Transcript
Page 1: Is It Time for a Mobile Security Assessment? · 2017-06-23 · Is It Time for a Mobile Security Assessment? The current state of mobility 59% of C-level security leaders describe

Is It Time for a Mobile Security Assessment?

The current state of mobility

59%of C-level security leaders describe their business as either partially or fully mobile.1

64%report that mobility has increased productivity and efficiency.2

28%of CIOs say that their organization doesn't even have a mobile strategy.3

63%say enterprise mobility has surfaced a greater number of security risks and concerns than anticipated.4

****

Among the top challenges that enterprises face with mobility are:

Protecting data

Application security

concerns

Separation of work and

personal data

Organizations feel the effect of these challenges in a number of ways.

67%of organizations said a data breach likely resulted from employees using their mobile devices to access sensitive company information.5

33%of employees say they have more access to confidential or classified documents, while only 8 percent of IT says that employees have this access.6

20%of BYOD programs will fail because IT is trying to implement MDM solutions that are too restrictive.7

Enterprises need a mobile security plan to strategically balance risk and employee productivity. This involves right sizing mobile policies, leveraging tools to manage risks and where possible enabling more open environments for better user experience.

A comprehensive mobile security assessment: Know your needs

Legal policies and regulatory requirements

Mobility infrastructure

Mobility applications

Data protection

Mobility end points

Risk and threat management

The Samsung/Booz Allen Hamilton security assessment

The seven fundamentals of mobile security:

Samsung has partnered with Booz Allen

company security protocols and improve your overall security position. Don't leave

your security situation to chance — get the answers you need.

A partnership you can trust

market consolidation.7 Given this scenario, companies with long-standing security records like Samsung and Booz Allen Hamilton can give you confidence over the long term.

"2016 Mobile Security & Business Transformation Study," Information Security Media Group, 2016, http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03118usen/WGL03118USEN.PDF.

Ibid.

Josh Brost, "1 in 4 CIOs Say Their Organization Doesn't Have a Mobile Strategy," Robert Half Technology, March 25, 2014, https://www.roberthalf.com/technology/blog/ 1-in-4-cios-say-their-organization-has-no-mobile-strategy.

"2016 Mobile Security & Business Transformation Study," Information Security Media Group, 2016, http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03118usen/WGL03118USEN.PDF.

"The Economic Risk of Confidential Information on Mobile Devices in the Workplace," Ponemon Institute, Feb. 2016.

Ibid.

"Gartner Predicts 20% of BYOD Programs Will Fail in the Next Two Years," Unified Communication Strategies, Jan. 14, 2014, http://www.ucstrategies.com/unified-communications- newsroom/gartner-predicts-20-of-byod-programswill-fail-in-the-next-two-years.aspx.

1

2

3

4

5

6

7

We’ll assess not only the security effectiveness in these areas, but how security protocols align with overarching business needs.

Mobiledevice

management (MDM)

Mobile application

management (MAM)

Security and threat protection

across the organization

As part of its assessment,

Samsung and

evaluate:

1

7

6

5 4

3

2

Business management and governance

Learn more about the Samsung and Booz Allen Hamilton security assessment services:

samsung.com/mobile-security-assessmentboozallen.com/cybersolutions

Download our white paper, “The Mobile Security Evolution” to understand how you can move your approach to mobile security from tactical to strategic.

Top Related