SlideShare a Scribd company logo
1 of 34
Download to read offline
Forrester Forecasts 2020
Is Your Mobile Strategy Aligned?
Chris Sherman
May 24, 2017
Senior Analyst & Guest Speaker
Forrester Research
Wes Gyure
MaaS360 Portfolio Offering Manager
IBM
2 IBM Security
Housekeeping items
ü Duration – 60 minutes
ü Submit your questions to all
panelists in the Q&A box located in
the bottom right corner of your
screen
ü Recording and slides will be emailed
to you
© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Chris Sherman
Senior Analyst, Forrester Research
Forrester Forecasts 2020
Is Your Mobile Strategy Aligned?
4© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Study demographics
v Online survey of 556 IT and security professionals involved with client, endpoint,
or mobile management and security
v Regions: US, UK, Germany, India and Australia
v Company size: 1,000 or more employees
v Job level: Director and above
v Department: IT/Technology management
v Involvement: Involved with client, endpoint, or mobile management and security
5© 2017 Forrester Research, Inc. Reproduction Prohibited
Enterprises struggle to manage and secure
their endpoint ecosystem
6© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Few organizations have a centralized team to manage
devices
Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017
0%
13%
17%
10%
12%
1%
47%
8%
14%
14%
9%
14%
5%
35%
“Which group within your organization currently is primarily responsible for managing the following?”
5%
9%
9%
12%
16%
22%
27%
Line-of-business (non-IT)
Operational technology (OT)
team
Security operations team
Dedicated traditional endpoint
team
Combined mobile/traditional
endpoint team
Dedicated mobile team
Information technology (IT) team
Smartphones/tablets
N=556
PCs/laptops/hybrid PCs
N=556
Servers
N=556
2%
9%
8%
14%
13%
14%
41%
Internet of Things devices
N=318
7© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017
Device-specific:
Mobile devices; PCs, laptops,
hybrid PCs; servers; and IoT
devices are managed
separately
Device-agnostic:
Controls are focused at the
application and data layers
across all device types,
regardless of endpoint form
factor
“Which of the following best describes your current approach to
managing the different types of devices in use at your organization?”
Device-
agnostic
26%
Device-
specific
74%
Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security
The majority of organizations are taking a
device-specific approach to management
8© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Introducing IoT to the enterprise infrastructure comes
with a host of concerns
“When thinking about IoT, how concerned is your organization with the following?”
56%
63%
63%
63%
65%
67%
68%
68%
70%
72%
74%
77%
Firmware updates
Third-party collection of device usage patterns and data from…
Physical compromise due to IoT device failures
IoT device hardening
Denial of service attacks to intelligent devices
Internal hackers
Lack of authentication and authorization for access to intelligent devices
Managing and analyzing data from IoT devices
Use of things in denial of service attacks
External hackers
Privacy violations
Lack of data leak protection
Very/Extremely concerned
Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017
57% are managing
IoT devices now;
88% predict they
will be managing
IoT devices in
2020
9© 2017 FORRESTER. REPRODUCTION PROHIBITED.
The amount of data from these endpoints has grown
significantly over the past two years
“How has the amount of endpoint data collected by your organization changed over the past 18 to 24 months?”
“How do you predict the amount of endpoint data collected by your organization will change over the next three years?”
Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017
Past 18 to 24 months
9%
56%
35%
Over the next three years
4%
46%
50%
No change Increase(d) by 1% to 49% Increase(d) by 50% or more
10© 2017 Forrester Research, Inc. Reproduction Prohibited
UEM and AI will help turn data into
insights
11© 2017 FORRESTER. REPRODUCTION PROHIBITED.
As the volume of data collected from endpoints increases,
AI/cognitive computing will become a necessity
Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017
Only 36% of companies
use AI/cognitive
computing to analyze
endpoint data today, but
by 2020, over 80% will
“What are your organization’s plans for implementing artificial intelligence/cognitive
computing to analyze endpoint data?”
36%
26%
19%
7%
11%
3%
Currently implemented
Plan to implement within the next 12 months
Plan to implement by 2020
Currently investigating
Interested, but no plans to investigate or implement
No plans
12© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017
Base: 481 IT and security professionals involved with client, endpoint, or mobile management and security at companies who have implemented, plan to
implement, or are investigating AI/cognitive computing
AI/cognitive computing plays a significant role
in endpoint management and security
Q19. “How important a role does – or will – artificial intelligence/cognitive computing play
in your organization’s endpoint management and security strategy?”
3% 2%
19%
14%
54%
46%
22% 37%
None Not that important Somewhat important Very important Critical
76% 83%
Endpoint management Endpoint security
13© 2017 FORRESTER. REPRODUCTION PROHIBITED.
By leveraging AI/cognitive computing, orgs
can improve threat detection and remediation
capabilities . . .
“To what extent has – or could – artificial intelligence/cognitive computing improve(d) your
