SlideShare a Scribd company logo
1 of 16
Smart mobile devices will find their way to 
nearly two‐thirds of the worlds mobile 
workforce by 2015.
Having to carry two devices represents a clear 
opportunity for a better solution that must 
satisfy the needs of both IT professionals and 
the mobile users they serve.
Mobility ranks among the top enterprise 
priorities during the last year, and that 
enterprises are all set to improve their 
financial investments in the mobile devices, 
applications, middleware and services.
24 March 2014 PARAG DEODHAR 2
Automated 
Workforce 
•Document Management Systems (DMS), Field Force Automation (FFA), 
Salesforce Automation (SFA), Customer Relationship Management 
(CRM), and Enterprise Resource Planning (ERP).
•Minimize  paperwork,  reduce  back‐to‐office visits, improve productivity, 
and achieve higher sales closing ratios by simplifying and automating 
their day‐to‐day processes.
Always 
Connected 
Unified Communications (UC), Location‐based 
Services (LBS), and Business Intelligence (BI). 
Anytime, anywhere, any device real‐time 
communication and collaboration capabilities to 
employees. Enterprises can leverage LBS to track 
vehicles and employees in real‐time, while 
information can be extracted, analyzed and reported 
using BI. 
Pervasive 
Mobility 
Mobile Point‐of‐Sale (MPOS), 
Social Networking Services (SNS), 
Financial Management System 
(FMS)
Human Resource Management 
Systems (HRMS). 
Enhance brand image , facilitate 
efficient administration of internal 
operations 
24 March 2014 PARAG DEODHAR 3
• Consumerization of IT is driving new
devices and access requests
• Companies need to accept and address the 
reality
• People expect to work on multiple devices 
and from anywhere
• Companies need to provide access to 
applications and data from any device
• IT needs to change its processes and tools 
to manage the devices, taking security into 
consideration
PARAG DEODHAR 4
88%
Globally, 88% of 
executives report 
employees are using 
their personal computing 
technologies for business 
purposes today
‐ Gartner 
24 March 2014
The Blame Game – why company provided tools are not used?
– The system is too complicated and takes too long
– External partners have trouble accessing files I sent through company tools
– The company does not offer mobile access – convenience…
– I was never trained to use company systems
Source: Ponemon institute
Survey shows that 
many employees 
use high risk 
methods to store or 
move sensitive 
corporate data.
24 March 2014 PARAG DEODHAR 5
Laptops
Other devices – Tabs / Smart phones
– Company Owned
– BYOD 
• Shared devices
Risks!!!
– Data segregation
– Data Leakage
– Personal Data on device
– Unverified apps
– Lost, Stolen
24 March 2014 PARAG DEODHAR 6
Source: Symantec
24 March 2014 PARAG DEODHAR 7
Source: Checkpoint
HAVE YOU 
CHECKED FOR 
ROGUE WIFI 
NETWORKS IN 
YOUR OFFICE? 
24 March 2014 PARAG DEODHAR 8
Infecting legal web resources
– Mobile malware spreads via popular websites. More and more smartphone 
and tablet owners use their devices to access websites, unaware that even the 
most reputable resources can be hacked.
Distribution via alternative app stores. 
– In Asia there are numerous companies producing Android‐based devices and 
Android apps, and many of them offer users their own app stores containing 
programs that cannot be found in Google Play. The purely nominal control over 
the applications uploaded to these stores means attackers can conceal Trojans 
in apps made to look like innocent games or utilities.
Distribution via botnets.
– Bots self‐proliferate by sending out text messages with a malicious link to 
addresses in the victim’s address book. We also registered one episode of 
mobile malware spreading via a third‐party botnet.
Criminals are increasingly using obfuscation, the deliberate act of 
creating complex code to make it difficult to analyze. The more 
complex the obfuscation, the longer it will take an antivirus solution 
to neutralize the malicious code.
24 March 2014 PARAG DEODHAR 9
Android devices account for 60% of the infections observed in the mobile network. 
