Your SlideShare is downloading. ×

Dimension Data Blog Series

2,929
views

Published on

Read the blogs here: …

Read the blogs here:

Dimension Data Series #1: Mobile Security: Actions Speak Louder than Words
http://blogs.cisco.com/security/142585/

Dimension Data Series #2 – Mobility Policy: The Mobile Endpoint is the New Perimeter
http://blogs.cisco.com/security/didata-series-2-mobility-policy-the-mobile-endpoint-is-the-new-perimeter/

Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation
http://blogs.cisco.com/security/dimension-data-series-3-closing-the-gap-between-the-secure-mobility-vision-and-real-world-implementation/

Dimension Data Series #4- The Opportunities and Risk of Secure Mobility from the Top Down
http://blogs.cisco.com/security/dimension-data-series-4-the-opportunities-and-risk-of-secure-mobility-from-the-top-down/

See how we can help your business prepare for the Future of Mobility.
http://www.cisco.com/web/solutions/trends/cloud/index.html?CAMPAIGN=cloud+story&COUNTRY_SITE=us&POSITION=vanity&REFERRING_SITE=cisco&CREATIVE=cloud+computing

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,929
On Slideshare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Why aren’t more IT leaders taking strategic action? http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/g3cDo
  • Why aren’t more IT leaders taking strategic action? http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/g3cDo
  • 79% surveyed say mobility is a top priority for their organization http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/c9bop

    77% of those surveyed believe data is the greatest concern for mobility http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/uaKDM

    Only 55% surveyed have a mobility roadmap in place http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/Uf_U9

    67% of all devices carry at least one known security vulnerability http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/k090e
  • Employees using their devices to access our systems is nearly impossible to stop http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/2Qak0
  • Define what constitutes a Bring Your Own Device http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/1iqM9

    Determine a plan for known and unknown devices on your network http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/cO0q4

    Outline a policy for what happens when a device is lost or stolen http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/K6TQ6

    Decide how organizations and users deal with device disposal http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/KC7Ac

    Institute cloud backup and restoration policies http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/h5b6U

  • There is a gap between secure mobility vision and implementation http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/P1W93
  • Determine a mobility policy and data classification model http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/GU23S

    Define access control http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/bxd9u

    Introduce Mobile Device Management http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/0_c20

    Ensure data leakage prevention http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/8vo45
  • Empowering the mobile worker pays dividends in terms of productivity and efficiency http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/Qb8Ee
  • Embracing mobility can help you retain staff between the ages of 18-35 http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/6qfBf

    Mobility offers increased productivity by mobilizing business processes http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/4Bj3o
  • Match business-driven policy from an architecture approach http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/T6cHm

    Help mitigate the risks IT and business leaders encounter http://cs.co/DDss #FutureOfMobility via @Cisco
    http://ctt.ec/sF3R4
  • Dimension Data Series #1: Mobile Security: Actions Speak Louder than Words

    http://blogs.cisco.com/security/142585/

    Dimension Data Series #2 – Mobility Policy: The Mobile Endpoint is the New Perimeter

    http://blogs.cisco.com/security/didata-series-2-mobility-policy-the-mobile-endpoint-is-the-new-perimeter/

    Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation

    http://blogs.cisco.com/security/dimension-data-series-3-closing-the-gap-between-the-secure-mobility-vision-and-real-world-implementation/

    Dimension Data Series #4- The Opportunities and Risk of Secure Mobility from the Top Down

    http://blogs.cisco.com/security/dimension-data-series-4-the-opportunities-and-risk-of-secure-mobility-from-the-top-down/
  • Transcript

    • 1. CIO Roadmap to Mobile Security A Top Concern for IT and Business Leaders Dimension Data guest blog series highlighting essential policy and programs
    • 2. #MobileSecurity Darryl Wilson Director, Enterprise Mobility for Dimension Data Americas Stefaan Hinderyckx Director, Network Integration and Security for Dimension Data Europe Dimension Data Authors Jason Harris Principal Consultant for Security and Enterprise Mobility for Dimension Data Americas Rory Duncan Security Line of Business Manager for Dimension Data UK
    • 3. Click this button to tweet the information on the slide.
    • 4. Dimension Data Series #1: Mobile Security: Actions Speak Louder than Words If securing company data and successfully implementing a mobile policy is of such importance, why aren’t more IT leaders taking strategic action? #MobileSecurity
    • 5. • 79% say mobility is a top priority for their organization. However, the report indicates that a much smaller segment of those IT leaders’ actions back it up. • 77% of those surveyed believe data is the greatest concern pertaining to mobility. • Yet only 55% have a mobility roadmap in place. • 67% of all devices, all of which are on mature networks, carry at least one known security vulnerability. Did You Know: Source: Dimension Data 2014 Secure Mobility Survey #MobileSecurity
    • 6. Dimension Data Series #2: Mobility Policy: The Mobile Endpoint is the New Perimeter Employees use their devices to access our systems on their own. It’s nearly impossible to stop. #MobileSecurity
    • 7. Short list of what recommended operational security policies should include: • Define what constitutes a Bring Your Own Device • Determine a plan for how known and unknown devices are brought onto the network • Outline a policy for what happens when a device is lost or stolen • Decide how organizations and users deal with device disposal • Institute cloud backup and restoration policies #MobileSecurity
    • 8. Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation There is a gap between the vision for secure mobility and the real- world implementation. #MobileSecurity
    • 9. 1) Determine a Mobility Policy and Data Classification Model 2) Define Access Control 3) Introduce Mobile Device Management 4) Ensure Data Leakage Prevention from a mobile perspective is respected Four steps to consider when turning a secure mobility vision into reality: #MobileSecurity
    • 10. Dimension Data Series #4: The Opportunity and Risk of Secure Mobility from the Top Down Empowering the mobile worker pays dividends in terms of worker productivity and efficiency. #MobileSecurity
    • 11. Real Opportunities: • Embracing mobility can retain staff between the ages of 18-35, especially as many in this age group bring or are expected to bring at least one device from home to use for work. • Mobility offers increased productivity by mobilizing business processes. This functionality can extend across the value chain, helping improve customer interaction, enable quicker sales, and more. #MobileSecurity
    • 12. Top-Down Approach: • Organization and IT leaders must match business-driven policy from an architecture approach. Business objectives and goals must be translated down into actual technical security control and policies to enable that proper secure mobility. • Help mitigate the risks IT and business leaders feel and ensure organizations are dedicating enough resources to fully enabling users to leverage existing business applications in ways that substantially increase the opportunities of mobility. #MobileSecurity
    • 13. Read the Entire Blog Series on Mobile Security • Dimension Data Series #1: Mobile Security: Actions Speak Louder than Words • Dimension Data Series #2 – Mobility Policy: The Mobile Endpoint is the New Perimeter • Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation • Dimension Data Series #4- The Opportunities and Risk of Secure Mobility from the Top Down #MobileSecurity
    • 14. See how we can help your business prepare for the mobile security. cisco.com/go/mobility #MobileSecurity

    ×