In the 3rd quarter of 2014 IBM has completed a survey among mobile security professionals looking at mobile security capabilities deployed by enterprises. Combined with IBM's mobile security framework that spans device, content, application and transactions, IBM was able to create a fact-based maturity model for enterprise mobile security.
View this presentation to learn:
- What are the key requirements for a mature mobile security program
- What are the key current and future areas of investment for enterprises in mobile security
- How IBM capabilities align with these emerging requirements
View the full on-demand webcast: http://securityintelligence.com/events/path-towards-securing-mobile-enterprise/#.VYxa2PlVhBf
30. Summary
• Enterprises are making investments across all pillars of the IBM Mobile
Security Framework, but we are “half way there”
• Current investment focus on device and content security which supports the
BYOD program
• Future investments will address the development of secure mobile applications
end eventually transaction fraud risk
• Use the IBM Mobile Security Framework to build a prioritized roadmap
for your investments in mobile security for your BYOD program,
Employee productivity and Customer Engagement
• Follow this link: http://ibm.com/security/mobile