Malware is in the form of Trojanized apps with phishing spam campaigns luring 
victims to install the infected apps. 
Reasons:
– Android has largest smartphone market share. Maximize criminal’s RoI.
– Android offers the ability to load apps from third‐party app sites. Un‐policed mechanism 
to distribute their malware.
– It is trivial for an attacker to hijack a legitimate Android application, inject malware into 
it and redistribute it for consumption. There are now binder kits available that will allow 
an attacker to automatically inject malware into an existing application. This is only 
exacerbated by Android’s incredibly weak app signing policy that encourages using self‐
signed certificates to sign applications.
Common Malware:
– Adware
– Information Stealers
– Spy Phone
– SMS Trojans
– Banking Trojans
– Fake Security Software
24 March 2014 PARAG DEODHAR 10
24 March 2014 PARAG DEODHAR 11
Jailbreak Jammers
– Fool the MDM agent by patching the device leaving no trace for 
the MDM agent to detect if the device is Jailbroken or Rooted. 
mRAT
– Gets high privilege access and can access all communications that 
happen on the device, can access all encrypted emails and secure 
highly confidential documents and then sends these content to 
the attacker’s command and control (C&C) servers
– Bypass container encryption – grab the information at the point 
where the user pulls up the data to read it.
Mobile Device Tunnel Borers
– Since the tunnel is typically created on allowed ports (e.g. port 22, 
SSH) it cannot be blocked by Firewalls and or IDS/IPS solution.
24 March 2014 PARAG DEODHAR 12
Corporate Owned
• High Cost = Device  + Management
• Allow personal data – risk of “pirated” 
software / images / videos on corporate 
device
• Generally single OS/brand/model – easy to 
manage but no choice for employees
BYOD
• Increases Productivity – myth or fact?
• Lower cost
• Multiple OS/brands/models to manage
• Employee privacy – does law allow data 
wiping on assets owned by someone else? 
24 March 2014 PARAG DEODHAR 13
MAM
MIM
24 March 2014 PARAG DEODHAR 14
DEVICE
APPLICATION
DATA
• Ability to ensure the proper 
protection around the entire device 
and ensure compliance with the set 
policies.
• Central management of all mobile 
devices and ability to check 
compliance of each device.
• Security around the information is 
an unknown.
• Ability to apply controls becomes 
significantly difficult.
• Monitoring becomes significantly 
difficult.
• Centralized location for data and 
information.
• Ability to access information from 
almost any device and share 
between multiple platforms
• Loss of native apps and the “look 
and feel” of what the user is 
typically accustomed to
• Intrusive management & lock down
• Degraded user experience and 
added troubleshooting 
requirements
• Electronic Discovery difficult.
• Inability to separate personal data 
from company data.
• Containerization.
• Policies are pushed only to the 
container; user experience is not 
impacted for the entire phone.
• Applications within the container 
• Support single‐sign‐on 
COMPLY WITH APPLICABLE LAWS AND REGULATIONS 
FOCUS ON DATA – NOT ON DEVICE
POLICY AND TRAINING / AWARENESS
END USER AGREEMENT
LIST OF ALLOWED DEVICES
CHOOSE THE RIGHT MDM / MAM / MIM SOLUTION
– YOUR ENVIRONMENT & DEVICES
– DATA FLOW AND ACCESS REQUIREMENTS
– CONVENIENCE v/s SECURITY
• CONTAINERIZATION & DEVICE LEVEL POLICIES
• SECURE WIPE
• IDENTITY AND ACCESS
• ENCRYPTION 
– EMPLOYEE PERSONAL DATA PRIVACY
– CORPORATE APP STORE
– INTEGRATION WITH DLP & DRM
MOBILE SECURITY SOLUTIONS 
IMPLEMENT ENHANCED NETWORK SECURITY FOR MOBILE GATEWAYS
TRAIN APPLICATION DEVELOPERS IN SECURE CODING PRACTICES FOR MOBILE DEVICE PLATFORMS
LIMIT THE SENSITIVE DATA TRANSFERRED TO MOBILE  DEVICES, OR CONSIDER VIEW‐ONLY ACCESS.
PERFORM TECHNICAL SECURITY ASSESSMENTS ON MOBILE DEVICES AND THE SUPPORTING 
INFRASTRUCTURE — FOCUS ON DEVICE‐SIDE  DATA STORAGE. 
ESTABLISH A PROGRAM THAT CONTINUALLY EVALUATES NEW AND EMERGING THREATS IN MOBILE PLATFORMS. 
AUDIT THE DEVICES…
24 March 2014 PARAG DEODHAR 15
Securing the mobile enterprise - Sydney 24 Mar 2014

