SlideShare a Scribd company logo
1 of 26
www.pwc.com



How information
security empowers
mobile innovation
Information security forum
23rd annual world congress
Nov 5th 2012, Chicago
5th Nov 2012
Progressive innovation in
Mobile services is already
occurring


PwC                          2
Innovation: Agricultural Services to farmers in India




Then…wait in line to receive
information and subsidies




Now…subsidies and
information on mobile devices


PwC                                                     3
Innovation: Mobile Services give consumers on-demand
access to doctors



Then…schedule
appointment/see doctor




Now…on-demand access to
doctors in minutes


PwC                                                    4
Innovation: Mobile improves Pharma sales force
productivity


Then…lengthy physician
visits, long sample fulfillment
times, manual CRM


Now…Shorter physician visits,
rich media, faster sample
fulfillment, digital CRM,
ePrescribing

PwC                                              5
Organizations expect more benefits from mobile
solutions
Q: Please select the most important benefit that your organization ultimately expects to gain from current or future
mobile solutions deployments (whether or not you are currently receiving those benefits).

                       Improve/enhance worker productivity

                                    Increased sales/revenue

                         Improve field service response time

               Improve competitive advantage/market share

                         Provide ease of information access

                                  Improve customer service

                                            Decreased costs

                             Offer employees more flexibility

    Enhance portability within the office or work environment

                                    Speed the sales process

                                        Eliminate paperwork

  Provide perception of an advanced company to customers

                                                                0   5       10          15            20     25        30
                                                                                 (% of respondents)
Source: IDC’s Mobile Enterprise Software Survey, 2011
PwC
Macro mobile trends drive
additional innovations…



PwC                     7
Smartphone adoption continues upward trajectory




PwC
Global Mobile traffic is growing
Global mobile traffic as % of total internet traffic, 12/08-5/12




Source: StatCounter Global Stats.
PwC
IOS, Android and Windows Mobile are top 3
Mobile OS platforms
Smartphone operating system market share, 2005-2011E




Source: Morgan Stanley Research, Gartner.
PwC
Mobile application downloads have accelerated
First 15 quarters cumulative # of downloads, iTunes music vs. apps




Source: KPCB estimates based on Apple data, after Itunes store launch in CQ2:03 as of CQ1:12.
PwC
88% of mobile professionals already use social
networks


  14% have used cloud
  computing in the past year

              60% leveraging social media
              platforms to market their businesses

                                       38% spend 11 hours or more
                                       on their devices
Source: The Business Journals reveals the business habits of the rising number of SMB mobile professionals, 2011
PwC                                                                                                                12
Healthy cloud forecast expected


                 $180

                 $160

                 $140

                 $120

                 $100
Total public
cloud markets    $80
(US$ billions)
                 $60

                 $40

                 $20

                   $0
                         2008     2009     2010       2011    2012    2013    2014    2015    2016    2017    2018    2019    2020
            BPaaS ($)    0.15     0.23     0.35       0.53     0.8    1.26    1.95    2.93    4.28     6      7.66    9.08    10.02
            SaaS ($)     5.56     8.09     13.4       21.21   33.09   47.22   63.19   78.43   92.75   105.4   116.3   125.5   132.5
            PaaS ($)     0.05     0.12     0.31       0.82    2.08    4.38    7.39     9.8    11.26   11.94   12.15   12.1    11.91
            IaaS ($)     0.06     0.24     1.02       2.94    4.99    5.75    5.89    5.82    5.65    5.45    5.23    5.01    4.78



   Source: Forrester, April 2011 “Sizing The Cloud”
   PwC                                                                                                                                13
Mobile is shaping new behaviors
Average Time Spent on Various Mobile Functions, 1/11



                        12%                   40 minutes
                                               • Maps
                                               • Games
                                               • Social networking
                                               • Utilities
                                               • more


           32%                47%             27 minutes telephony
                                               • Phone
                                               • Skype
                                               • Messages

                                              10 minutes
                                              Web/Web Apps


                         9%                   7 minutes
                                              Mail app

Source: AppsFire 1/11
PwC                                                                  14
… but risks stifle
innovation potential



PwC                    15
Mobile blurs the information perimeter




PwC                                      16
Mobile Malware attacks cause real harm

  “The Mobile Malware (MM)                            Total Mobile Malware Q2 2011
  revolution started principally
  in 2004 with the release of
  the Cabir. A                                                               Android
  worm, SymbianOS. Some                                                      Symbian
  MM were released before this                                               Java ME
  date, but it was Cabir and the                                             Others
  release of its source code that
  caused an explosion of new
  MM to emerge.”
   – Ken Dunham, Mobile                                                            Ransomware
    Malware Attacks and
    Defense                                                             Complete   Financially
                                                                        device
                                                              Serious              motivated
                                                                        control    attacks
                                                              attacks
                                                              emerge




Source: McAffee Threats Report: Second Quarter 2012
PwC                                                                                              17
“Top three Mobile risks include:
1. Data loss from lost, stolen or decommissioned
devices.
2. Information-stealing mobile malware.
3. Data loss and data leakage through poorly
written third-party apps.”




