SlideShare a Scribd company logo
1 of 12
Download to read offline
Organisations in Australia, the UK and the US can Benefit from Android
Security Features Which Extend Beyond Native Operating System Capabilities
Survey conducted by IDG Connect on behalf of Samsung
IDG Connect is the demand generation division of International Data Group (IDG), the world's largest technology
media company. Established in 2006, it utilises access to 38 million business decision makers' details to unite
technology marketers with relevant targets from 137 countries around the world. Committed to engaging a
disparate global IT audience with truly localised messaging, IDG Connect also publishes market specific thought
leadership papers on behalf of its clients, and produces research for B2B marketers worldwide.
Role: Solution Buyer/Decision Maker
Organisation Size: Enterprise
Region: United States, United Kingdom and Australia
Buying Stage: Business Case Development
Android Mobile Security for Enterprise
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Summary of Research
Android Mobile Security for Enterprise
Infographic Summary
Ability to encrypt data at rest and in
transit, secure mobile boot and two-
factor authentication identified as biggest
potential Android security improvements
In 55% of organisations, over half of employees use
Android devices for business purposes
Most organisations utilise default Android security
options rather than third party applications or services
Android Usage
Default Security Options
Desired Security Features
Default Android
OS Security
Features
Third Party
Security Software
Application
External, Hosted
Mobile Security
Service
Device Hardware
Embedded
Security Tool
93% 4% 2% 1%
On Device
Application and
Data Encryption
70%
Application
Specific Virtual
Private Networks
46%
Secure Mobile Boot
Capabilities
44%
Single Sign-
On/Biometric/
Smart Card User
Authentication
40%
On Device Virtual
Container to Separate
Personal from
Business Profile
36%
Integration with MDM
Platforms Already
Deployed Within the
Organisation
35%
Government
Agency Validation
of Security Solution
29%
17%
28% 36%
19%
Up to 25%
26-50% 51-75%
Over 75%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Introduction
Enterprise mobile usage has accelerated sharply over
the last five years as the emergence of powerful, large
screen smartphones and tablets coupled with a parallel
expansion of high speed wireless WiFi, 3G/4G networks
have improved employees’ ability to access a broad
range of business applications and data from wherever
they happen to be.
The benefits of that trend in terms of business flexibility
and worker productivity are incontrovertible, but it has
also presented significant challenges to IT departments
responsible for deploying, configuring and managing
large numbers of staff issued or owned mobile devices.
The requirement to maintain adequate security on
Google Android devices is especially acute given that up
to 80% of smartphones shipped in the last few years are
pre-installed with the operating system.
A large portion of those handsets are finding their
way into business environments, so it is vital that IT
departments find ways to protect the integrity of the
data stored on, and accessed by, Android devices -
more so considering the increased volume of malware
and viruses now being targeted specifically at mobile
operating systems and the opportunities for unauthorised
access due to lost or stolen devices, and unsecured
networks those operating systems present.
IDG Connect interviewed around 150 people based in
Australia, the UK and the US to build up a more detailed
picture of how they approach security provision for
Android devices used for business activity within their
organisation. All of those polled worked for companies
employing 1,000 people or more and 55% over 5,000,
with 71% holding IT management related roles such as
administrators, directors, chief technology/information/
security officers and business managers and board
room executives making up the remainder. The largest
contingent (20%) came from the software and computer
services industry, followed by key verticals including
health, medical and pharmaceutical (13%), finance and
investment (11%), manufacturing (9%) and retail (7%).
The results gauge the current scale of their Android
smartphone and tablet usage, identifies the applications most commonly accessed and attempts
to assess the extent to which enterprises are content to rely solely on the default security tools
embedded within the Android OS as standard. It also identifies which additional security mechanisms
or services are most likely to be on their wish lists and judges what smartphone and tablet
manufacturers are considered to offer more robust platforms for extra protection.
Introduction
Android Mobile Security for Enterprise
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Business Android Usage
Android smartphones and tablets are widely used for
work related tasks across Australia, the UK and the
US. Of those taking part in the IDG Connect survey
55% estimated that over half of the employees working
within their organisation use them for business purposes
as growing numbers of staff look to improve their
productivity by remotely accessing data and applications
from locations outside of the office.
Almost a fifth (19%) of those polled on aggregate
reported large scale rollouts of Android devices to
employees, reporting that they were used for business
purposes by over 75% of the employees working at, or
for, their companies. This number was marginally lower
in the US specifically (14%) which conversely recorded
the highest number (34%) of organisations where
Android devices are used by 25-50% of employees.
The findings confirm that penetration of Android devices
is widespread in business environments, with sales
forecasts from research company IDC and others
indicating that penetration will expand further in the next
few years.
IDC estimates that a total of 334.4m smartphones
were shipped worldwide in the first quarter of 2015, for
example, up 16% from 288.3m year on year, with over
three quarters of those devices (78%) being Android
smartphones. Research firm Gartner posits similar
figures, suggesting that 336m smartphones were sold in
Q1 2015, 79% of which were Android devices, though
that market share was down almost 2% on Q1 2014.
IDC has also forecast that that global smartphone sales
will continue to grow over the next four years, albeit
at a slower compound annual growth rate (CAGR) of
5% compared to previous years. Australia, the UK and
the US account for a significant portion of global sales
between them. IDC’s Worldwide Quarterly Mobile Phone
Tracker estimates that the US will account for 11.8% of
all smartphone sales in 2015, with the UK 2.4%.
Android Mobile Security for Enterprise
Over Half of Employees use Android Devices for
Business Purposes in 55% of Organisations
What percentage (%) employees at your organisation currently use
Android smartphones or tablets for work related tasks?
28%
17%
36%
19%
Over 75%
51-75%
26-50%
Up to 25%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Application/Data Security and Mobile Device Management
Needs Most Likely to Dictate Investment Priorities
The ongoing need to protect the integrity of sensitive
commercial information and user authentication details
remains foremost in enterprise buyers’ minds when it
comes to choosing which mobile devices are deployed
across their workforce and/or allowed to access
enterprise networks, applications and data stores.
This is reflected in the survey’s finding that application
and data security is the factor considered most important
in influencing any management decision to deploy
Android devices for business usage (weighted at 88% by
those polled).
Mobile device management (MDM) features (76%), cost
(72%) and support for a broad application ecosystem
(69%) that provides a wide choice of business software
for use on mobile devices are given roughly equal
weighting by the survey base on aggregate.
Those same MDM features (82%), cost (80%) and
application ecosystem support (76%) are considered
more important to procurement strategies by larger
companies employing 10,000 people or more, and there
are regional differences: fewer people in the UK rate
the importance of MDM features (68%) and application
ecosystem support (62%) than those in Australia and the
US, for example.
Nor is the strong current focus on application and data
security likely to change in the future - almost all of
those polled (98%) additionally predicted that it would
represent the single most important factor influencing
investment in Android smartphone or tablets for business
purposes two years down the line.
Security Foremost Concern
Application and Data
Security
88%
Mobile Device
Management Features
76%
Cost
72%
Application
Ecosystem
69%
