanSecurity Line of Business Manager for
Dimension Data UK
Click this button to tweet the information on the
slide.
Dimension Data Series #1: Mobile Security: Actions Speak Louder than Words
If securing company data and successfully
implementing a mobile policy is of such
importance, why aren’t more IT leaders taking
strategic action?
#MobileSecurity
• 79% say mobility is a top priority for their organization. However, the report indicates that a much smaller segment of those IT leaders’ actions back it up.
• 77% of those surveyed believe data is the greatest concern pertaining to mobility.
• Yet only 55% have a mobility roadmap in place.
• 67% of all devices, all of which are on mature networks, carry at least one known security vulnerability.
Did You Know:
Source: Dimension Data 2014 Secure Mobility Survey
#MobileSecurity
Dimension Data Series #2: Mobility Policy: The Mobile Endpoint is the New Perimeter
Employees use their devices to access our systems on their own. It’s nearly impossible
to stop.
#MobileSecurity
Short list of what recommended operational security policies should include:
• Define what constitutes a Bring Your Own Device
• Determine a plan for how known and unknown devices are brought onto the network
• Outline a policy for what happens when a device is lost or stolen
• Decide how organizations and users deal with device disposal
• Institute cloud backup and restoration policies#MobileSecurity
Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation
There is a gap between the vision for
secure mobility and the real-world
implementation.
#MobileSecurity
1)Determine a Mobility Policy and Data Classification Model
2)Define Access Control
3)Introduce Mobile Device Management
4)Ensure Data Leakage Prevention from a mobile perspective is respected
Four steps to consider when turning a secure mobility vision into reality:
#MobileSecurity
Dimension Data Series #4: The Opportunity and Risk of Secure Mobility from the Top Down
Empowering the mobile worker pays
dividends in terms of worker productivity
and efficiency.
#MobileSecurity
Real Opportunities:
• Embracing mobility can retain staff between the ages of 18-35, especially as many in this age group bring or are expected to bring at least one device from home to use for work.
• Mobility offers increased productivity by mobilizing business processes. This functionality can extend across the value chain, helping improve customer interaction, enable quicker sales, and more.
#MobileSecurity
Top-Down Approach:
• Organization and IT leaders must match business-driven policy from an architecture approach. Business objectives and goals must be translated down into actual technical security control and policies to enable that proper secure mobility.
• Help mitigate the risks IT and business leaders feel and ensure organizations are dedicating enough resources to fully enabling users to leverage existing business applications in ways that substantially increase the opportunities of mobility.
#MobileSecurity
Read the Entire Blog Series on Mobile Security• Dimension Data Series #1: Mobile Security: Actions
Speak Louder than Words
• Dimension Data Series #2 – Mobility Policy: The Mobile Endpoint is the New Perimeter
• Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation
• Dimension Data Series #4- The Opportunities and Risk of Secure Mobility from the Top Down
#MobileSecurity
See how we can help your business prepare for the mobile security.
cisco.com/go/mobility
#MobileSecurity