Source: Top Threats to Mobile Computing, Cloud Security Alliance, October 2012
PwC                                                                              18
Security is an enabler of
Mobile Services



PwC                         19
Technology adoption is moving faster than
security implementation
Organizations are struggling to keep pace with the adoption of cloud
computing, social networking, mobility, and use of personal devices.
88% of consumers use personal mobile device for both personal
and work purposes.2
50%


40%                                                      44%                                                               45%
                                                                                                                  43%
                                                37%                                       38%
30%
                                                                                 32%
                         29%
               26%
20%


10%


 0%
          Cloud security strategy          Mobile device security            Social media security            Security strategy for
                                                  strategy                          strategy               employee use of personal
   2011    2012                                                                                             devices in the enterprise

Question 14: What process information security safeguards does your organization currently have in place?” (Not all factors shown. Totals do
not add up to 100%.)

2 PwC, Consumer privacy: What are consumers willing to share? July 2012

PwC                                                                                                                                            20
Mobile Security is complicated by multiple factors



 Device diversity/complexity

Advanced persistent threats

 Data explosion

 Data transference inference

 Application explosion



PwC                                              21
A variety of mechanisms are used to controls
Smartphone and tablet risks
What steps have respondents taken to mitigate the risks associated with
staff using smartphones or tablets?
  Do not allow any such devices to remotely connect to
               the organisation's systems
Allow only corporate devices to remotely connect to the                                                        Small organizations
                organisation's systems                                                                         Large organizations
          Defined a security strategy for mobile devices

                    Issued a policy on mobile computing
      Trained staff on the threats associated with mobile
                             devices
             Protected corporate email and calendaring

                          Implemented strong encryption
  Implemented mobile device management(to manage
            devices remotely over the air)
                                            No steps taken

                                                              0       10       20      30       40       50       60     70
Source: Information Security Survey Breaches Report, April 2012,
http://www.pwc.co.uk/en_UK/uk/assets/pdf/olpapp/uk-information-security-breaches-survey-technical-report.pdf
PwC                                                                                                                            22
Solutions for managing mobile security
challenges are maturing


 Network         Mobile Device Mobile
 Access          Management Enterprise
                               Application
                               Management

 Virtual        Secure           Authentication
 Desktop        Storage          and
 Infrastructure                  Authorization


PwC                                           23
Architecting mobile security is essential for
protecting information and creating value

                 •   Deploy mobile services quickly
 Grow the        •   Improve user experience
 business        •   Expand partner eco-systems
                 •   Embrace mobile users


                 •   Automate security processes
 Improve         •   Adopt cloud models
 efficiency      •   Expanded virtualization–securely
                 •   Improve collaboration


                 •   Combat mobile threats
 Protect the     •   Protect sensitive information
 business        •   Govern mobile solutions
                 •   Control access

PwC                                                     24
Conclusions


 1    Mobile threats are real: While data loss from
      lost, stolen device remains a top concern, mobile malware is
      causing real harm

      2   Cloud and Social Media risks go hand-in-
          hand: Recognize the risks that arise because mobile
          drives new behaviors that push users to adopt cloud and
          social media

 3    Not just technology: Consider the governance and
      process implications of deploying your mobile solution


      4    Security as an enabler: Position mobile security
           as an enabler by considering both the consumer and
           workforce use cases
PwC                                                                  25
Thank you

Nalneesh Gaur, Director
PwC
Nalneesh.Gaur@us.pwc.com




© 2012 PricewaterhouseCoopers LLP. All rights reserved. In this document, “PwC” refers to PricewaterhouseCoopers
LLP, which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a
separate legal entity.
This content is for general information purposes only, and should not be used as a substitute for consultation with
professional advisor

PwC                                                                                                                   26

More Related Content

What's hot

Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD OpportunityJuniper Networks
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
Data First - The Next Mobile Wave
Data First - The Next Mobile WaveData First - The Next Mobile Wave
Data First - The Next Mobile WavePaul Golding
 
Developing For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsDeveloping For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsVictoria Romero-Gomez
 
6 Steps to Successfully Selecting an Audio & Web Conferencing Provider
6 Steps to Successfully Selecting an Audio & Web Conferencing Provider6 Steps to Successfully Selecting an Audio & Web Conferencing Provider
6 Steps to Successfully Selecting an Audio & Web Conferencing ProviderReadyTalk
 
Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce Partners
 
The Future of Wireless Business Applications
The Future of Wireless Business ApplicationsThe Future of Wireless Business Applications
The Future of Wireless Business ApplicationsYankee Group
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseIIC_Barcelona
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceCourtland Smith
 
Nps 13 loyalty_and_social_crm_at_symantec
Nps 13 loyalty_and_social_crm_at_symantecNps 13 loyalty_and_social_crm_at_symantec
Nps 13 loyalty_and_social_crm_at_symantecTristan Bishop
 
Social media acknowledging the growing importance of mobile use in east africa
Social media acknowledging the growing importance of mobile use in east africaSocial media acknowledging the growing importance of mobile use in east africa
Social media acknowledging the growing importance of mobile use in east africaCoca-Cola
 
Thought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDMThought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDMSolarWinds
 
Service is the new marketing
Service is the new marketingService is the new marketing
Service is the new marketingTristan Bishop
 