My Organisation Does
Not Trust Android Mobile
Devices for Business
Purposes
42%
Android Mobile Security for Enterprise
Please rate the importance of the following factors which would
influence your organisation’s decision to deploy Android smartphones
or tablets for business usage?
X
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Most Organisations Utilise Default Android Security
Options Rather than Third Party Applications or Services
Despite their present and future focus on application and
data security, few organisations in Australia, the UK and
the US currently employ any security tools beyond those
already available within the Android operating system.
When asked to identify one method harnessed to provide
mobile security on Android devices used for business
purposes, 93% reported that they relied on the default
security features built into the OS itself. There was again
some regional variation amongst the survey base, with
those in Australia showing a preference for both third
party security software (8%) and hosted mobile security
services (4%) which was slightly above the aggregate.
At face value this finding may suggest that almost all
believe that their organisations are satisfied with the
level of mobile security protection that the Android
OS provides to meet current requirements. But it is
also possible that some respondents remain either
unaware of the precise features or functions which have
been deployed and/or have been given no reason to
suppose that their organisation has sufficient motivation
to supplement default Android security provision with
additional layers of mobile protection using third party
software or services.
As we will see later in this paper, the same number
(93%) appear vague on whether default Android options
security match their business security requirements or
not (Tab 10) – another indication that they may not be
aware of what those Android security capabilities are, or
how they measure up against security frameworks set
out by their IT departments.
Current Android Security
93% 4% 2% 1%
Default Android OS
Security Features
Third Party
Security Software
Application
External, Hosted
Mobile Security
Service
Device Hardware
Embedded Security
Tool
Android Mobile Security for Enterprise
How does your organisation currently deliver enterprise security on
Android devices?Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Ability to Encrypt Data at Rest and in Transit Identified
as Biggest Potential Android Security Improvement
In contrast to their acceptance and usage of default
Android OS security options as the mainstay of
their current enterprise mobile security provision,
organisations in Australia, the UK and the US have
very clear ideas on how best to harden current Android
security protection.
On device application and data encryption is seen as
the approach most likely to improve security levels
currently implemented on Android devices used for
business purposes by 70% of those polled, further
identified as the single most important technology by
94% on aggregate. More organisations in the UK rated
encryption as particular source of potential security
improvement (76%) with 100% additionally considering it
most important within two years’ time.
The ability to protect data in transit as well as at rest
on Android devices is another important priority for
many companies, with application specific virtual
private networks (VPNs – those that set up encrypted
communication sessions with individual remote
applications without affecting the operations of other
applications) cited as a top three feature by 46% of
respondents on aggregate.
The benefits of secure mobile boot capabilities which
safeguard sensitive data and user login details stored
on Android smartphones and tablets by preventing
unauthorised access if they are lost or stolen were also
acknowledged by 44%.
Whilst they were cited as a top three feature by a
lower number of respondents many of those polled
also highlighted single sign on, biometric and smart
card authentication tools (40%) as potential areas of
Android security improvement, alongside on device
virtual containers which separate personal from business
profiles (36%) and integration with MDM platforms.
Desired Security Features
Android Mobile Security for Enterprise
On Device Application and Data Encryption
Application Specific Virtual Private Networks
Secure Mobile Boot Capabilities
Single Sign-On/Biometric/Smart Card User Authentication
On Device Virtual Container to Separate Personal from Business Profile
Integration with MDM Platforms Already Deployed Within the Organisation
Government Agency Validation of Security Solution
Which are the top three of the following features would improve
the level of enterprise security currently deployed on Android
smartphones and tablets used for business purposes within your
organisation?
35%
29%
36%
40%
44%
46%
70%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Email, Messaging, Productivity Suites and Communications
Software Forms Mainstay of Mobile Business App Usage
Mobile Applications
With so many employees using Android devices for work
related tasks it is inevitable they will run a broad mix of
enterprise orientated mobile software to support their
daily activity, and each application is likely to present its
own security challenges and requirements.
The most widely used applications accessed from
Android smartphones and tablets were reported as email
clients and messaging tools (28%), closely followed
by cloud based productivity suites (20%), examples of
which include Microsoft Office365 or Google Docs, and
which both incorporate email and messaging elements of
their own.
Communication and collaboration between colleagues,
business partners and customers using Android mobile
devices is a recurrent theme, with 19% of those polled
also indicating organisation-wide use of conferencing
tools which may include GoToMeeting, Skype and
WebEx.
A smaller percentage also use Android smartphones and
tablets to access customer relationship management
(CRM) and enterprise resource planning (ERP)
applications, traditionally favoured by sales staff who
spend large amounts of time out of the office. An
equal number (9%) either replicate their entire desktop
environment or specific applications by logging into
centrally hosted virtual desktop or application images
provided by platforms such as Citrix XenDesktop/
XenApp or Oracle’s Virtual Desktop Client.
Enterprise IT departments and employees need to bear
in mind that these and many other applications are
vulnerable to exploitation by hackers and unauthorised
users, and take steps to implement appropriate security
measures to protect themselves and their organisation
from the loss of sensitive commercial information which
is often subject to national laws and industry regulation
around data protection.
28%
20%
19%
9%
9%
9%
7%
Email/Messaging Apps
Cloud Based Productivity Suites
Communication, Video/Audio Conferencing and Collaboration
Hosted Virtual Desktop Environments or Applications
Customer Relationship Management (CRM) or Enterprise Resource
Planning (ERP) Applications
Web Browsers
File Synchronisation Software
Android Mobile Security for Enterprise
What business applications do employees within your organisation
typically access from Android smartphones and tablets?Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Importance of Validating Enterprise Security Solutions
Against Government Requirements is Widely Recognised
For many organisations, particularly central or local
government departments or their business partners
and suppliers, compliance with formal IT security
policies which include the mobile devices used by their
employees is mandatory.
Organisations across the three territories certainly
appear to see a clear imperative for matching enterprise
security provision against security certification
frameworks and/or guidance outlined by government
bodies, but this does not take precedence in most cases.
The vast majority of those polled (99%) believe it is
important to know that any enterprise security solution
meets national government requirements such as those
set out by the US DoD, Australian ASD or the UK NTAIA
for example, but a much smaller number (9%) see this as
a priority.
Respondents in the US appear particularly keen on
co-operation with government data security certification
initiatives with a much higher percentage (18%) reporting
this as significantly important, much higher than those in
Australia (2%) and the UK (6%).
Relevant data security frameworks in the US include
the Defense Federal Acquisition Regulation Supplement
(DFARS) which insists that minimum data protection
levels be implemented by both US and foreign
companies acting as Department of Defence contractors.
The Digital Services Advisory Group and Federal Chief
Information Officers Council has also issued security
