PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTIONBYOD & MobileSecurity2013 Survey Results
Today’s Panelists2Chris MerrittDirector of Solution MarketingLumensionPROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBU...
3PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTIONAgenda• Survey Methodology• Current Mobile Security Threats• Top ...
Thanks4PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION• Thanks to the members of the InformationSecurity Communit...
Survey Methodology
Respondent Demographics6PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
BYOD Adoption Stage7PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Current Mobile Security Threats
Main BYOD Security Concerns9PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Negative Impacts of Mobile Threats10PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Top Trends and Drivers inBYOD and Mobile Security
BYOD – Main Drivers and Benefits12PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Mobile Platform Support13PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
IT Infrastructure Support14PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Most Popular Business Applications15PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
BYOD Success Criteria16PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Readiness for Full BYOD Adoption17PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Necessary Strategies toMinimize these Risks
Current BYOD State19PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Current BYOD Policy20PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
BYOD Solution Deployment21PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
BYOD Policy Coverage22PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
MDM Tool Requirements23PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Conclusions24PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION• Don’t Panic …you’re not that far behind your peers•...
More Information at www.lumension.com25Sign Up for the MDM Beta at~/mobile-device-management-softwareGet the BYOD Survey R...
Global Headquarters8660 East Hartford DriveSuite 300Scottsdale, AZ 852551.888.725.7828info@lumension.comhttp://blog.lumens...
Upcoming SlideShare
Loading in...5
×

BYOD & Mobile Security: How to Respond to the Security Risks

420

Published on

Bring Your Own Device (BYOD) is a popular topic in 2013. Trying to understand the security risks and prepare strategies to either adopt, or decide against BYOD for security and data control reasons is the challenge.

The 160,000 member Information Security Community on LinkedIn conducted the survey "BYOD & Mobile Security 2013" to shed some light on the drivers for BYOD, how companies will benefit from BYOD, and how they respond to the security risks associated with this trend. With 1,600 responses, some interesting insights and patterns into BYOD were uncovered.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
420
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

BYOD & Mobile Security: How to Respond to the Security Risks

  1. 1. PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTIONBYOD & MobileSecurity2013 Survey Results
  2. 2. Today’s Panelists2Chris MerrittDirector of Solution MarketingLumensionPROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTIONChris ChevalierGroup Product ManagerLumension
  3. 3. 3PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTIONAgenda• Survey Methodology• Current Mobile Security Threats• Top Trends and Drivers inBYOD and Mobile Security• Necessary Strategies toMinimize these Risks
  4. 4. Thanks4PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION• Thanks to the members of the InformationSecurity Community group for participating in this survey;to join this group, go tohttp://www.linkedin.com/groups?gid=38412• And special thanks to Holger Schulze for pulling thissurvey together, getting the results published, andmanaging the ISC group of over 168,000 members.
  5. 5. Survey Methodology
  6. 6. Respondent Demographics6PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  7. 7. BYOD Adoption Stage7PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  8. 8. Current Mobile Security Threats
  9. 9. Main BYOD Security Concerns9PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  10. 10. Negative Impacts of Mobile Threats10PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  11. 11. Top Trends and Drivers inBYOD and Mobile Security
  12. 12. BYOD – Main Drivers and Benefits12PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  13. 13. Mobile Platform Support13PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  14. 14. IT Infrastructure Support14PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  15. 15. Most Popular Business Applications15PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  16. 16. BYOD Success Criteria16PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  17. 17. Readiness for Full BYOD Adoption17PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  18. 18. Necessary Strategies toMinimize these Risks
  19. 19. Current BYOD State19PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  20. 20. Current BYOD Policy20PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  21. 21. BYOD Solution Deployment21PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  22. 22. BYOD Policy Coverage22PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  23. 23. MDM Tool Requirements23PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  24. 24. Conclusions24PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION• Don’t Panic …you’re not that far behind your peers• Risk and Compliance Assessment• People / Policy / Technology» Develop complete policy which covers thewhole picture» Consider how you’re going to implement thepolicy (must be enforceable)» Technology capabilities should align withpolicy» User education is still key• Implementation
  25. 25. More Information at www.lumension.com25Sign Up for the MDM Beta at~/mobile-device-management-softwareGet the BYOD Survey Report at~/more-info/BYOD-and-Mobile-SecurityFree Device Scanner tool – discover all thedevices being used in your network~/Resources/Security-ToolsMore on BYOD issues and solutions in theLumension Optimal Security blog atblog.lumension.com/tag/byodPROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
  26. 26. Global Headquarters8660 East Hartford DriveSuite 300Scottsdale, AZ 852551.888.725.7828info@lumension.comhttp://blog.lumension.com

×