Building Great Companies on the Cloud
Building Great Companies on the CloudBuilding Great Companies on the Cloud
Building Great Companies on the CloudRoman Stanek
 
Social Media Has Changed Marketing Forever
Social Media Has Changed Marketing ForeverSocial Media Has Changed Marketing Forever
Social Media Has Changed Marketing ForeverTristan Bishop
 
Making Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnMaking Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnSandy Kemsley
 

What's hot (20)

Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
Data First - The Next Mobile Wave
Data First - The Next Mobile WaveData First - The Next Mobile Wave
Data First - The Next Mobile Wave
 
Developing For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of ThingsDeveloping For The Pervasive Internet Of Things
Developing For The Pervasive Internet Of Things
 
6 Steps to Successfully Selecting an Audio & Web Conferencing Provider
6 Steps to Successfully Selecting an Audio & Web Conferencing Provider6 Steps to Successfully Selecting an Audio & Web Conferencing Provider
6 Steps to Successfully Selecting an Audio & Web Conferencing Provider
 
User empowerment and choice in downloading software
User empowerment and choice in downloading softwareUser empowerment and choice in downloading software
User empowerment and choice in downloading software
 
XEN App
XEN AppXEN App
XEN App
 
Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12Salesforce.com Partner Meetup - Atlanta -10/31/12
Salesforce.com Partner Meetup - Atlanta -10/31/12
 
The Future of Wireless Business Applications
The Future of Wireless Business ApplicationsThe Future of Wireless Business Applications
The Future of Wireless Business Applications
 
Growth with IBM Mobile Enterprise
Growth with IBM Mobile EnterpriseGrowth with IBM Mobile Enterprise
Growth with IBM Mobile Enterprise
 
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic WorkforceWhite Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
 
Nps 13 loyalty_and_social_crm_at_symantec
Nps 13 loyalty_and_social_crm_at_symantecNps 13 loyalty_and_social_crm_at_symantec
Nps 13 loyalty_and_social_crm_at_symantec
 
Social media acknowledging the growing importance of mobile use in east africa
Social media acknowledging the growing importance of mobile use in east africaSocial media acknowledging the growing importance of mobile use in east africa
Social media acknowledging the growing importance of mobile use in east africa
 
Workshop slides
Workshop slidesWorkshop slides
Workshop slides
 
Thought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDMThought Leadership Session: Realities of BYOD and MDM
Thought Leadership Session: Realities of BYOD and MDM
 
Service is the new marketing
Service is the new marketingService is the new marketing
Service is the new marketing
 
Building Great Companies on the Cloud
Building Great Companies on the CloudBuilding Great Companies on the Cloud
Building Great Companies on the Cloud
 
Social Media Has Changed Marketing Forever
Social Media Has Changed Marketing ForeverSocial Media Has Changed Marketing Forever
Social Media Has Changed Marketing Forever
 
Making Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, TallinnMaking Social BPM Mean Business - BPM 2012, Tallinn
Making Social BPM Mean Business - BPM 2012, Tallinn
 
Chris elmitt
Chris elmittChris elmitt
Chris elmitt
 

Viewers also liked

Identity Federation for the Enterprise: Lessons Learned
Identity Federation for the Enterprise: Lessons LearnedIdentity Federation for the Enterprise: Lessons Learned
Identity Federation for the Enterprise: Lessons LearnedNalneesh Gaur
 
Identity federation and strong authentication
Identity federation and strong authenticationIdentity federation and strong authentication
Identity federation and strong authenticationJustin Richer
 
Identity federation & user centric identity
Identity federation & user centric identityIdentity federation & user centric identity
Identity federation & user centric identitywegdam
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuGluu
 
Gluu EDU Webinar: Shibboleth/SAML SSO
Gluu EDU Webinar: Shibboleth/SAML SSOGluu EDU Webinar: Shibboleth/SAML SSO
Gluu EDU Webinar: Shibboleth/SAML SSOMike Schwartz
 
SSIR corporate presentation
SSIR corporate presentationSSIR corporate presentation
SSIR corporate presentationSilverStandard
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Gabriella Davis
 
Enterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOEnterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOOliver Mueller
 
Understanding 'Authentication' and 'Identity Federation'
Understanding 'Authentication' and 'Identity Federation'Understanding 'Authentication' and 'Identity Federation'
Understanding 'Authentication' and 'Identity Federation'Naohiro Fujie
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGBjorn Hjelm
 
The Next Half Century of Co-operation
The Next Half Century of Co-operationThe Next Half Century of Co-operation
The Next Half Century of Co-operationNFCACoops
 

Viewers also liked (13)

Identity Federation for the Enterprise: Lessons Learned
Identity Federation for the Enterprise: Lessons LearnedIdentity Federation for the Enterprise: Lessons Learned
Identity Federation for the Enterprise: Lessons Learned
 
Identity federation and strong authentication
Identity federation and strong authenticationIdentity federation and strong authentication
Identity federation and strong authentication
 
Identity federation & user centric identity
Identity federation & user centric identityIdentity federation & user centric identity
Identity federation & user centric identity
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
 
Gluu EDU Webinar: Shibboleth/SAML SSO
Gluu EDU Webinar: Shibboleth/SAML SSOGluu EDU Webinar: Shibboleth/SAML SSO
Gluu EDU Webinar: Shibboleth/SAML SSO
 