toolkit covering bring your own device (BYOD) polices
for both federal government agency and the contractors
they employ which demand that smartphones and tablets
brought onto government premises have appropriate
user authentication controls, password policies, remote
wipe features and root kit protection.
The Australian Signals Directorate has published advice
on risk management for companies implementing
BYOD schemes designed to protect against sensitive
data being lost or compromised, and approved KNOX
enabled mobile devices certified under the Mobile Device
Fundamentals Protection Profile (MDFPP) standard for
use by Australian government employees to unclassified
or dissemination limiting marker (DLM) level. The UK CESG issues security guidance for specific
mobile devices to government departments, including those running Android and Samsung KNOX
devices specifically.
While the number rating compliance with these security certifications as significantly important is
low at 9%, it is important to remember that imperative will vary considerably from one company to
another according to a variety of factors, including vertical sector, the precise security requirements
of public sector partners, the type of data and applications accessed from employee mobile devices,
and the penalties imposed for non-compliance.
Government Security Compliance
Android Mobile Security for Enterprise
How important is it to know an enterprise security solution has met
requirements such as those set out by the US Department of Defence
or UK national technical authority for information assurance ?
Somewhat
Important
Significantly
Important
Not
Important
at All
91% 9% 1%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Majority of Respondents Ambivalent Towards Default
Android Security Options
Security Confidence
Despite so many organisations appearing to use default
Android OS security features as the sole basis for their
enterprise Android security protection policies, it is not
clear if these are perceived to offer the best match for
enterprise data and application security requirements
when used in isolation.
The vast majority of respondents displayed what is best
described as ambivalence in this respect - 93% said that
their organisations were neither likely nor unlikely to trust
default security options alone.
The most obvious explanation for this finding is that
those polled are not sufficiently aware of the specific
security capabilities available within the Android OS to
make a reasoned assessment on whether using them in
isolation can meet their organisation’s requirements or
not, and/or that they may be unfamiliar with the specific
security metrics set by their IT departments.
The figure is lower for those respondents from the
US (82%), where 10% said they were very likely to
trust default Android security options and 6% unlikely,
indicating there may at least be a greater awareness
of Android capabilities in this territory and the extent to
which they match top down mobile security requirements
if at all.
The default security options provided in Google’s latest
Android 5.0 Lollipop OS were upgraded in early 2015,
but remain largely focussed on user identification and
authentication techniques rather than MDM features,
application specific VPNs, government certified security
certifications, secure mobile boot capabilities or virtual
containers that separate business from personal profiles,
for example.
Existing pattern, personal identification number (PIN)
and password options have been supplemented with
new Smart Lock features that employ facial recognition
technology, global positioning system (GPS) technology
to link the device’s location to the users home or office,
and the ability to wirelessly pair the smartphone or tablet
with another portable device (such as an NFC tag) to
verify the user’s identity.
Lollipop also provides remote wipe features and 128-bit AES full disk encryption (FDE) to encrypt
all of the user data on the device, though it cannot be applied selectively to specific data sets or
applications and relies heavily on the strength of its disk encryption passphrase for its effectiveness.
Neither Likely or
Unlikely
Very Likely Unlikely Likely
Android Mobile Security for Enterprise
How likely is your organisation to trust the default security options
within the Android mobile operating system alone to support its
enterprise data and application security requirements?
93% 3% 2% 1%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Samsung Considered Leader in Enhancing Android
Security Provision
Integral support for additional mobile security capabilities
beyond that provided by the Android OS itself varies
considerably from one manufacturer to another. Samsung
is one company with a strong reputation for building
security features into Android smartphones and tablets
and is perceived to be a leader in this field by over three
quarters (77%) of respondents on aggregate.
Significantly more organisations in the US (92%)
see Samsung as a leader compared to those in both
Australia (69%) and the UK (70%), whilst Lenovo - which
completed its $2.9bn acquisition of Motorola Mobility from
Google in 2014 - is rated for Android security by a larger
number of companies employing 10,000 people or more
(14%) compared to the aggregate figure (7%).
Samsung introduced the first version of its enterprise
grade mobile security platform, KNOX, in 2013. KNOX
initially incorporated Security Enhanced (SE) Android
tools which separated personal and business data and
applications into different containers, distributed business
profiles and provided data encryption, remote wipe and
browser/camera locking functions.
Upgraded in 2014, KNOX 2.0 added additional features
which are not found in default versions of the Android
OS. These include TrustZone protected certificate
management, a universal MDM client and support for
fingerprint scanner biometric authentication, split billing,
and multi-vendor VPNs integrated with containerisation
platform, single sign on directory services, an authorised
market place from which employees can download secure
apps and customisation options.
KNOX enabled mobile devices have also been approved
for use by a range of national government bodies which
are particularly sensitive to potential issues caused by lost
data and unauthorised system access. These include the
US Department of Defence and National Security Agency
(NSA), as well as the Australian Signals Directorate (ASD)
intelligence agency and the UK Certified Cyber Security
Consultancy (CESG) - the information arm of Government
Communications Headquarters (GCHQ) and the National
Technical Authority for Information Assurance (NTAIA) -
which offers security guidance and support to government
departments.
Secure Android Handsets
Samsung
HTC
Lenovo
LG
Huawei
Android Mobile Security for Enterprise
Which Android manufacturer have you considered as the leading
company to enhance Android security?
77%
10%
7%
5%
1%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
Conclusion
Conclusion
Android smartphones and tablets are used extensively
for business purposes across Australia, the UK and
the US, with 55% of those polled by the IDG Connect
survey estimating that over half of workers within their
organisation use them to run a broad mix of enterprise
orientated software applications, including email and
messaging tools, cloud based productivity suites and
various communication and collaboration platforms.
That level of mobile device and application usage
inevitably demands adequate security protection and
safeguarding sensitive commercial data including
customer information, financial transactions and user
authentication details is the foremost consideration
during Android device deployment decisions. Application
and data security was seen as the most important
factor amongst those surveyed, with mobile device
management (MDM) features, cost and an application
ecosystem that delivers a broad range of business
applications for use on mobile devices also rated highly.
Yet 93% of respondents were unable to provide a
definitive assessment as to how likely their employers
were to trust the default security options embedded
within the Android mobile operating system to support
those requirements, suggesting many may have little or
no knowledge of precise security capabilities or of any
enterprise data and application security obligations set
out by their IT departments.
In some cases then, there may well be a gap between
current Android enterprise security provision and
requirements which third party suppliers - including
Samsung which is already recognised as a leader in
this field by 77% of those polled - can fill with enterprise
mobile security and management platforms such as
KNOX.
Android Mobile Security for Enterprise
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion

