SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
It’s Not Personal, but it is Your Business.
Protect it with MDM
Enterprise organizations are not the only businesses at risk of Internet security threats. In 2015,
almost half (43%) of small businesses were compromised, and 22% of medium businesses
faced similar threats.2
However, with AirWatch Express you can protect your organization
from mishandled devices, and “wipe” business data on a lost or stolen device in seconds,
while keeping personal information intact.
SMBs and VMware
AirWatch Express
Make the Perfect
Couple
Ready to Go When You are, AirWatch Express Will Not Let You Down, Here’s Why
1.	 You Do Not Have to be an Expert
	 Available for iOS, macOS, Android, and Windows 10,
AirWatch Express is the perfect fit for businesses who
want the ability to manage their mobile fleet with
little to no training or server knowledge. No more
manual distribution needed, just a console and the
willingness to get started.
2.	All Systems Go
	 Using the AirWatch Express wizard, there
is nothing keeping you from managing
devices. Wizard-based blueprints help you configure
Wi-Fi connectivity, applications (from the Apple App
Store, Google Play Store, and Microsoft Store), and
e-mail, as well as encryption and device security. As
part of the set-up, you can also instruct apps to install
automatically or allow users on-demand access.
3.	No Software or Hardware Required
	 AirWatch Express runs in the cloud, so you do not need to
install additional software, maintain your servers, or buy
a new system. If you need connectivity to your
Active Directory or another backend system
you can quickly and easily install connectors.
4.	Reliable Service at the Ready
	 Nothing is better than AirWatch Express on-demand
support and self-service. There is no jumping through
hoops, just real people ready to help. Take advantage
of expert support from the best in the business. Our
professionals will help guide you along the way while
your team also has instant access to how-to-guides
and a community forum.
5.	Pay for What you Use
	 Think back to the hard work you have put
into your company’s mission. Could you
put a price tag on your ideas and data? For
$2.50 per device, per month, AirWatch Express
makes MDM an affordable solution even for smaller
companies who do not yet need an enterprise version.
6.	Can you Say Flexibility?
	 Imagine the future. Should your business experience
growth beyond 500 mobile devices, you can always
upgrade with no disruption to your infrastructure.
Simply upgrade your license for additional
functionality such as identity
management and application security.
When you want mobile protection
without the complication
AirWatch Express makes MDM possible for SMBs who
like the idea, but are hesitant to bring on technology
thought as meant for larger organizations. A few quick steps
and you are up and running in minutes. Get your free trial today.
Go to airwatchexpress.com
The number one concern of Small to Medium Business (SMB) Owners is IT security1
but how do you control your mobile fleet without outsourcing the responsibilities?
Introducing AirWatch Express. Easy to operate, this simplified mobile device
management (MDM) system easily affords cloud-based management for organizations
using 10 to 500 mobile devices so you can keep doing business.
AirWatch Express Fast Facts:
•	 2.50 per device/month
•	 Remotely lock and secure devices over the air
•	 Real-time visibility into all devices in an
interactive, web-based console
•	 Assign apps and policies with just a few clicks
•	 Protect company data by enforcing passcode
policies on connected devices
1
	http://www.cio.com/article/3023692/security/5-biggest-cybersecurity-
concerns-facing-cios-cisos-in-2016.html
2
	http://www.infoworld.com/article/3041078/security/the-dirty-dozen-12-
cloud-security-threats.html
3
	https://www.symantec.com/content/dam/symantec/docs/reports
/istr-21-2016-en.pdf

Contenu connexe

Tendances

3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access ModelAkamai Technologies
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365Symantec
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device ManagmentMTG IT Professionals
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeSysfore Technologies
 
Insights into Windows 10 in the Enterprise (October)
Insights into Windows 10 in the Enterprise (October)Insights into Windows 10 in the Enterprise (October)
Insights into Windows 10 in the Enterprise (October)Ivanti
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkPerficient, Inc.
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsJumpCloud
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)VMware
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency PlatformSymantec
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementXperteks
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device ManagementBala G
 
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis
 

Tendances (20)

Meet windows10
Meet windows10Meet windows10
Meet windows10
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
 
10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment10 Benefits of Mobile Device Managment
10 Benefits of Mobile Device Managment
 
Major Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | SysforeMajor Cloud Security Challenges concerning the Enterprises | Sysfore
Major Cloud Security Challenges concerning the Enterprises | Sysfore
 
Insights into Windows 10 in the Enterprise (October)
Insights into Windows 10 in the Enterprise (October)Insights into Windows 10 in the Enterprise (October)
Insights into Windows 10 in the Enterprise (October)
 
Mobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software SolutionMobile device management ( MDM ) Software Solution
Mobile device management ( MDM ) Software Solution
 
IBM Cloud Security Enforcer
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
 