SSIR corporate presentation
SSIR corporate presentationSSIR corporate presentation
SSIR corporate presentation
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
 
Enterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOEnterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSO
 
Understanding 'Authentication' and 'Identity Federation'
Understanding 'Authentication' and 'Identity Federation'Understanding 'Authentication' and 'Identity Federation'
Understanding 'Authentication' and 'Identity Federation'
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
Federation
Federation Federation
Federation
 
Single Sign On 101
Single Sign On 101Single Sign On 101
Single Sign On 101
 
The Next Half Century of Co-operation
The Next Half Century of Co-operationThe Next Half Century of Co-operation
The Next Half Century of Co-operation
 

Similar to How information security empowers mobile innovation v3 branded

Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudAntenna Software
 
Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Insight UK
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 
Mobile Applications Solutions | Futurecom 2012
Mobile Applications Solutions | Futurecom 2012Mobile Applications Solutions | Futurecom 2012
Mobile Applications Solutions | Futurecom 2012GENBANDcorporate
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloudKamesh Pemmaraju
 
How Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive PresentationHow Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive PresentationDigitalDesignsInc
 
Equinix Performance Hub gives Enterprise Networks a Giant Boost
Equinix Performance Hub gives Enterprise Networks a Giant BoostEquinix Performance Hub gives Enterprise Networks a Giant Boost
Equinix Performance Hub gives Enterprise Networks a Giant BoostEquinix
 
AppExchange Partner Program Keynote - Dreamforce 2012- 9/18
AppExchange Partner Program Keynote - Dreamforce 2012- 9/18AppExchange Partner Program Keynote - Dreamforce 2012- 9/18
AppExchange Partner Program Keynote - Dreamforce 2012- 9/18Salesforce Partners
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondCompTIA
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
State of cloud computing v2
State of cloud computing v2State of cloud computing v2
State of cloud computing v2Md Aminul Hassan
 
Public/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & AwarenessPublic/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & AwarenessSoftware Park Thailand
 
iStrategy Melbourne - Give Your People Superpowers! Unlocking Your Employees’...
iStrategy Melbourne - Give Your People Superpowers! Unlocking Your Employees’...iStrategy Melbourne - Give Your People Superpowers! Unlocking Your Employees’...
iStrategy Melbourne - Give Your People Superpowers! Unlocking Your Employees’...iStrategy
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...cVidya Networks
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]kgbacdd
 
Telco Evolution Sample
Telco Evolution SampleTelco Evolution Sample
Telco Evolution SampleAlan Quayle
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODGraham Chalk
 

Similar to How information security empowers mobile innovation v3 branded (20)

Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile Cloud
 
Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
Mobile Applications Solutions | Futurecom 2012
Mobile Applications Solutions | Futurecom 2012Mobile Applications Solutions | Futurecom 2012
Mobile Applications Solutions | Futurecom 2012
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloud
 
How Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive PresentationHow Mobile Will Change your Life @ Work | Interactive Presentation
How Mobile Will Change your Life @ Work | Interactive Presentation
 
Equinix Performance Hub gives Enterprise Networks a Giant Boost
Equinix Performance Hub gives Enterprise Networks a Giant BoostEquinix Performance Hub gives Enterprise Networks a Giant Boost
Equinix Performance Hub gives Enterprise Networks a Giant Boost
 
AppExchange Partner Program Keynote - Dreamforce 2012- 9/18
AppExchange Partner Program Keynote - Dreamforce 2012- 9/18AppExchange Partner Program Keynote - Dreamforce 2012- 9/18
AppExchange Partner Program Keynote - Dreamforce 2012- 9/18
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and Beyond
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
State of cloud computing v2
State of cloud computing v2State of cloud computing v2
State of cloud computing v2
 
Public/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & AwarenessPublic/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & Awareness
 
iStrategy Melbourne - Give Your People Superpowers! Unlocking Your Employees’...
iStrategy Melbourne - Give Your People Superpowers! Unlocking Your Employees’...iStrategy Melbourne - Give Your People Superpowers! Unlocking Your Employees’...
iStrategy Melbourne - Give Your People Superpowers! Unlocking Your Employees’...
 
give your people superpowers
give your people superpowersgive your people superpowers
give your people superpowers
 
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...Becoming the safe choice for the cloud by addressing cloud fraud & security t...
Becoming the safe choice for the cloud by addressing cloud fraud & security t...
 