More Related Content

What's hot

Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
Finding their way: Corporates, governments and data privacy in Asia
Finding their way: Corporates, governments and data privacy in AsiaFinding their way: Corporates, governments and data privacy in Asia
Finding their way: Corporates, governments and data privacy in AsiaThe Economist Media Businesses
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareChromeInfo Technologies
 
Increasing effectiveness, efficiency & mobility of field employees with wirel...
Increasing effectiveness, efficiency & mobility of field employees with wirel...Increasing effectiveness, efficiency & mobility of field employees with wirel...
Increasing effectiveness, efficiency & mobility of field employees with wirel...JTOX
 
Enterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APACEnterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APACResearchFox
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security SurveyBee_Ware
 
Enterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for EuropeEnterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for EuropeResearchFox
 
RISKS AND REWARDS OF ADDING AR TO CONNECTED DEVICES
RISKS AND REWARDS OF ADDING AR TO CONNECTED DEVICESRISKS AND REWARDS OF ADDING AR TO CONNECTED DEVICES
RISKS AND REWARDS OF ADDING AR TO CONNECTED DEVICESCarlaGalindez2
 
CompTIA Security Study [Report]
CompTIA  Security Study [Report]CompTIA  Security Study [Report]
CompTIA Security Study [Report]Assespro Nacional
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
Enterprise Firewall Market - Outlook (2017-21) for South America
Enterprise Firewall Market - Outlook (2017-21) for South AmericaEnterprise Firewall Market - Outlook (2017-21) for South America
Enterprise Firewall Market - Outlook (2017-21) for South AmericaResearchFox
 
Enterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North AmericaEnterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North AmericaResearchFox
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2jmariani14
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Datafield
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...TELKOMNIKA JOURNAL
 
Global Challengers 2018: Digital Leapfrogs
Global Challengers 2018: Digital LeapfrogsGlobal Challengers 2018: Digital Leapfrogs
Global Challengers 2018: Digital LeapfrogsBoston Consulting Group
 

What's hot (20)

Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Finding their way: Corporates, governments and data privacy in Asia
Finding their way: Corporates, governments and data privacy in AsiaFinding their way: Corporates, governments and data privacy in Asia
Finding their way: Corporates, governments and data privacy in Asia
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
Increasing effectiveness, efficiency & mobility of field employees with wirel...
Increasing effectiveness, efficiency & mobility of field employees with wirel...Increasing effectiveness, efficiency & mobility of field employees with wirel...
Increasing effectiveness, efficiency & mobility of field employees with wirel...
 
Enterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APACEnterprise Firewall Market - Outlook (2017-21) for APAC
Enterprise Firewall Market - Outlook (2017-21) for APAC
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
Enterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for EuropeEnterprise Firewall Market - Outlook (2017-21) for Europe
Enterprise Firewall Market - Outlook (2017-21) for Europe
 
RISKS AND REWARDS OF ADDING AR TO CONNECTED DEVICES
RISKS AND REWARDS OF ADDING AR TO CONNECTED DEVICESRISKS AND REWARDS OF ADDING AR TO CONNECTED DEVICES
RISKS AND REWARDS OF ADDING AR TO CONNECTED DEVICES
 
CompTIA Security Study [Report]
CompTIA  Security Study [Report]CompTIA  Security Study [Report]
CompTIA Security Study [Report]
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Enterprise Firewall Market - Outlook (2017-21) for South America
Enterprise Firewall Market - Outlook (2017-21) for South AmericaEnterprise Firewall Market - Outlook (2017-21) for South America
Enterprise Firewall Market - Outlook (2017-21) for South America
 
Enterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North AmericaEnterprise Firewall Market - Outlook (2017-21) for North America
Enterprise Firewall Market - Outlook (2017-21) for North America
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928
 
Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...Security risk analysis of bring your own device system in manufacturing compa...
Security risk analysis of bring your own device system in manufacturing compa...
 