Securing Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote WorkSecuring Teams with Microsoft 365 Security for Remote Work
Securing Teams with Microsoft 365 Security for Remote Work
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
Avoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security ThreatsAvoid These Top 15 IT Security Threats
Avoid These Top 15 IT Security Threats
 
Modern Devices Management
Modern Devices ManagementModern Devices Management
Modern Devices Management
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Tachyon_Flyer
Tachyon_FlyerTachyon_Flyer
Tachyon_Flyer
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
 
Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
 
MDM- Mobile Device Management
MDM- Mobile Device ManagementMDM- Mobile Device Management
MDM- Mobile Device Management
 
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG EffitasAcronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
Acronis True Image 3rd Party Speed & Ransomware Tests, Apr 2017 from MRG Effitas
 
The Importance of Business Data Backups
The Importance of Business Data BackupsThe Importance of Business Data Backups
The Importance of Business Data Backups
 

En vedette

Skill Builder Brochure
Skill Builder BrochureSkill Builder Brochure
Skill Builder BrochureKarenLight
 
Resume Tushar Aneja
Resume Tushar AnejaResume Tushar Aneja
Resume Tushar AnejaTushar Aneja
 
Algunes eines, màquines i procediments a l'aula oberta de fusteria
Algunes eines, màquines i procediments a l'aula oberta de fusteria Algunes eines, màquines i procediments a l'aula oberta de fusteria
Algunes eines, màquines i procediments a l'aula oberta de fusteria peridotita
 
Integrated Approach to Sustainable Funding
Integrated Approach to Sustainable FundingIntegrated Approach to Sustainable Funding
Integrated Approach to Sustainable FundingVickie Saunders
 
Sport of Bidding Whitepaper
Sport of Bidding WhitepaperSport of Bidding Whitepaper
Sport of Bidding WhitepaperVickie Saunders
 
Mikhongelo Madingana Riverbed rss-w-certificate-01
Mikhongelo Madingana Riverbed rss-w-certificate-01Mikhongelo Madingana Riverbed rss-w-certificate-01
Mikhongelo Madingana Riverbed rss-w-certificate-01Mikhongelo Madingana
 
Mikhongelo Madingana Arbor aps v5.7 technical training certificate
Mikhongelo Madingana Arbor aps v5.7 technical training certificateMikhongelo Madingana Arbor aps v5.7 technical training certificate
Mikhongelo Madingana Arbor aps v5.7 technical training certificateMikhongelo Madingana
 
zhongshan introduction and products list
zhongshan introduction and products listzhongshan introduction and products list
zhongshan introduction and products listwaleed shedaiwa
 

En vedette (14)

Skill Builder Brochure
Skill Builder BrochureSkill Builder Brochure
Skill Builder Brochure
 
my presentation
my presentationmy presentation
my presentation
 
Presentació ADM
Presentació ADMPresentació ADM
Presentació ADM
 
Resume Tushar Aneja
Resume Tushar AnejaResume Tushar Aneja
Resume Tushar Aneja
 
Cob 20090915 1
Cob 20090915 1Cob 20090915 1
Cob 20090915 1
 
Algunes eines, màquines i procediments a l'aula oberta de fusteria
Algunes eines, màquines i procediments a l'aula oberta de fusteria Algunes eines, màquines i procediments a l'aula oberta de fusteria
Algunes eines, màquines i procediments a l'aula oberta de fusteria
 
Integrated Approach to Sustainable Funding
Integrated Approach to Sustainable FundingIntegrated Approach to Sustainable Funding
Integrated Approach to Sustainable Funding
 
Cob 20090615 1
Cob 20090615 1Cob 20090615 1
Cob 20090615 1
 
Sport of Bidding Whitepaper
Sport of Bidding WhitepaperSport of Bidding Whitepaper
Sport of Bidding Whitepaper
 
Mikhongelo Madingana Riverbed rss-w-certificate-01
Mikhongelo Madingana Riverbed rss-w-certificate-01Mikhongelo Madingana Riverbed rss-w-certificate-01
Mikhongelo Madingana Riverbed rss-w-certificate-01
 
Mikhongelo Madingana Arbor aps v5.7 technical training certificate
Mikhongelo Madingana Arbor aps v5.7 technical training certificateMikhongelo Madingana Arbor aps v5.7 technical training certificate
Mikhongelo Madingana Arbor aps v5.7 technical training certificate
 
Cob 20080826 1
Cob 20080826 1Cob 20080826 1
Cob 20080826 1
 
zhongshan introduction and products list
zhongshan introduction and products listzhongshan introduction and products list
zhongshan introduction and products list
 
Sistema Solar
Sistema SolarSistema Solar
Sistema Solar
 

Similaire à airwatchexpress_infographic(2)

Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secureBurCom Consulting Ltd.
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...Diego Alberto Tamayo
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility managementTim Youm
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Are Your Endpoints Protected?
Are Your Endpoints Protected?Are Your Endpoints Protected?
Are Your Endpoints Protected?The TNS Group
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for EndpointMighty Guides, Inc.
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksBring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksLogicalis
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksLogicalis
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small BusinessBrendanRose
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?The TNS Group
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxSonaliG6
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareSatya Harish
 
Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID? Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID? The TNS Group
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceAldo Pietropaolo
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreIBM Software India
 

Similaire à airwatchexpress_infographic(2) (20)

Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Are Your Endpoints Protected?
Are Your Endpoints Protected?Are Your Endpoints Protected?
Are Your Endpoints Protected?
 