More Related Content

What's hot

MSP Industry Brief - From Break / Fix to Recurring Revenue
MSP Industry Brief - From Break / Fix to Recurring Revenue MSP Industry Brief - From Break / Fix to Recurring Revenue
MSP Industry Brief - From Break / Fix to Recurring Revenue Madeline Titcomb
 
Why MBaaS Now
Why MBaaS NowWhy MBaaS Now
Why MBaaS NowCognizant
 
Personalized, Digital Marketing for Retailers in a Box
Personalized, Digital Marketing for Retailers in a BoxPersonalized, Digital Marketing for Retailers in a Box
Personalized, Digital Marketing for Retailers in a Boxgigantictyro9972
 
How technology is changing the business
How technology is changing the businessHow technology is changing the business
How technology is changing the businessManoj Bhuva
 
Digital Transformation and Power BI
Digital Transformation and Power BIDigital Transformation and Power BI
Digital Transformation and Power BIAniket Kanitkar
 
Mapping an effective location intelligence strategy
Mapping an effective location intelligence strategyMapping an effective location intelligence strategy
Mapping an effective location intelligence strategyThe Marketing Distillery
 
Digital Future of IT Service Providers - Converge Chennai 2015
Digital Future of IT Service Providers - Converge Chennai 2015Digital Future of IT Service Providers - Converge Chennai 2015
Digital Future of IT Service Providers - Converge Chennai 2015Thoughtworks
 
DigiQubeMedia - digital retail solutions
DigiQubeMedia - digital retail solutionsDigiQubeMedia - digital retail solutions
DigiQubeMedia - digital retail solutionsdigiqubemedia
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesCognizant
 
Intergen public sector datasheet
Intergen public sector datasheetIntergen public sector datasheet
Intergen public sector datasheetIntergen
 
Intershop Architecture Product Landscape
Intershop Architecture Product LandscapeIntershop Architecture Product Landscape
Intershop Architecture Product LandscapeMauro Boffardi
 
Creative Intelligence
Creative IntelligenceCreative Intelligence
Creative IntelligenceNadeem Amin
 
Crmnext's AI-driven CRM vs Traditional CRM systems
Crmnext's AI-driven CRM vs Traditional CRM systemsCrmnext's AI-driven CRM vs Traditional CRM systems
Crmnext's AI-driven CRM vs Traditional CRM systemsCRMNEXT
 
Intergen financial sector datasheet
Intergen financial sector datasheetIntergen financial sector datasheet
Intergen financial sector datasheetIntergen
 
Re7 hink performance management (pm) fj
Re7 hink performance management (pm) fjRe7 hink performance management (pm) fj
Re7 hink performance management (pm) fjFriedel Jonker
 
Insurance Mobility Business Strategy: A Roadmap and Implementation Approach
Insurance Mobility Business Strategy: A Roadmap and Implementation ApproachInsurance Mobility Business Strategy: A Roadmap and Implementation Approach
Insurance Mobility Business Strategy: A Roadmap and Implementation ApproachCognizant
 

What's hot (20)

Smart CRM through Smart Internet of Things
Smart CRM through Smart Internet of ThingsSmart CRM through Smart Internet of Things
Smart CRM through Smart Internet of Things
 
I ty x_platform_jw
I ty x_platform_jwI ty x_platform_jw
I ty x_platform_jw
 
MSP Industry Brief - From Break / Fix to Recurring Revenue
MSP Industry Brief - From Break / Fix to Recurring Revenue MSP Industry Brief - From Break / Fix to Recurring Revenue
MSP Industry Brief - From Break / Fix to Recurring Revenue
 
2014 phillyForce keynote
2014 phillyForce keynote2014 phillyForce keynote
2014 phillyForce keynote
 
Why MBaaS Now
Why MBaaS NowWhy MBaaS Now
Why MBaaS Now
 
Personalized, Digital Marketing for Retailers in a Box
Personalized, Digital Marketing for Retailers in a BoxPersonalized, Digital Marketing for Retailers in a Box
Personalized, Digital Marketing for Retailers in a Box
 
How technology is changing the business
How technology is changing the businessHow technology is changing the business
How technology is changing the business
 
Digital Transformation and Power BI
Digital Transformation and Power BIDigital Transformation and Power BI
Digital Transformation and Power BI
 