Why Managing Mobility Matters
Why Managing Mobility MattersWhy Managing Mobility Matters
Why Managing Mobility Matters
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
 
Telco Evolution Sample
Telco Evolution SampleTelco Evolution Sample
Telco Evolution Sample
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 

How information security empowers mobile innovation v3 branded

  • 1. www.pwc.com How information security empowers mobile innovation Information security forum 23rd annual world congress Nov 5th 2012, Chicago 5th Nov 2012
  • 2. Progressive innovation in Mobile services is already occurring PwC 2
  • 3. Innovation: Agricultural Services to farmers in India Then…wait in line to receive information and subsidies Now…subsidies and information on mobile devices PwC 3
  • 4. Innovation: Mobile Services give consumers on-demand access to doctors Then…schedule appointment/see doctor Now…on-demand access to doctors in minutes PwC 4
  • 5. Innovation: Mobile improves Pharma sales force productivity Then…lengthy physician visits, long sample fulfillment times, manual CRM Now…Shorter physician visits, rich media, faster sample fulfillment, digital CRM, ePrescribing PwC 5
  • 6. Organizations expect more benefits from mobile solutions Q: Please select the most important benefit that your organization ultimately expects to gain from current or future mobile solutions deployments (whether or not you are currently receiving those benefits). Improve/enhance worker productivity Increased sales/revenue Improve field service response time Improve competitive advantage/market share Provide ease of information access Improve customer service Decreased costs Offer employees more flexibility Enhance portability within the office or work environment Speed the sales process Eliminate paperwork Provide perception of an advanced company to customers 0 5 10 15 20 25 30 (% of respondents) Source: IDC’s Mobile Enterprise Software Survey, 2011 PwC
  • 7. Macro mobile trends drive additional innovations… PwC 7
  • 8. Smartphone adoption continues upward trajectory PwC
  • 9. Global Mobile traffic is growing Global mobile traffic as % of total internet traffic, 12/08-5/12 Source: StatCounter Global Stats. PwC
  • 10. IOS, Android and Windows Mobile are top 3 Mobile OS platforms Smartphone operating system market share, 2005-2011E Source: Morgan Stanley Research, Gartner. PwC
  • 11. Mobile application downloads have accelerated First 15 quarters cumulative # of downloads, iTunes music vs. apps Source: KPCB estimates based on Apple data, after Itunes store launch in CQ2:03 as of CQ1:12. PwC
  • 12. 88% of mobile professionals already use social networks 14% have used cloud computing in the past year 60% leveraging social media platforms to market their businesses 38% spend 11 hours or more on their devices Source: The Business Journals reveals the business habits of the rising number of SMB mobile professionals, 2011 PwC 12
  • 13. Healthy cloud forecast expected $180 $160 $140 $120 $100 Total public cloud markets $80 (US$ billions) $60 $40 $20 $0 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 BPaaS ($) 0.15 0.23 0.35 0.53 0.8 1.26 1.95 2.93 4.28 6 7.66 9.08 10.02 SaaS ($) 5.56 8.09 13.4 21.21 33.09 47.22 63.19 78.43 92.75 105.4 116.3 125.5 132.5 PaaS ($) 0.05 0.12 0.31 0.82 2.08 4.38 7.39 9.8 11.26 11.94 12.15 12.1 11.91 IaaS ($) 0.06 0.24 1.02 2.94 4.99 5.75 5.89 5.82 5.65 5.45 5.23 5.01 4.78 Source: Forrester, April 2011 “Sizing The Cloud” PwC 13
  • 14. Mobile is shaping new behaviors Average Time Spent on Various Mobile Functions, 1/11 12% 40 minutes • Maps • Games • Social networking • Utilities • more 32% 47% 27 minutes telephony • Phone • Skype • Messages 10 minutes Web/Web Apps 9% 7 minutes Mail app Source: AppsFire 1/11 PwC 14
  • 15. … but risks stifle innovation potential PwC 15
  • 16. Mobile blurs the information perimeter PwC 16
  • 17. Mobile Malware attacks cause real harm “The Mobile Malware (MM) Total Mobile Malware Q2 2011 revolution started principally in 2004 with the release of the Cabir. A Android worm, SymbianOS. Some Symbian MM were released before this Java ME date, but it was Cabir and the Others release of its source code that caused an explosion of new MM to emerge.” – Ken Dunham, Mobile Ransomware Malware Attacks and Defense Complete Financially device Serious motivated control attacks attacks emerge Source: McAffee Threats Report: Second Quarter 2012 PwC 17
  • 18. “Top three Mobile risks include: 1. Data loss from lost, stolen or decommissioned devices. 2. Information-stealing mobile malware. 3. Data loss and data leakage through poorly written third-party apps.” Source: Top Threats to Mobile Computing, Cloud Security Alliance, October 2012 PwC 18
  • 19. Security is an enabler of Mobile Services PwC 19
  • 20. Technology adoption is moving faster than security implementation Organizations are struggling to keep pace with the adoption of cloud computing, social networking, mobility, and use of personal devices. 88% of consumers use personal mobile device for both personal and work purposes.2 50% 40% 44% 45% 43% 37% 38% 30% 32% 29% 26% 20% 10% 0% Cloud security strategy Mobile device security Social media security Security strategy for strategy strategy employee use of personal 2011 2012 devices in the enterprise Question 14: What process information security safeguards does your organization currently have in place?” (Not all factors shown. Totals do not add up to 100%.) 2 PwC, Consumer privacy: What are consumers willing to share? July 2012 PwC 20
  • 21. Mobile Security is complicated by multiple factors Device diversity/complexity Advanced persistent threats Data explosion Data transference inference Application explosion PwC 21
  • 22. A variety of mechanisms are used to controls Smartphone and tablet risks What steps have respondents taken to mitigate the risks associated with staff using smartphones or tablets? Do not allow any such devices to remotely connect to the organisation's systems Allow only corporate devices to remotely connect to the Small organizations organisation's systems Large organizations Defined a security strategy for mobile devices Issued a policy on mobile computing Trained staff on the threats associated with mobile devices Protected corporate email and calendaring Implemented strong encryption Implemented mobile device management(to manage devices remotely over the air) No steps taken 0 10 20 30 40 50 60 70 Source: Information Security Survey Breaches Report, April 2012, http://www.pwc.co.uk/en_UK/uk/assets/pdf/olpapp/uk-information-security-breaches-survey-technical-report.pdf PwC 22
  • 23. Solutions for managing mobile security challenges are maturing Network Mobile Device Mobile Access Management Enterprise Application Management Virtual Secure Authentication Desktop Storage and Infrastructure Authorization PwC 23
  • 24. Architecting mobile security is essential for protecting information and creating value • Deploy mobile services quickly Grow the • Improve user experience business • Expand partner eco-systems • Embrace mobile users • Automate security processes Improve • Adopt cloud models efficiency • Expanded virtualization–securely • Improve collaboration • Combat mobile threats Protect the • Protect sensitive information business • Govern mobile solutions • Control access PwC 24
  • 25. Conclusions 1 Mobile threats are real: While data loss from lost, stolen device remains a top concern, mobile malware is causing real harm 2 Cloud and Social Media risks go hand-in- hand: Recognize the risks that arise because mobile drives new behaviors that push users to adopt cloud and social media 3 Not just technology: Consider the governance and process implications of deploying your mobile solution 4 Security as an enabler: Position mobile security as an enabler by considering both the consumer and workforce use cases PwC 25
  • 26. Thank you Nalneesh Gaur, Director PwC Nalneesh.Gaur@us.pwc.com © 2012 PricewaterhouseCoopers LLP. All rights reserved. In this document, “PwC” refers to PricewaterhouseCoopers LLP, which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity. This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisor PwC 26