organization’s capabilities in the following security areas?”
72%
73%
74%
74%
75%
76%
78%
79%
79%
80%
Contextualizing security policies to individuals rather than to
devices, groups or whole organization
Reducing false positives
Remediating threats
Suggesting or automating corrective actions
Analyzing unstructured data from external sources
Identifying false positives
Recognizing patterns in security data that signify threats
Alleviating the cybersecurity skills gap
Increasing security process efficiency
Analyzing threats in real time
Moderate/Significant improvement
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017
Base: 481 IT and security professionals involved with client, endpoint, or mobile management and security at companies who have implemented, plan to
implement, or are investigating AI/cognitive computing
14© 2017 FORRESTER. REPRODUCTION PROHIBITED.
. . . While also bolstering business efficiencies
and insights
“To what extent has – or could – artificial intelligence/cognitive computing improve(d) your
organization’s capabilities in the following productivity or business insight areas?”
71%
74%
75%
75%
76%
76%
76%
76%
76%
77%
77%
81%
Addressing lack of skills to manage mobility
Uncovering insights from external sources about mobility and how…
Addressing lack of headcount to manage mobility
Addressing lack of time to optimize the management of mobility
Optimizing mobile projects
Reducing costs with managing mobility
Providing key business insights to benefit the company
Making data-driven decisions
Analyzing IoT data
Improving user experience for employees and contractors
Uncovering insights from all of the structured data in mobility…
Making our operations and administration more efficient
Some/Significant Improvement
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017
Base: 481 IT and security professionals involved with client, endpoint, or mobile management and security at companies who have implemented, plan to
implement, or are investigating AI/cognitive computing
15© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Unified endpoint management
(UEM) is an approach to
securing and controlling
personal computers (PCs),
smartphones, and tablets in a
connected, cohesive manner
from a single console
31% of organizations will
implement UEM within the
next year; 54% will have it in
place by 2020
Q13. “What are your organization’s plans to implement unified endpoint
management?”
Not implemented and no
plans to evaluate
1%
Interested, but no short-
term plans to evaluate
36%
Currently evaluating
9%
Plan to implement by
2020
23%
Plan to implement within
the next 12 months
16%
Currently implemented
15%
Implementation of UEM will increase as
organizations work toward a more integrated
and device-agnostic management approach
Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017
16© 2017 Forrester Research, Inc. Reproduction Prohibited
UEM will help automate the practice of
endpoint security
17© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Endpoint Security Requires A Balanced Approach
Prevention
Detection
Control /
Remediation
18© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Endpoint Security Requires A Balanced Approach
Prevention
Detection
Control /
Remediation • Addresses attack surface
• Limits time spent on
detection/response
• Doesn’t require frequent updates
19© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Endpoint Security Requires A Balanced Approach
Prevention
Detection
Control /
Remediation • Addresses attack surface
• Limits time spent on
detection/response
• Doesn’t require frequent updates
• Endpoint visibility and integration
• Catches what gets through
• Threat intelligence required
20© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Endpoint Security Requires A Balanced Approach
Prevention
Detection
Control /
Remediation • Addresses attack surface
• Limits time spent on
detection/response
• Doesn’t require frequent updates
• Endpoint visibility and integration
• Catches what gets through
• Threat intelligence required
• Automated/assisted
remediation reduces
friction
• Ensures policy
compliance
• Operationalizes
threat intelligence
21
© 2017 FORRESTER. REPRODUCTION PROHIBITED.
Recommendations
› Begin the move towards UEM
› Identify key tasks that would benefit from AI
• Look to reduce friction through automated prevention, detection, and
remediation.
› Build out controls at the app and data levels
› Choose prevention technologies based on your risk appetite and
impact to user experience.
22 IBM Security
Cognitive offers a new approach
• Digging through news & blogs
randomly
• Manually searching in platform
DISCOVER
• Being alerted with insights & news
• Asking questions, getting answers
• Spending hours learning DEFINE • Getting knowledge served to you
• Fumbling for relevancy & best
practices
ASSESS
• Gaining instant understanding &
recommendations
• Developing an action plan ACT • Taking immediate action within context
GO FROM TO
23 IBM Security
IBM MaaS360 with Watson for cognitive UEM
Global Cloud Delivery
24 IBM Security
EMM evolves to Unified Endpoint Management
Devices and things People and identity Apps and content
Leveraging the power of ...
Benefits
• Break thru organizational silos.
• Improved security operations, management
automation & business intelligence.
• Reduced TCO and improved efficiency.
• Intuitive and simple employee experience,
regardless of device type.
• Simplified Administration experience.
25 IBM Security
Manage device that