Global Challengers 2018: Digital Leapfrogs
Global Challengers 2018: Digital LeapfrogsGlobal Challengers 2018: Digital Leapfrogs
Global Challengers 2018: Digital Leapfrogs
 

Similar to White paper balance between embedded operating system security features and additional hardware software based protection needs

Enterprise endpoint security_market
Enterprise endpoint security_marketEnterprise endpoint security_market
Enterprise endpoint security_marketpallavi_1234
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...IRJET Journal
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...IMARC Group
 
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...Mindbowser Inc
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Rick Bouter
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
 
Melbourne ICT Scorecard
Melbourne ICT ScorecardMelbourne ICT Scorecard
Melbourne ICT ScorecardVishal Sharma
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesCSCJournals
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONIRJET Journal
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Fuji Xerox Australia
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Securityryanfarmer
 
forrester-the-iot-heat-map
forrester-the-iot-heat-mapforrester-the-iot-heat-map
forrester-the-iot-heat-mapDennis McCain
 

Similar to White paper balance between embedded operating system security features and additional hardware software based protection needs (20)

Enterprise endpoint security_market
Enterprise endpoint security_marketEnterprise endpoint security_market
Enterprise endpoint security_market
 
Get Ready for Wearables at Work
Get Ready for Wearables at WorkGet Ready for Wearables at Work
Get Ready for Wearables at Work
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
Melbourne ICT Scorecard
Melbourne ICT ScorecardMelbourne ICT Scorecard
Melbourne ICT Scorecard
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
 
White Paper - Android Security
White Paper - Android SecurityWhite Paper - Android Security
White Paper - Android Security
 
forrester-the-iot-heat-map
forrester-the-iot-heat-mapforrester-the-iot-heat-map
forrester-the-iot-heat-map
 

More from Javier Gonzalez

The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0Javier Gonzalez
 
Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3Javier Gonzalez
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for workJavier Gonzalez
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0Javier Gonzalez
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
Android security maximized by samsung knox
Android security maximized by samsung knoxAndroid security maximized by samsung knox
Android security maximized by samsung knoxJavier Gonzalez
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14Javier Gonzalez
 
Knox workspace samsung knox
Knox workspace   samsung knoxKnox workspace   samsung knox
Knox workspace samsung knoxJavier Gonzalez
 
Knox shared device samsung knox
Knox shared device   samsung knoxKnox shared device   samsung knox
Knox shared device samsung knoxJavier Gonzalez
 
Knox premium samsung knox
Knox premium   samsung knoxKnox premium   samsung knox
Knox premium samsung knoxJavier Gonzalez
 
Knox express samsung knox
Knox express   samsung knoxKnox express   samsung knox
Knox express samsung knoxJavier Gonzalez
 
Easyon pad mobile world congress
Easyon pad   mobile world congressEasyon pad   mobile world congress
Easyon pad mobile world congressJavier Gonzalez
 
El turista digital revoluciona la industria de los viajes
El turista digital revoluciona la industria de los viajesEl turista digital revoluciona la industria de los viajes
El turista digital revoluciona la industria de los viajesJavier Gonzalez
 

More from Javier Gonzalez (20)

The samsung knox platform 0
The samsung knox platform 0The samsung knox platform 0
The samsung knox platform 0
 
Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3Samsung knox uk eud_whitepaper_3
Samsung knox uk eud_whitepaper_3
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Samsung knox and android for work
Samsung knox and android for workSamsung knox and android for work
Samsung knox and android for work
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Android security maximized by samsung knox
Android security maximized by samsung knoxAndroid security maximized by samsung knox
Android security maximized by samsung knox
 
An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14An overview of the samsung knox platform v1 14
An overview of the samsung knox platform v1 14
 
My knox samsung knox
My knox   samsung knoxMy knox   samsung knox
My knox samsung knox
 
Knox workspace samsung knox
Knox workspace   samsung knoxKnox workspace   samsung knox
Knox workspace samsung knox
 
Knox shared device samsung knox
Knox shared device   samsung knoxKnox shared device   samsung knox
Knox shared device samsung knox
 
Knox premium samsung knox
Knox premium   samsung knoxKnox premium   samsung knox
Knox premium samsung knox
 
Knox express samsung knox
Knox express   samsung knoxKnox express   samsung knox
Knox express samsung knox
 
Easyon pad mobile world congress
Easyon pad   mobile world congressEasyon pad   mobile world congress
Easyon pad mobile world congress
 
El turista digital revoluciona la industria de los viajes
El turista digital revoluciona la industria de los viajesEl turista digital revoluciona la industria de los viajes
El turista digital revoluciona la industria de los viajes
 
Easyoncar
EasyoncarEasyoncar
Easyoncar
 
Hotel
HotelHotel
Hotel
 
Home
HomeHome
Home
 
Museum parkes
Museum parkesMuseum parkes
Museum parkes
 
Destinationshortes
DestinationshortesDestinationshortes
Destinationshortes
 

Recently uploaded

哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (7)

哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 

White paper balance between embedded operating system security features and additional hardware software based protection needs