Mapping an effective location intelligence strategy
Mapping an effective location intelligence strategyMapping an effective location intelligence strategy
Mapping an effective location intelligence strategy
 
Digital Future of IT Service Providers - Converge Chennai 2015
Digital Future of IT Service Providers - Converge Chennai 2015Digital Future of IT Service Providers - Converge Chennai 2015
Digital Future of IT Service Providers - Converge Chennai 2015
 
ServiceFirstdoc
ServiceFirstdocServiceFirstdoc
ServiceFirstdoc
 
DigiQubeMedia - digital retail solutions
DigiQubeMedia - digital retail solutionsDigiQubeMedia - digital retail solutions
DigiQubeMedia - digital retail solutions
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
 
Intergen public sector datasheet
Intergen public sector datasheetIntergen public sector datasheet
Intergen public sector datasheet
 
Intershop Architecture Product Landscape
Intershop Architecture Product LandscapeIntershop Architecture Product Landscape
Intershop Architecture Product Landscape
 
Creative Intelligence
Creative IntelligenceCreative Intelligence
Creative Intelligence
 
Crmnext's AI-driven CRM vs Traditional CRM systems
Crmnext's AI-driven CRM vs Traditional CRM systemsCrmnext's AI-driven CRM vs Traditional CRM systems
Crmnext's AI-driven CRM vs Traditional CRM systems
 
Intergen financial sector datasheet
Intergen financial sector datasheetIntergen financial sector datasheet
Intergen financial sector datasheet
 
Re7 hink performance management (pm) fj
Re7 hink performance management (pm) fjRe7 hink performance management (pm) fj
Re7 hink performance management (pm) fj
 
Insurance Mobility Business Strategy: A Roadmap and Implementation Approach
Insurance Mobility Business Strategy: A Roadmap and Implementation ApproachInsurance Mobility Business Strategy: A Roadmap and Implementation Approach
Insurance Mobility Business Strategy: A Roadmap and Implementation Approach
 

Viewers also liked

Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challengesParag Deodhar
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computingTISEE
 
POJER E SANDRI Vinix 15.08 2011
 POJER E SANDRI Vinix  15.08 2011  POJER E SANDRI Vinix  15.08 2011
POJER E SANDRI Vinix 15.08 2011 Daniel Cerami
 
Twitter for local business
Twitter for local businessTwitter for local business
Twitter for local businessWhizbang
 
Healtheducation 090714065946 Phpapp02
Healtheducation 090714065946 Phpapp02Healtheducation 090714065946 Phpapp02
Healtheducation 090714065946 Phpapp02Nidheesha Manganam
 
FY 2012 Consolidated Results (March 15, 2013)
FY 2012 Consolidated Results (March 15, 2013)FY 2012 Consolidated Results (March 15, 2013)
FY 2012 Consolidated Results (March 15, 2013)Terna SpA
 
Quantitative microbial population characterization to reveal sources of bacte...
Quantitative microbial population characterization to reveal sources of bacte...Quantitative microbial population characterization to reveal sources of bacte...
Quantitative microbial population characterization to reveal sources of bacte...WWNazaroff
 
Carpeta tradicional
Carpeta tradicionalCarpeta tradicional
Carpeta tradicionalCVAugusto
 
Ist storyboard final
Ist storyboard finalIst storyboard final
Ist storyboard finalkayeleanne
 
Associated Partners - Business Profile
Associated Partners - Business ProfileAssociated Partners - Business Profile
Associated Partners - Business ProfileDhananjay Walke
 
1H12 Consolidated Results
1H12 Consolidated Results1H12 Consolidated Results
1H12 Consolidated ResultsTerna SpA
 
BQ-Engg Design Services 2012
BQ-Engg Design Services 2012BQ-Engg Design Services 2012
BQ-Engg Design Services 2012NEERAJ SRIVASTAVA
 
Appropriate healthcare technologies for low resource settings use of m-tech...
Appropriate healthcare technologies  for low resource settings  use of m-tech...Appropriate healthcare technologies  for low resource settings  use of m-tech...
Appropriate healthcare technologies for low resource settings use of m-tech...MobileDiagnosis Non Profit Association
 

Viewers also liked (20)

Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computing
 
MobileDiagnosis 2013
MobileDiagnosis 2013 MobileDiagnosis 2013
MobileDiagnosis 2013
 
POJER E SANDRI Vinix 15.08 2011
 POJER E SANDRI Vinix  15.08 2011  POJER E SANDRI Vinix  15.08 2011
POJER E SANDRI Vinix 15.08 2011
 
Twitter for local business
Twitter for local businessTwitter for local business
Twitter for local business
 
Blanca nelly diaz
Blanca nelly diaz Blanca nelly diaz
Blanca nelly diaz
 
Healtheducation 090714065946 Phpapp02
Healtheducation 090714065946 Phpapp02Healtheducation 090714065946 Phpapp02
Healtheducation 090714065946 Phpapp02
 
Photos
PhotosPhotos
Photos
 
FY 2012 Consolidated Results (March 15, 2013)
FY 2012 Consolidated Results (March 15, 2013)FY 2012 Consolidated Results (March 15, 2013)
FY 2012 Consolidated Results (March 15, 2013)
 
Blanca nelly diaz
Blanca nelly diaz Blanca nelly diaz
Blanca nelly diaz
 
Amazon summit 2015
Amazon summit 2015Amazon summit 2015
Amazon summit 2015
 
Quantitative microbial population characterization to reveal sources of bacte...
Quantitative microbial population characterization to reveal sources of bacte...Quantitative microbial population characterization to reveal sources of bacte...
Quantitative microbial population characterization to reveal sources of bacte...
 
Carpeta tradicional
Carpeta tradicionalCarpeta tradicional
Carpeta tradicional
 
Ist storyboard final
Ist storyboard finalIst storyboard final
Ist storyboard final
 
Associated Partners - Business Profile
Associated Partners - Business ProfileAssociated Partners - Business Profile
Associated Partners - Business Profile
 
Coe rapporto novembre 2014
Coe rapporto novembre 2014Coe rapporto novembre 2014
Coe rapporto novembre 2014
 
Asha
AshaAsha
Asha
 
1H12 Consolidated Results
1H12 Consolidated Results1H12 Consolidated Results
1H12 Consolidated Results
 
BQ-Engg Design Services 2012
BQ-Engg Design Services 2012BQ-Engg Design Services 2012
BQ-Engg Design Services 2012
 
Appropriate healthcare technologies for low resource settings use of m-tech...
Appropriate healthcare technologies  for low resource settings  use of m-tech...Appropriate healthcare technologies  for low resource settings  use of m-tech...
Appropriate healthcare technologies for low resource settings use of m-tech...
 

Similar to Securing the mobile enterprise - Sydney 24 Mar 2014

Mastering Service Management Top Software Solutions for Every Business.pptx
Mastering Service Management Top Software Solutions for Every Business.pptxMastering Service Management Top Software Solutions for Every Business.pptx
Mastering Service Management Top Software Solutions for Every Business.pptxGenic Teams
 
Mobility, at the heart of business
Mobility, at the heart of businessMobility, at the heart of business
Mobility, at the heart of businessGFI Portugal
 
The Top 4 Components of a Leave Management System for 2024.pdf
The Top 4 Components of a Leave Management System for 2024.pdfThe Top 4 Components of a Leave Management System for 2024.pdf
The Top 4 Components of a Leave Management System for 2024.pdfJose thomas
 
Mobile Enterprise Analytics in 60 Minutes
Mobile Enterprise Analytics in 60 MinutesMobile Enterprise Analytics in 60 Minutes
Mobile Enterprise Analytics in 60 MinutesCognizant
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachRapidValue
 
What to look for in a Digital Experience Platform?
What to look for in a Digital Experience Platform?What to look for in a Digital Experience Platform?
What to look for in a Digital Experience Platform?Ruud Kluivers
 
Recoding the Customer Experience
Recoding the Customer ExperienceRecoding the Customer Experience
Recoding the Customer ExperienceCognizant
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperAbhishek Sood
 
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Happiest Minds Technologies
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 
Executive Briefing Business Anywhere Transformed
Executive Briefing   Business Anywhere     TransformedExecutive Briefing   Business Anywhere     Transformed
Executive Briefing Business Anywhere TransformedChris Keaton
 
HTCpro White Paper
HTCpro White PaperHTCpro White Paper
HTCpro White Papersthakkar12
 
