BYOD & Mobile Security: How to Respond to the Security Risks

630 views
517 views

Published on

Bring Your Own Device (BYOD) is a popular topic in 2013. Trying to understand the security risks and prepare strategies to either adopt, or decide against BYOD for security and data control reasons is the challenge.

The 160,000 member Information Security Community on LinkedIn conducted the survey "BYOD & Mobile Security 2013" to shed some light on the drivers for BYOD, how companies will benefit from BYOD, and how they respond to the security risks associated with this trend. With 1,600 responses, some interesting insights and patterns into BYOD were uncovered.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
630
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

BYOD & Mobile Security: How to Respond to the Security Risks

  1. 1. PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTIONBYOD & MobileSecurity2013 Survey Results
  2. 2. Today’s Panelists2Chris MerrittDirector of Solution MarketingLumensionPROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTIONChris ChevalierGroup Product ManagerLumension
  3. 3. 3PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTIONAgenda• Survey Methodology• Current Mobile Security Threats• Top Trends and Drivers inBYOD and Mobile Security• Necessary Strategies toMinimize these Risks
  4. 4. Thanks4PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION• Thanks to the members of the InformationSecurity Community group for participating in this survey;to join this group, go tohttp://www.linkedin.com/groups?gid=38412• And special thanks to Holger Schulze for pulling thissurvey together, getting the results published, andmanaging the ISC group of over 168,000 members.
  5. 5. Survey Methodology
  6. 6. Respondent Demographics6PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  7. 7. BYOD Adoption Stage7PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  8. 8. Current Mobile Security Threats
  9. 9. Main BYOD Security Concerns9PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  10. 10. Negative Impacts of Mobile Threats10PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  11. 11. Top Trends and Drivers inBYOD and Mobile Security
  12. 12. BYOD – Main Drivers and Benefits12PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  13. 13. Mobile Platform Support13PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  14. 14. IT Infrastructure Support14PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  15. 15. Most Popular Business Applications15PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  16. 16. BYOD Success Criteria16PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  17. 17. Readiness for Full BYOD Adoption17PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  18. 18. Necessary Strategies toMinimize these Risks
  19. 19. Current BYOD State19PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  20. 20. Current BYOD Policy20PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  21. 21. BYOD Solution Deployment21PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  22. 22. BYOD Policy Coverage22PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  23. 23. MDM Tool Requirements23PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  24. 24. Conclusions24PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION• Don’t Panic …you’re not that far behind your peers• Risk and Compliance Assessment• People / Policy / Technology» Develop complete policy which covers thewhole picture» Consider how you’re going to implement thepolicy (must be enforceable)» Technology capabilities should align withpolicy» User education is still key• Implementation
  25. 25. More Information at www.lumension.com25Sign Up for the MDM Beta at~/mobile-device-management-softwareGet the BYOD Survey Report at~/more-info/BYOD-and-Mobile-SecurityFree Device Scanner tool – discover all thedevices being used in your network~/Resources/Security-ToolsMore on BYOD issues and solutions in theLumension Optimal Security blog atblog.lumension.com/tag/byodPROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  26. 26. Global Headquarters8660 East Hartford DriveSuite 300Scottsdale, AZ 852551.888.725.7828info@lumension.comhttp://blog.lumension.com

×