  • 1. Organisations in Australia, the UK and the US can Benefit from Android Security Features Which Extend Beyond Native Operating System Capabilities Survey conducted by IDG Connect on behalf of Samsung IDG Connect is the demand generation division of International Data Group (IDG), the world's largest technology media company. Established in 2006, it utilises access to 38 million business decision makers' details to unite technology marketers with relevant targets from 137 countries around the world. Committed to engaging a disparate global IT audience with truly localised messaging, IDG Connect also publishes market specific thought leadership papers on behalf of its clients, and produces research for B2B marketers worldwide. Role: Solution Buyer/Decision Maker Organisation Size: Enterprise Region: United States, United Kingdom and Australia Buying Stage: Business Case Development Android Mobile Security for Enterprise Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 2. Summary of Research Android Mobile Security for Enterprise Infographic Summary Ability to encrypt data at rest and in transit, secure mobile boot and two- factor authentication identified as biggest potential Android security improvements In 55% of organisations, over half of employees use Android devices for business purposes Most organisations utilise default Android security options rather than third party applications or services Android Usage Default Security Options Desired Security Features Default Android OS Security Features Third Party Security Software Application External, Hosted Mobile Security Service Device Hardware Embedded Security Tool 93% 4% 2% 1% On Device Application and Data Encryption 70% Application Specific Virtual Private Networks 46% Secure Mobile Boot Capabilities 44% Single Sign- On/Biometric/ Smart Card User Authentication 40% On Device Virtual Container to Separate Personal from Business Profile 36% Integration with MDM Platforms Already Deployed Within the Organisation 35% Government Agency Validation of Security Solution 29% 17% 28% 36% 19% Up to 25% 26-50% 51-75% Over 75% Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 3. Introduction Enterprise mobile usage has accelerated sharply over the last five years as the emergence of powerful, large screen smartphones and tablets coupled with a parallel expansion of high speed wireless WiFi, 3G/4G networks have improved employees’ ability to access a broad range of business applications and data from wherever they happen to be. The benefits of that trend in terms of business flexibility and worker productivity are incontrovertible, but it has also presented significant challenges to IT departments responsible for deploying, configuring and managing large numbers of staff issued or owned mobile devices. The requirement to maintain adequate security on Google Android devices is especially acute given that up to 80% of smartphones shipped in the last few years are pre-installed with the operating system. A large portion of those handsets are finding their way into business environments, so it is vital that IT departments find ways to protect the integrity of the data stored on, and accessed by, Android devices - more so considering the increased volume of malware and viruses now being targeted specifically at mobile operating systems and the opportunities for unauthorised access due to lost or stolen devices, and unsecured networks those operating systems present. IDG Connect interviewed around 150 people based in Australia, the UK and the US to build up a more detailed picture of how they approach security provision for Android devices used for business activity within their organisation. All of those polled worked for companies employing 1,000 people or more and 55% over 5,000, with 71% holding IT management related roles such as administrators, directors, chief technology/information/ security officers and business managers and board room executives making up the remainder. The largest contingent (20%) came from the software and computer services industry, followed by key verticals including health, medical and pharmaceutical (13%), finance and investment (11%), manufacturing (9%) and retail (7%). The results gauge the current scale of their Android smartphone and tablet usage, identifies the applications most commonly accessed and attempts to assess the extent to which enterprises are content to rely solely on the default security tools embedded within the Android OS as standard. It also identifies which additional security mechanisms or services are most likely to be on their wish lists and judges what smartphone and tablet manufacturers are considered to offer more robust platforms for extra protection. Introduction Android Mobile Security for Enterprise Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 4. Business Android Usage Android smartphones and tablets are widely used for work related tasks across Australia, the UK and the US. Of those taking part in the IDG Connect survey 55% estimated that over half of the employees working within their organisation use them for business purposes as growing numbers of staff look to improve their productivity by remotely accessing data and applications from locations outside of the office. Almost a fifth (19%) of those polled on aggregate reported large scale rollouts of Android devices to employees, reporting that they were used for business purposes by over 75% of the employees working at, or for, their companies. This number was marginally lower in the US specifically (14%) which conversely recorded the highest number (34%) of organisations where Android devices are used by 25-50% of employees. The findings confirm that penetration of Android devices is widespread in business environments, with sales forecasts from research company IDC and others indicating that penetration will expand further in the next few years. IDC estimates that a total of 334.4m smartphones were shipped worldwide in the first quarter of 2015, for example, up 16% from 288.3m year on year, with over three quarters of those devices (78%) being Android smartphones. Research firm Gartner posits similar figures, suggesting that 336m smartphones were sold in Q1 2015, 79% of which were Android devices, though that market share was down almost 2% on Q1 2014. IDC has also forecast that that global smartphone sales will continue to grow over the next four years, albeit at a slower compound annual growth rate (CAGR) of 5% compared to previous years. Australia, the UK and the US account for a significant portion of global sales between them. IDC’s Worldwide Quarterly Mobile Phone Tracker estimates that the US will account for 11.8% of all smartphone sales in 2015, with the UK 2.4%. Android Mobile Security for Enterprise Over Half of Employees use Android Devices for Business Purposes in 55% of Organisations What percentage (%) employees at your organisation currently use Android smartphones or tablets for work related tasks? 28% 17% 36% 19% Over 75% 51-75% 26-50% Up to 25% Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 5. Application/Data Security and Mobile Device Management Needs Most Likely to Dictate Investment Priorities The ongoing need to protect the integrity of sensitive commercial information and user authentication details remains foremost in enterprise buyers’ minds when it comes to choosing which mobile devices are deployed across their workforce and/or allowed to access enterprise networks, applications and data stores. This is reflected in the survey’s finding that application and data security is the factor considered most important in influencing any management decision to deploy Android devices for business usage (weighted at 88% by those polled). Mobile device management (MDM) features (76%), cost (72%) and support for a broad application ecosystem (69%) that provides a wide choice of business software for use on mobile devices are given roughly equal weighting by the survey base on aggregate. Those same MDM features (82%), cost (80%) and application ecosystem support (76%) are considered more important to procurement strategies by larger companies employing 10,000 people or more, and there are regional differences: fewer people in the UK rate the importance of MDM features (68%) and application ecosystem support (62%) than those in Australia and the US, for example. Nor is the strong current focus on application and data security likely to change in the future - almost all of those polled (98%) additionally predicted that it would represent the single most important factor influencing investment in Android smartphone or tablets for business purposes two years down the line. Security Foremost Concern Application and Data Security 88% Mobile Device Management Features 76% Cost 72% Application Ecosystem 69% My Organisation Does Not Trust Android Mobile Devices for Business Purposes 42% Android Mobile