Contenu connexe Similaire à Top Seven Risks of Enterprise Mobility - How to protect your business (20) Top Seven Risks of Enterprise Mobility - How to protect your business1. Source: Norton Mobile Insight data as of October 2014, Symantec
RISK
07
Centrally manage mobile threat protection to ensure devices
are protected
Proactively detect and prevent mobile threats such as malware
and risky apps
Whitelist or blacklist apps based on app behavior
Block access to enterprise apps and services if malware
is detected
SECURITY
MEASURES
WHAT ARE THE RISKY BEHAVIORS?
MALICIOUS AND RISKY APPS
Apps are fun, helpful and the weakest entry point for cyber-criminals.
Mobile apps are too often installed by users with little or no thought to the
dangers they may pose.
3MILLION
Malicious
Apps
8MILLION
Apps with
Risky Behaviors
Symantec™ Mobility:Suite
Deliver comprehensive mobile protection without compromising the user experience.
So your data, apps and users stay connected, productive and secure.
Learn more at symantec.com/mobility
#GoEmpower
© 2015 Symantec Corporation. All rights reserved. 21345272
Heterogeneous
Environment
Anywhere,
Anytime
Connectivity
Loss and Theft
Compromised
Devices
Data Leaks
Bring Your
Own Apps
Malicious and
Risky Apps
A: Steal Information
B: Track the User
C: Traditional Threats
D: Send Content
E: Reconfigure Device
19%
A B C D E
22%
26%
13%
13%
Employees are
bringing their own
apps to fill the gap of
apps not provided by
their employer
Source: Workforce Personas and the
Mobile App Gap, Forrester, Nov 2013
25%
Mobile apps will fail
basic security tests
through 2015
Source: Gartner, Sep 2014
75%
RISK
06
Provide a curated enterprise app store that provides easy
access to approved in-house and third-party apps
Deploy and manage user apps dependent on role
Implement app-level security policies for DLP, encryption
and authentication
BRING YOUR OWN APPS
Employees are relying on personal apps, such as file sync and sharing
tools, for work purposes. This increases the risk of data loss and
potential breaches.
SECURITY
MEASURES
IT leaders believe that
unmanaged file sharing
are causing data leaks
Source: Safe Sharing, Intralinks, June 2014
46%
IT professionals are
concerned about mobile
data leakage
Source: MobileCON 2013 Survey,
Symantec, Oct 2013
87%
RISK
05
Implement mobile DLP policies like blocking copy and paste
Manage “open in” controls to prevent content from being
accessed by unapproved apps
Control whether data is allowed to be stored locally or on a
Micro-SD card
DATA LEAKS
Workers rely on mobile apps for work and personal use.
SECURITY
MEASURES
iOS devices jailbroken
within six weeks
of jailbreak tool
availability
Source: Forbes, Mar 2013
18MILLION
Mobile phones on
corporate networks
are jailbroken
Source: Webroot, Oct 2013
24%
RISK
04
Continuously monitor device compliance
Prevent compromised devices from accessing enterprise
networks and apps
SECURITY
MEASURES
COMPROMISED DEVICES
Users can tamper with the device OS (jailbreak or root) to gain elevated
privileges and install malicious apps from unauthorized app stores.
Smartphones were
stolen in 2013, nearly
doubled from 2012
Source: 2014 Annual State of the Net
Survey, Consumer Reports, May 2014
3.1MILLION
2012 2013
RISK
03
Enforce password policies for devices and apps using
multi-factor authentication
Provide seamless access to corporate apps and resources with
certificates and single sign-on
Encrypt corporate apps and data so they’re protected even if
the device is compromised
Full or selective device wipe
Finders of lost devices
tried to access
corporate information
Source: Smartphone Honey Stick Project,
Symantec, Feb 2012
SECURITY
MEASURES
LOSS AND THEFT
Devices are small and portable, making them vulnerable to loss or theft.
All mobile
communications flow
over WiFi
Source: Wi-Fi Alliance
71%
RISK
02
Secure connectivity via certificate-based network access
Per-app VPNs that encrypt data in transit
Deploy app and email proxies that block unauthorized or
non-compliant device and apps
Public WiFi hotspots
have inadequate
security
Source: Forbes, May 2013
*
90%
*estimated
SECURITY
MEASURES
ANYWHERE, ANYTIME CONNECTIVITY
Mobile devices are hyper-connected and often access unsecured networks,
increasing the risk of data loss.
HETEROGENEOUS ENVIRONMENT
Unlike traditional endpoints, mobile is a motley collection of different
devices and operating systems. Workers use multiple devices, which may
or may not be owned by the company.RISK
01 Information workers
use three or more
devices for work
Source: 2013 Mobile Workforce Adoption
Trends, Forrester, Feb 2013
53%
Organizations allow the
use of employee-owned
devices in some form
Source: Cisco IBSG Horizons Study, Cisco,
May 2012
95%
Apply consistent policies across mobile operating systems
Separate personal and corporate data
SECURITY
MEASURES
TOP7
RISKSOF ENTERPRISE
MOBILITY
HOW TO HELP
PROTECT
YOUR BUSINESS
8/10
Source: Symantec Intelligence Report, Symantec, Oct 2014
Go ahead, you've got