7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint7 Experts on Implementing Microsoft Defender for Endpoint
7 Experts on Implementing Microsoft Defender for Endpoint
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The RisksBring Your Own Device (BYOD) is Here to Stay, But What About The Risks
Bring Your Own Device (BYOD) is Here to Stay, But What About The Risks
 
Bring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risksBring your own device (byod) is here to stay, but what about the risks
Bring your own device (byod) is here to stay, but what about the risks
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID? Managed Security: How Secure Are You During COVID?
Managed Security: How Secure Are You During COVID?
 
Future proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected deviceFuture proof and extend your IAM to Mobile Platforms and any connected device
Future proof and extend your IAM to Mobile Platforms and any connected device
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 
Web version-ab cs-book-bangalore
Web version-ab cs-book-bangaloreWeb version-ab cs-book-bangalore
Web version-ab cs-book-bangalore
 

airwatchexpress_infographic(2)

  • 1. It’s Not Personal, but it is Your Business. Protect it with MDM Enterprise organizations are not the only businesses at risk of Internet security threats. In 2015, almost half (43%) of small businesses were compromised, and 22% of medium businesses faced similar threats.2 However, with AirWatch Express you can protect your organization from mishandled devices, and “wipe” business data on a lost or stolen device in seconds, while keeping personal information intact. SMBs and VMware AirWatch Express Make the Perfect Couple Ready to Go When You are, AirWatch Express Will Not Let You Down, Here’s Why 1. You Do Not Have to be an Expert Available for iOS, macOS, Android, and Windows 10, AirWatch Express is the perfect fit for businesses who want the ability to manage their mobile fleet with little to no training or server knowledge. No more manual distribution needed, just a console and the willingness to get started. 2. All Systems Go Using the AirWatch Express wizard, there is nothing keeping you from managing devices. Wizard-based blueprints help you configure Wi-Fi connectivity, applications (from the Apple App Store, Google Play Store, and Microsoft Store), and e-mail, as well as encryption and device security. As part of the set-up, you can also instruct apps to install automatically or allow users on-demand access. 3. No Software or Hardware Required AirWatch Express runs in the cloud, so you do not need to install additional software, maintain your servers, or buy a new system. If you need connectivity to your Active Directory or another backend system you can quickly and easily install connectors. 4. Reliable Service at the Ready Nothing is better than AirWatch Express on-demand support and self-service. There is no jumping through hoops, just real people ready to help. Take advantage of expert support from the best in the business. Our professionals will help guide you along the way while your team also has instant access to how-to-guides and a community forum. 5. Pay for What you Use Think back to the hard work you have put into your company’s mission. Could you put a price tag on your ideas and data? For $2.50 per device, per month, AirWatch Express makes MDM an affordable solution even for smaller companies who do not yet need an enterprise version. 6. Can you Say Flexibility? Imagine the future. Should your business experience growth beyond 500 mobile devices, you can always upgrade with no disruption to your infrastructure. Simply upgrade your license for additional functionality such as identity management and application security. When you want mobile protection without the complication AirWatch Express makes MDM possible for SMBs who like the idea, but are hesitant to bring on technology thought as meant for larger organizations. A few quick steps and you are up and running in minutes. Get your free trial today. Go to airwatchexpress.com The number one concern of Small to Medium Business (SMB) Owners is IT security1 but how do you control your mobile fleet without outsourcing the responsibilities? Introducing AirWatch Express. Easy to operate, this simplified mobile device management (MDM) system easily affords cloud-based management for organizations using 10 to 500 mobile devices so you can keep doing business. AirWatch Express Fast Facts: • 2.50 per device/month • Remotely lock and secure devices over the air • Real-time visibility into all devices in an interactive, web-based console • Assign apps and policies with just a few clicks • Protect company data by enforcing passcode policies on connected devices 1 http://www.cio.com/article/3023692/security/5-biggest-cybersecurity- concerns-facing-cios-cisos-in-2016.html 2 http://www.infoworld.com/article/3041078/security/the-dirty-dozen-12- cloud-security-threats.html 3 https://www.symantec.com/content/dam/symantec/docs/reports /istr-21-2016-en.pdf