Security for Enterprise Please rate the importance of the following factors which would influence your organisation’s decision to deploy Android smartphones or tablets for business usage? X Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 6. Most Organisations Utilise Default Android Security Options Rather than Third Party Applications or Services Despite their present and future focus on application and data security, few organisations in Australia, the UK and the US currently employ any security tools beyond those already available within the Android operating system. When asked to identify one method harnessed to provide mobile security on Android devices used for business purposes, 93% reported that they relied on the default security features built into the OS itself. There was again some regional variation amongst the survey base, with those in Australia showing a preference for both third party security software (8%) and hosted mobile security services (4%) which was slightly above the aggregate. At face value this finding may suggest that almost all believe that their organisations are satisfied with the level of mobile security protection that the Android OS provides to meet current requirements. But it is also possible that some respondents remain either unaware of the precise features or functions which have been deployed and/or have been given no reason to suppose that their organisation has sufficient motivation to supplement default Android security provision with additional layers of mobile protection using third party software or services. As we will see later in this paper, the same number (93%) appear vague on whether default Android options security match their business security requirements or not (Tab 10) – another indication that they may not be aware of what those Android security capabilities are, or how they measure up against security frameworks set out by their IT departments. Current Android Security 93% 4% 2% 1% Default Android OS Security Features Third Party Security Software Application External, Hosted Mobile Security Service Device Hardware Embedded Security Tool Android Mobile Security for Enterprise How does your organisation currently deliver enterprise security on Android devices?Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 7. Ability to Encrypt Data at Rest and in Transit Identified as Biggest Potential Android Security Improvement In contrast to their acceptance and usage of default Android OS security options as the mainstay of their current enterprise mobile security provision, organisations in Australia, the UK and the US have very clear ideas on how best to harden current Android security protection. On device application and data encryption is seen as the approach most likely to improve security levels currently implemented on Android devices used for business purposes by 70% of those polled, further identified as the single most important technology by 94% on aggregate. More organisations in the UK rated encryption as particular source of potential security improvement (76%) with 100% additionally considering it most important within two years’ time. The ability to protect data in transit as well as at rest on Android devices is another important priority for many companies, with application specific virtual private networks (VPNs – those that set up encrypted communication sessions with individual remote applications without affecting the operations of other applications) cited as a top three feature by 46% of respondents on aggregate. The benefits of secure mobile boot capabilities which safeguard sensitive data and user login details stored on Android smartphones and tablets by preventing unauthorised access if they are lost or stolen were also acknowledged by 44%. Whilst they were cited as a top three feature by a lower number of respondents many of those polled also highlighted single sign on, biometric and smart card authentication tools (40%) as potential areas of Android security improvement, alongside on device virtual containers which separate personal from business profiles (36%) and integration with MDM platforms. Desired Security Features Android Mobile Security for Enterprise On Device Application and Data Encryption Application Specific Virtual Private Networks Secure Mobile Boot Capabilities Single Sign-On/Biometric/Smart Card User Authentication On Device Virtual Container to Separate Personal from Business Profile Integration with MDM Platforms Already Deployed Within the Organisation Government Agency Validation of Security Solution Which are the top three of the following features would improve the level of enterprise security currently deployed on Android smartphones and tablets used for business purposes within your organisation? 35% 29% 36% 40% 44% 46% 70% Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 8. Email, Messaging, Productivity Suites and Communications Software Forms Mainstay of Mobile Business App Usage Mobile Applications With so many employees using Android devices for work related tasks it is inevitable they will run a broad mix of enterprise orientated mobile software to support their daily activity, and each application is likely to present its own security challenges and requirements. The most widely used applications accessed from Android smartphones and tablets were reported as email clients and messaging tools (28%), closely followed by cloud based productivity suites (20%), examples of which include Microsoft Office365 or Google Docs, and which both incorporate email and messaging elements of their own. Communication and collaboration between colleagues, business partners and customers using Android mobile devices is a recurrent theme, with 19% of those polled also indicating organisation-wide use of conferencing tools which may include GoToMeeting, Skype and WebEx. A smaller percentage also use Android smartphones and tablets to access customer relationship management (CRM) and enterprise resource planning (ERP) applications, traditionally favoured by sales staff who spend large amounts of time out of the office. An equal number (9%) either replicate their entire desktop environment or specific applications by logging into centrally hosted virtual desktop or application images provided by platforms such as Citrix XenDesktop/ XenApp or Oracle’s Virtual Desktop Client. Enterprise IT departments and employees need to bear in mind that these and many other applications are vulnerable to exploitation by hackers and unauthorised users, and take steps to implement appropriate security measures to protect themselves and their organisation from the loss of sensitive commercial information which is often subject to national laws and industry regulation around data protection. 28% 20% 19% 9% 9% 9% 7% Email/Messaging Apps Cloud Based Productivity Suites Communication, Video/Audio Conferencing and Collaboration Hosted Virtual Desktop Environments or Applications Customer Relationship Management (CRM) or Enterprise Resource Planning (ERP) Applications Web Browsers File Synchronisation Software Android Mobile Security for Enterprise What business applications do employees within your organisation typically access from Android smartphones and tablets?Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 9. Importance of Validating Enterprise Security Solutions Against Government Requirements is Widely Recognised For many organisations, particularly central or local government departments or their business partners and suppliers, compliance with formal IT security policies which include the mobile devices used by their employees is mandatory. Organisations across the three territories certainly appear to see a clear imperative for matching enterprise security provision against security certification frameworks and/or guidance outlined by government bodies, but this does not take precedence in most cases. The vast majority of those polled (99%) believe it is important to know that any enterprise security solution meets national government requirements such as those set out by the US DoD, Australian ASD or the UK NTAIA for example, but a much smaller number (9%) see this as a priority. Respondents in the US appear particularly keen on co-operation with government data security certification initiatives with a much higher percentage (18%) reporting this as significantly important, much higher than those in Australia (2%) and the UK (6%). Relevant data security frameworks in the US include the Defense Federal Acquisition Regulation Supplement (DFARS) which insists that minimum data protection levels be implemented by both US and foreign companies acting as Department of Defence contractors. The Digital Services Advisory Group and Federal Chief Information Officers Council has also issued security toolkit covering bring your own device (BYOD) polices for both federal government agency and the contractors they