Editor's Notes

  1. As security professionals, we live in a world where fear uncertainty and doubt are often the cause for action. I have observed countless clients who were caught askew by the mobile needs of the enterprise. Be it BYOD, deployment of tablets in the enterprise or consumer applications, we find security departments reacting to these needs.There is plenty of evidence that the risk is real - Just last week, Japanese cops arrested five developers accused of planting malware in smartphone applications. A video app for Android phones created by the group allegedly harvested 10 million pieces of personal information from 90,000 smartphones. Apparently, the apps were marketed to customers by adding the phrase "The Movie" to popular game titles.However, the opportunity is real too.This talk is about how security enables mobile innovation. My hope is that you are left with a balanced view where security is about managing information risks but more importantly about our role in building new mobile services and capabilities
  2. Lets ask a fundamental question: Why is the mobile platform so popular?The big push towards Mobile is because a) it offers unprecedented scale of adoption across all demographics and across every continent, b) Mobile is affordable, thanks to Moore’s law – where computation power doubles every two years resulting in more capable devices in our hands, c) More capable devices in the hands of users results in the network effect increasing the utility for users and business. I will now discuss three mobile innovation examples and security’s role in its enablement.
  3. In the first example, Mobile services are transforming the life of farmers in India. This one is personal to me, I have personal seen how farmers have traditionally waited in lines to receive information and subsidies.The World Bank has conducted numerous studies that prove that Mobile technology can be used to help raise farmers’ incomes, making agricultural marketing more efficient, lowering information costs, reducing transport costs, and providing a platform to deliver services and innovate. A world bank study found that farmers equipped with information have a stronger bargaining position within existing trade relationships, in addition to being able to seek out other markets.Farmers have little information about market prices in urban areas. The result of this information asymmetry is price dispersion—the same goods sell for widely different prices in markets merely a few kilometers apart. Mobile services have enabled farmers to achieve a much more direct connection to marketsIn India Farmers access information, link Farmer credit to phones to receive subsidies and government and other NGO services.So lets examine the enabling security aspects:Managing digital identities of consumers and linking them to phone numbers, here security enablesCRM linked to identities e.g. crops sowed, localized services - local weather forecasts transmitted through SMS Protecting the confidentiality and integrity of services provided, here security enablese.g. benefits received to those who need it as compared to middle men who have traditionally deprive farmers of the full benefitsPreventing and detecting fraudLets now take a look at an example right here in the US.
  4. In this example, patients are able to locate doctors on-demand. As you know the process for getting a doctor to see you is onerous, mobile services have made it possible for patient to connect with doctors. Now patients can access millions of doctors by specialties and obtain an appointment.In this case security is enablingUniquely identifying patients Protecting the patient- physician relationship, appointment historyIn both these examples, the consumer is the center of focus. Business has little control over the consumer device, yet as many studies point out, consumers expect that Business’ are protecting their information. Let us look at a different example focused on the corporate workforce.
  5. In this example, a drug company’s salesforce tool of choice is the tablet. For pharma company reps, getting time with physicians and making effective use of the time is a challenge. Reps often get very little time with Doctors, sometimes as little as 5 minutes. Leading drug companies are utilizing tablets for their physican encounters - showing product capabilities, test results, ordering samples, taking call notes and capturing physician signatures for compliance. Vendors have already written cloud-based applications (e.g. CRM) to enable the Reps to use the tablet as their only computing device.So lets see what security does for drug companies:protection of the information stored on the tablet (e.g. call notes) share encounters details with other sales reps and partnerstransmission and storage of information for cloud applicationssecurity of the tablet itself (policy, compliance and lost device management)
  6. The three examplesdemonstrate that business’ see tremendous opportunities in mobile, both in terms of growing the business and improving the efficiency. IDC’s survey shows what business values most. Three of the responses are focused on revenue/profits while the others are focused on improving efficiency. We find that these benefits are often noted in the business case. We would do well as security professionals to link mobile security initiative to these benefits.
  7. So now that we have some real examples, lets examine some of the macro trends. These trends will only further accelerate mobile innovation.
  8. In 2012, we have seen a growth rate of a million Smartphone's a week. Mobile scalability and a more capable device in the hands of users will only cause business to provide additional services to users. As security professionals, we should expect thatmobile device tobecome a authentication token for connectivity and access.sensitive information is stored and transmitted by mobile devicesLocation based services offered to consumersPrivacy and cross boarder data transfer are a given
