Your SlideShare is downloading. ×
Mobile – Adoption and Adaption in 2012
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Mobile – Adoption and Adaption in 2012

319
views

Published on

Discussions on “Mobile” are everywhere right now, from the street to the boardroom, and it provides a two-sided challenge for forward-thinking businesses. On one side, how can the organisation open up …

Discussions on “Mobile” are everywhere right now, from the street to the boardroom, and it provides a two-sided challenge for forward-thinking businesses. On one side, how can the organisation open up new ways of generating engagement and revenue from its customer base? On the other, how can it open up new ways of working for its employees that increase their productivity and improve retention of the best and brightest? Both of these potentially positive changes must be held up against increasing expectations of the protection of both customer and employee information and identity. Derek O’Carroll from Symantec will host this workshop by first presenting a viewpoint and leading a discussion into how this is being addressed today and possible forward-looking strategies.

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
319
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • GartnerAccording to Gartner, sales of smartphones will exceed 461 million by the end of the year, surpassing PC shipments in the process. In fact, combined sales of smartphones and tablets will be 44 percent greater than the PC market by the end of 2011.  Oracle mobile data report 201116% of mobile customers have purchased a tablet computer and another 41% plan to purchase one in the next 12 months 55% report having downloaded a free mobile application (app), up significantly from 42% in 2010  47% of mobile customers say their data use has increased in the past 12 months (4Gb-64Gb)
  • Lets look back at some of the moments in Mobile Malware History:I am sure many of you may remember threats like the skulls trojan targeting Symbian that was being carried by many taxidrivers here in Sydney, who were given the gift from their passengers. Ref : http://www.zdnet.com.au/sydney-taxis-infested-with-worms-139182408.htmCode Signing introduced by Symbian started the decline targeting that platform.Rick Rolling Iphone users in 2009Android seems to be where the action is right now <click>
  • Applied Research fielded this survey by telephone in April and May 2011. These results are based on 3,300 responses.Of the organizations surveyed in April and May, respondents came from companies with a range of 5 to more than 5,000 employees. Of the total responses, 1,225 were from companies with 1,000 employees or greater.This survey has a reliability of 95% confidence with +/- 1.8% margin of error.When we asked companies that question, the top three industry trends they saw affecting the difficulty of providing cybersecurity were: - Mobile computing (47%) - Social media (46%) - Consumerization of IT (45%)
  • Symantec is spending a lot of time monitoring the mobile threat landscape and you an read in more detail many of our findings
  • Transcript

    • 1. Mobile – Adoption and Adaption in 2012Greg DaySecurity CTO & Director of strategy
    • 2. Mobile data usage up 4,000% 2
    • 3. Business Drivers• Fast route to market (quick app development)• User productivity (familiarity & use in personal time)• Cost saving (capex, support costs, contract/data costs)• Employee satisfaction• Staff attraction and retention• Easier to use?
    • 4. Do you ever text and walk? Ever walk into something?
    • 5. What if your camera was on and showed where you were going?
    • 6. “There’s an app for that…$1.54”
    • 7. • Found on 3rd party sites and torrents 95054It does two things: 1. Sends info to a remote location 2. Sends an SMS to all your contactsAndroid.Walkinwat 7
    • 8. Typical Mobile Malware 8
    • 9. Apple vulnerabilities – iOS5 – Access to last used app Hold down the power button
    • 10. Mobile threat history across major platforms. Symbian requires140 signing120 20100 Families Ikee 80 worms on 41 Variants 60 rooted iPhones 40 20 0 Android iPhone 2004 2005 2006 2007 Symbian 2008 2009 2010 2011 Symbian iPhone Android
    • 11. What Is Driving Security?Industry trends driving security challenges • Mobile computing • Social media • Consumerization of IT 11
    • 12. Business concerns• Data on the device• Social networking (blurring personal/business identities)• Accountability for the device (responsible/liable when managing)• Data privacy regulations• Malware (HTML5 adoption)• Location controls – social engineering• Device physical loss
    • 13. BYOD concerns• 3rd party use of the device (family access to data)• Basic security controls vs user lockdown• Apps installed• Blending of data and identities• Jail broken devices• Damaged devices• Lost/stolen devices• Privacy of devices in public places• Other business users devices
    • 14. Symantec researchTop three Mobile Security Practice “Must Haves”To successfully enable and manage mobile technology, CISOs ratedtheir top practices and related technologies:1. Protecting information on devices (90%)2. Authentication to the network and applications (89%)3. Setting and maintaining security policies (88%)Source: 2011 IDG/CSO Quick Poll Survey of 124 Qualified respondents.
    • 15. Business decisions• Business or user owned• In-house or managed Data Protection Identity Service Mgmt• Managed device or managed applications Security baseline• What controls – What the longer term use case? Mobile Security
    • 16. Smart device = Cloud enabled • Manage• Enable new devices entitlements• Consistently govern cloud services • Hyper-distributed information CIO CISO
    • 17. 03 - The Rise of Cloud Security Brokers Managed Devices Unmanaged Devices Governance Security/protection agents Protection SYMANTEC O3 Visibility Security/protection agents Datacenter/Private-Cloud Public Cloud ServicesConsistent identity & information security policy setting & auditing across all cloud servicesContext and content aware security gateway enforcing enterprise policies above the cloudsComplete cloud audit trail of who (identity), what (information, services) , how (devices) , when (time)
    • 18. 2011 TrendsMobile Threats 19
    • 19. Thank You!Greg DaySecurity CTO & Director of StrategyGreg_Day@Symantec.com07714 388998 GregDaySecurity
    • 20. Mobile – Adoption and Adaption in 2012Discussions on “Mobile” are everywhere right now, from thestreet to the boardroom, and it provides a two-sided challengefor forward-thinking businesses. On one side, how can theorganisation open up new ways of generating engagement andrevenue from its customer base? On the other, how can it openup new ways of working for its employees that increase theirproductivity and improve retention of the best and brightest?Both of these potentially positive changes must be held upagainst increasing expectations of the protection of bothcustomer and employee information and identity. DerekO’Carroll from Symantec will host this workshop by firstpresenting a viewpoint and leading a discussion into how this isbeing addressed today and possible forward-looking strategies.

    ×