employ which demand that smartphones and tablets brought onto government premises have appropriate user authentication controls, password policies, remote wipe features and root kit protection. The Australian Signals Directorate has published advice on risk management for companies implementing BYOD schemes designed to protect against sensitive data being lost or compromised, and approved KNOX enabled mobile devices certified under the Mobile Device Fundamentals Protection Profile (MDFPP) standard for use by Australian government employees to unclassified or dissemination limiting marker (DLM) level. The UK CESG issues security guidance for specific mobile devices to government departments, including those running Android and Samsung KNOX devices specifically. While the number rating compliance with these security certifications as significantly important is low at 9%, it is important to remember that imperative will vary considerably from one company to another according to a variety of factors, including vertical sector, the precise security requirements of public sector partners, the type of data and applications accessed from employee mobile devices, and the penalties imposed for non-compliance. Government Security Compliance Android Mobile Security for Enterprise How important is it to know an enterprise security solution has met requirements such as those set out by the US Department of Defence or UK national technical authority for information assurance ? Somewhat Important Significantly Important Not Important at All 91% 9% 1% Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 10. Majority of Respondents Ambivalent Towards Default Android Security Options Security Confidence Despite so many organisations appearing to use default Android OS security features as the sole basis for their enterprise Android security protection policies, it is not clear if these are perceived to offer the best match for enterprise data and application security requirements when used in isolation. The vast majority of respondents displayed what is best described as ambivalence in this respect - 93% said that their organisations were neither likely nor unlikely to trust default security options alone. The most obvious explanation for this finding is that those polled are not sufficiently aware of the specific security capabilities available within the Android OS to make a reasoned assessment on whether using them in isolation can meet their organisation’s requirements or not, and/or that they may be unfamiliar with the specific security metrics set by their IT departments. The figure is lower for those respondents from the US (82%), where 10% said they were very likely to trust default Android security options and 6% unlikely, indicating there may at least be a greater awareness of Android capabilities in this territory and the extent to which they match top down mobile security requirements if at all. The default security options provided in Google’s latest Android 5.0 Lollipop OS were upgraded in early 2015, but remain largely focussed on user identification and authentication techniques rather than MDM features, application specific VPNs, government certified security certifications, secure mobile boot capabilities or virtual containers that separate business from personal profiles, for example. Existing pattern, personal identification number (PIN) and password options have been supplemented with new Smart Lock features that employ facial recognition technology, global positioning system (GPS) technology to link the device’s location to the users home or office, and the ability to wirelessly pair the smartphone or tablet with another portable device (such as an NFC tag) to verify the user’s identity. Lollipop also provides remote wipe features and 128-bit AES full disk encryption (FDE) to encrypt all of the user data on the device, though it cannot be applied selectively to specific data sets or applications and relies heavily on the strength of its disk encryption passphrase for its effectiveness. Neither Likely or Unlikely Very Likely Unlikely Likely Android Mobile Security for Enterprise How likely is your organisation to trust the default security options within the Android mobile operating system alone to support its enterprise data and application security requirements? 93% 3% 2% 1% Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 11. Samsung Considered Leader in Enhancing Android Security Provision Integral support for additional mobile security capabilities beyond that provided by the Android OS itself varies considerably from one manufacturer to another. Samsung is one company with a strong reputation for building security features into Android smartphones and tablets and is perceived to be a leader in this field by over three quarters (77%) of respondents on aggregate. Significantly more organisations in the US (92%) see Samsung as a leader compared to those in both Australia (69%) and the UK (70%), whilst Lenovo - which completed its $2.9bn acquisition of Motorola Mobility from Google in 2014 - is rated for Android security by a larger number of companies employing 10,000 people or more (14%) compared to the aggregate figure (7%). Samsung introduced the first version of its enterprise grade mobile security platform, KNOX, in 2013. KNOX initially incorporated Security Enhanced (SE) Android tools which separated personal and business data and applications into different containers, distributed business profiles and provided data encryption, remote wipe and browser/camera locking functions. Upgraded in 2014, KNOX 2.0 added additional features which are not found in default versions of the Android OS. These include TrustZone protected certificate management, a universal MDM client and support for fingerprint scanner biometric authentication, split billing, and multi-vendor VPNs integrated with containerisation platform, single sign on directory services, an authorised market place from which employees can download secure apps and customisation options. KNOX enabled mobile devices have also been approved for use by a range of national government bodies which are particularly sensitive to potential issues caused by lost data and unauthorised system access. These include the US Department of Defence and National Security Agency (NSA), as well as the Australian Signals Directorate (ASD) intelligence agency and the UK Certified Cyber Security Consultancy (CESG) - the information arm of Government Communications Headquarters (GCHQ) and the National Technical Authority for Information Assurance (NTAIA) - which offers security guidance and support to government departments. Secure Android Handsets Samsung HTC Lenovo LG Huawei Android Mobile Security for Enterprise Which Android manufacturer have you considered as the leading company to enhance Android security? 77% 10% 7% 5% 1% Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion
  • 12. Conclusion Conclusion Android smartphones and tablets are used extensively for business purposes across Australia, the UK and the US, with 55% of those polled by the IDG Connect survey estimating that over half of workers within their organisation use them to run a broad mix of enterprise orientated software applications, including email and messaging tools, cloud based productivity suites and various communication and collaboration platforms. That level of mobile device and application usage inevitably demands adequate security protection and safeguarding sensitive commercial data including customer information, financial transactions and user authentication details is the foremost consideration during Android device deployment decisions. Application and data security was seen as the most important factor amongst those surveyed, with mobile device management (MDM) features, cost and an application ecosystem that delivers a broad range of business applications for use on mobile devices also rated highly. Yet 93% of respondents were unable to provide a definitive assessment as to how likely their employers were to trust the default security options embedded within the Android mobile operating system to support those requirements, suggesting many may have little or no knowledge of precise security capabilities or of any enterprise data and application security obligations set out by their IT departments. In some cases then, there may well be a gap between current Android enterprise security provision and requirements which third party suppliers - including Samsung which is already recognised as a leader in this field by 77% of those polled - can fill with enterprise mobile security and management platforms such as KNOX. Android Mobile Security for Enterprise Home Infographic Summary Introduction Business Android Usage Security Concern Current Android Security Desired Security Features Mobile Applications Government Security Security Confidence Secure Handsets Conclusion