  9. its no surprise that mobile internet traffic too has steadily grown. As more mobile services are offered, automating security capabilities becomes an imperative, particularly around Mobile forensics, reporting, log management, intrusion detection and response.
  10. While there are a number of Mobile OS platforms, winners are emerging. Security practitioners will do well to focus on IOS, Android and Windows Mobile/RT. Again basic blocking and tackling are essential – e.g. Mobile OS platform hardening standards.
  11. Mobile applications on smart phones have seen tremendous growth. Security professionals have to get involved with business in understanding what the applications do to Information and how: Protecting not just the device but also the applications and the information handled by the application For Location based services – the privacy and any derivative risks must be understood by evaluating scenarios, lets also not over-react Recognize that many of these applications will link to the cloud (sometimes in a store and transmit mode) and the social media. Security is integrated into the Mobile SDLC
  12. Here is an interesting study on how the cloud and Social media are an integral part of the Mobile ecosystem.The study also reveals that 88 percent of mobile professionals use social networks, with 60 percent of them leveraging social media platforms to market their businesses. Many mobile professionals, 80 percent of them, feel it is critical to have access to information while outside of the office. Devices and services that help them stay connected while away from their desk include WiFi, text messages, smartphones, apps, notebook/netbook, iPad and cloud computing.Moral of the study: Don’t just consider Mobile, Social Media and Cloud are equally important and complementary technologies.
  13. - Mobile and Social Media will both drive higher cloud usage, the risks stem from intermingling of data, loss of corporate control across geographies, and employee/partners continuing to access data much after separation.- Cloud applications and a place to store content are big reasons why user’s will naturally opt for cloud usage.
  14. Mobile behaviors present risks both in terms of activities that we know about and activities that are as yet unimagined.New Apps are designed with the cloud and social media in mind (e.g. send photo to Social networks, social media in car) Have you noticed how Iphones now automaticaly pull-up the facebook picture in your contacts?IT discourages device storage which is driving data center/cloud data storage.
  15. Ok so lets take a quick look at risks
  16. Its probably no surprise that mobile cloud and social media have further blurred the information perimeter. Security professionals have to focus on the risks to not just the Infrastructure but also the mobile Application platforms and how they integrate with the cloud and social media.
  17. Not a day goes by when we don’t hear about Mobile attacks, allow me to summarize what we have seen so far.Initially J2ME and Symbian but more attacks are emerging for Android OS. According to McAfee Mobile threat report:One significant change in the first quarter of 2012 was Android’s becoming the most targeted platform for mobile malware. This increase in threats to such a popular platform should make us evaluate our behavior on mobile devices and the security industry’s preparedness to combat this growth.We also saw an increase in for-profit mobile malware, including simple SMS-sending Trojans and complex Trojans that use exploits to compromise smartphones. Attacks progressed from proof of concept to financially motivated attacks to ransomware in just 3 years!
  18. So if you only had to worry about three risks, what would those be? According to the Mobile Threats working group prepared by the Cloud Security Alliances, its no surprise that the top three threats are focused on the Infrastructure and applications.Top CSA report Threats:1. Data loss from lost, stolen or decommissioned devices.2. Information-stealing mobile malware.3. Data loss and data leakage through poorly written third-party apps.4. Vulnerabilities within devices, OS, design and third-party applications. 5. Unsecured WiFi, network access and rogue access points.6. Unsecured or rogue marketplaces.7. Insufficient management tools, capabilities and access to APIs (includes personals).8. NFC and proximity-based hacking.Real stories from the field:1. In 2010, a major bank’s mobile application accidentally saved account numbers, bill payments and security access codes. 2. The Korean Financial Intelligence Unit has recorded cases of cyber gaming, cross border remittance and swindling using mobile FS channels. 3. In Brazil, poor people were targeted and paid by criminals to open bank accounts equipped with remote access channels (internet or mobile). After the accounts were opened, the authorized users would hand over their passwords to criminals. 4. In India, a Duplicate SIM card was issued to an imposter with the fake driver license of the victim resulting in a loss of roughly $5,000.5. Recent Trojan captures all text messages from phone.
  19. returning back to our original theme…
  20. Our joint survey with CSO magazine reveals that Social Media, Mobile and Cloud adoption is moving at a much faster pace than the business’ ability to protect. Use of personal and corporate issued devices is claimed to be a challenge, but its been happening in the PC/Laptop world for at least a decade. So what complicates Mobile security?