8 reasons why your business needs mobile CRM
8 reasons why your business needs mobile CRM8 reasons why your business needs mobile CRM
8 reasons why your business needs mobile CRMSage
 
Enterprise Mobility Apps for SBM
Enterprise Mobility Apps for SBMEnterprise Mobility Apps for SBM
Enterprise Mobility Apps for SBMWirehead Technology
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfJPLoft Solutions
 
Facts about Mobile Enterprise Applications
Facts about Mobile Enterprise ApplicationsFacts about Mobile Enterprise Applications
Facts about Mobile Enterprise Applicationsvlink india
 
Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011fivehmg_m
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-BusinessEyad Almasri
 

Similar to Securing the mobile enterprise - Sydney 24 Mar 2014 (20)

The Individual Enterprise
The Individual EnterpriseThe Individual Enterprise
The Individual Enterprise
 
London 2012 brochure - Smart Mobility
London 2012 brochure - Smart MobilityLondon 2012 brochure - Smart Mobility
London 2012 brochure - Smart Mobility
 
Mastering Service Management Top Software Solutions for Every Business.pptx
Mastering Service Management Top Software Solutions for Every Business.pptxMastering Service Management Top Software Solutions for Every Business.pptx
Mastering Service Management Top Software Solutions for Every Business.pptx
 
Mobility, at the heart of business
Mobility, at the heart of businessMobility, at the heart of business
Mobility, at the heart of business
 
The Top 4 Components of a Leave Management System for 2024.pdf
The Top 4 Components of a Leave Management System for 2024.pdfThe Top 4 Components of a Leave Management System for 2024.pdf
The Top 4 Components of a Leave Management System for 2024.pdf
 
Mobile Enterprise Analytics in 60 Minutes
Mobile Enterprise Analytics in 60 MinutesMobile Enterprise Analytics in 60 Minutes
Mobile Enterprise Analytics in 60 Minutes
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approach
 
What to look for in a Digital Experience Platform?
What to look for in a Digital Experience Platform?What to look for in a Digital Experience Platform?
What to look for in a Digital Experience Platform?
 
Recoding the Customer Experience
Recoding the Customer ExperienceRecoding the Customer Experience
Recoding the Customer Experience
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --Whitepaper
 
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
Executive Briefing Business Anywhere Transformed
Executive Briefing   Business Anywhere     TransformedExecutive Briefing   Business Anywhere     Transformed
Executive Briefing Business Anywhere Transformed
 
HTCpro White Paper
HTCpro White PaperHTCpro White Paper
HTCpro White Paper
 
8 reasons why your business needs mobile CRM
8 reasons why your business needs mobile CRM8 reasons why your business needs mobile CRM
8 reasons why your business needs mobile CRM
 
Enterprise Mobility Apps for SBM
Enterprise Mobility Apps for SBMEnterprise Mobility Apps for SBM
Enterprise Mobility Apps for SBM
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdf
 
Facts about Mobile Enterprise Applications
Facts about Mobile Enterprise ApplicationsFacts about Mobile Enterprise Applications
Facts about Mobile Enterprise Applications
 
Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
 

More from Parag Deodhar

Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Parag Deodhar
 
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Parag Deodhar
 
How to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkHow to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkParag Deodhar
 
BCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentBCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentParag Deodhar
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right postureParag Deodhar
 
Scouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag DeodharScouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag DeodharParag Deodhar
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Defining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationDefining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationParag Deodhar
 
Frauds making fs companies uncompetitive parag deodhar
Frauds making fs companies uncompetitive   parag deodharFrauds making fs companies uncompetitive   parag deodhar
Frauds making fs companies uncompetitive parag deodharParag Deodhar
 
Acfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharAcfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharParag Deodhar
 

More from Parag Deodhar (11)

Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
 
How to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkHow to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC Framework
 
BCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentBCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & Assessment
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right posture
 
Scouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag DeodharScouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag Deodhar
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Defining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationDefining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaboration
 
Frauds making fs companies uncompetitive parag deodhar
Frauds making fs companies uncompetitive   parag deodharFrauds making fs companies uncompetitive   parag deodhar
Frauds making fs companies uncompetitive parag deodhar
 
Acfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharAcfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodhar
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Securing the mobile enterprise - Sydney 24 Mar 2014