  21. Device Diversity/Complexity – Explosion in device types and a desire to accommodate devise diversity is a complicating factor. Short device lifespans will increase management costs. Employee/partner desire to bring their own device will challenge IT organizations. IT organization will need to govern device proliferation.Advanced Persistent threats– Expect to see more cases on Advanced Persistent Threats and corresponding process and technologies to protect against APT. Greater opportunities to launch attacks using the Mobile and Social Media vectors.Data Explosion – Expect more data to make its way to Mobility, Cloud and Social Networks. This means greater effort and reliance on automated mechanisms and analytics. IT organization will need to govern corporate data, process and technology to protect corporate data.Data transference and inference - Location Based Service will reveal additional personal information. Allowing for greater data transference and inference. Lets not overreact here, for example, location inference may matter for the M&A group but not necessarily for the IT staff. IT organization will need to govern usage of location based services and improve awareness of risks arising from Cloud/mobility/Social Media usage.Application explosion – We simply cannot expect our end users to know whether an application is doing all the right things. For example, is it OK for an application to access the address book or post your location on facebook. The diverse range of applications required by knowledge workers today makes it impractical to “lock down” a device to a list of blessed applications. IT organization will need to govern application proliferation, process and technology to protect applications.
  22. Challenged by these complications, corporation are too narrowly focused on the device itself (just as the initial focus on security was on servers and networks)It is encouraging to see that many large organizations are viewing mobile security strategically, but as you can see there is much ground to be covered. I am also amazed at the number of organizations who have not taken any steps. One thing is clear Mobile Device Management is mainstream and so is use of encryption. Focusing just on device is like using an armor against Avian Flu. So how should business’ think about the overall solution space?
  23. We find six building blocks in use today:First is controlling access at the network level. This also includes setting up a guest Wireless LAN, treating all mobile devices as untrusted and requiring VPN access, and use of Mobile Device Management (MDM) to develop device profiles and permit access only when specific conditions have been met.Speaking of MDM, as you saw in the previous slide, it is mainstream and the market is saturated with vendors who are continually enhancing capabilities. MDM is also the primary mechanism for policy enforcement, device control (lost device, notification etc.)A complementary capability is around managing the applications on mobile device. Some MDM have bundled these capabilities, the intent here is to focus on managing the applications that are installed on the device. Many vendors take the walled garden approach of cordoning of corporate applications and/or limiting how much can be shard between applications (e.g. access to address book)VDI is needed more as a way to expose applications without specific device customization. There's VMware's View, Citrix's Receiver and Quest's vWorkspace to name just three. Carefully evaluate security implications of Windows 7 vs. 8 Software Assurance Roaming rights. User authentication and network access control deserve attention here. Concern is around password steeling trojans as well as network/infrastructure changes required to accommodate VDI. The Roaming Use rights allow the single primary user of a device licensed through Client SA of Windows VDA to access their virtual Windows desktop while roaming on non-corporate devices such as home PCs, internet café’s, airport kiosks, etc. These roaming rights are applicable only outside of the corporate domain, and cannot be used to roam within the corporate network. As a result, customers with active Software Assurance for Windows, or a thin client with Windows VDA, get exactly the same virtual desktop access rights. "[Roaming Rights] can be exercised only on untrusted devices over unsecure networks, this keeps most IT admins awake at night, so they stop it cold whenever and wherever they can.“Secure storage has emerged as a key needs and vendors like box.net, dropbox and Microsoft are doing more to provide secure storage capabilities in the cloud. Suggest putting a capability quickly in place versus blocking Authentication and authorization is a universal need stemming from the need of binding the device to the user’s corporate identity so that he device itself can be used to authenticate the user without the need for further authentication – typically password policies are too cumbersome for users on mobile devices. We see a push to use soft tokens – e.g. certificates on these devices. However, please be aware of the challenges that the IOS platform poses in terms of integrating certs and using them to authenticate users against back end systems – gets even more complicated when multiple vendor apps are involved. API protection using Oauth 2.0 is going to be the way of the future
  24. These six building blocks are the ones that enable mobile services – whether its for the consumer or the workforce. But its not like you can go out and buy a product for each …. In some cases you can, but its more about architecting the details for the specific problem at hand. To us its about coming up with specific initiatives that link to the three goals described here and the associated benefits.Growneed to quickly bring new mobile services onlineProvide a pleasant experience for your customersBuild partner eco-systems to help increase businessSupport the range of new consumer devices that users will want to useImprove efficiencyAutomate security processes (such as provisioning) that are often manual and paper-basedUse the cloud to improve efficiencies, but ensure that your apps & data are secure in the cloudDeploy secure virtualized environment to leverage those efficienciesImprove employee collaboration by improving security for Sharepoint environments.ProtectProtect your data from insiders – thru careless of malicious actionsEnsure that every user has only the correct access right they need for their roleGovern Mobile solutions – All about decision making for BYOD and Mobile appsControl all user access to resources – systems, applications, & data