manages IoT device
Manage embedded
Android/Win10/Linux/
Android Things/Windows IoT device
Manage IoT gateway
to cloud or platform
UEM includes the Internet of Things
Secure apps that
manages IoT device
26 IBM Security
MaaS360 Cognitive Advisor is here to help
Follow Through Actions
Automatically generated Insights provided contextually to Administrator
Data Sources: MaaS360 data captured from device and aggregated for customer & community; Third Party Sources – Structured & Unstructured
ü Delivers actionable insights for improved productivity and protection
ü Enables context-driven best practices and recommendations
ü Discover avenues of improvement based on Peer Benchmarks, Best Practices and New Capabilities
IBM CONFIDENTIAL UNTIL MARCH 20, 2017
27 IBM Security
Discovering a new mobile malware threat
• MaaS360 Advisor With Watson
̶ Self-discovered zero day threat
̶ Impact assessed immediately
̶ Hotlink to enforce a more restrictive device policy
• Other EMM solutions
̶ Random discovery
̶ Research the malware
̶ Manually assess impact
̶ Investigate remediation methods
̶ Implement fix
IBM CONFIDENTIAL UNTIL MARCH 20, 2017
28 IBM Security
Assessing new privacy regulations
• MaaS360 Advisor With Watson
̶ Self-discovered new regulations
̶ Education and potential of impact provided
̶ Recommended next steps
• Other EMM solutions
̶ Finds out through the grape vine
̶ Arranges calls with the legal team
̶ Reviews how regulations affect current policies
̶ Reviews how the changes impact users
̶ Manually adjusts policies to become compliant
IBM CONFIDENTIAL UNTIL MARCH 20, 2017
29 IBM Security
Sizing up the Win 10 migration
• MaaS360 Advisor With Watson
̶ Automatically notified of OS, EOL
̶ Assessment of endpoints affected / qualified for
upgrade
̶ Recommended next steps / shortcut to fix provided
• Other EMM solutions
̶ Notified by Microsoft about Windows 7 EOL
̶ Sets up a reoccurring meeting with the desktop team
̶ Reviews Win 7 – Win 10 migration with-in a separate
endpoint management system
̶ Continues without a unified platform
IBM CONFIDENTIAL UNTIL MARCH 20, 2017
30 IBM Security
with Watson – cognitive UEM editions
Solution Essentials Deluxe Premier Enterprise
Device Management
iOS, Android, Windows Mobile, Windows & macOS
✔ ✔ ✔ ✔
App Management
iOS, Android, Windows Mobile, Windows & macOS
✔ ✔ ✔ ✔
Patch and Update Management ✔ ✔ ✔ ✔
Identity Management ✔ ✔ ✔ ✔
Cognitive Advisor ✔ ✔ ✔ ✔
Container App ✔ ✔ ✔ ✔
Mobile Expense Management ✔ ✔ ✔ ✔
Secure Mobile Mail ✔ ✔ ✔
Secure Mobile Chat ✔ ✔ ✔
OS VPN ✔ ✔
Secure Browser ✔ ✔
Gateway for Browser ✔ ✔
Content Management ✔ ✔
Gateway for Documents ✔ ✔
App Security ✔ ✔
Gateway for Apps ✔ ✔
Mobile Document Editor ✔
Mobile Document Sync ✔
Mobile Threat Management ✔
TeamViewer Remote Support O O O O
31 IBM Security
Do more than manage endpoints
Transform your
business with
32 IBM Security
Next steps
Demo
Participate in a
deep-dive demo
with our experts
Deploy
Start managing and
securing your
mobile environment
Evaluate
Set up and
configure your
custom trial service
1 2 3
www.ibm.com/maas360trymaas360.agilly.net
33 IBM Security
Questions & Answers
?
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any
statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International
Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper
access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be
considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful,
comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems,
products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU

More Related Content

What's hot

Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Advent IM Ltd
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident responseAbhishek Sood
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019Precisely
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Marcello Marchesini
 
Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]IDG
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryCompTIA
 
Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]IDG
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSilicon Valley Bank
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
Tei of microsoft O365 threat intelligence
Tei of microsoft O365 threat intelligenceTei of microsoft O365 threat intelligence
Tei of microsoft O365 threat intelligenceabramoru
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]IDG
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Precisely
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 

What's hot (20)

Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012
 
The state of incident response
The state of incident responseThe state of incident response
The state of incident response
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]Understanding the Security-Specific Purchase Process [Infographic]
Understanding the Security-Specific Purchase Process [Infographic]
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
IDG 2020 Security Priorities Research
IDG 2020 Security Priorities ResearchIDG 2020 Security Priorities Research
IDG 2020 Security Priorities Research
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
 
Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]Understanding the Data & Analytics Specific Purchase Process [Infographic]
Understanding the Data & Analytics Specific Purchase Process [Infographic]
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Tei of microsoft O365 threat intelligence
Tei of microsoft O365 threat intelligenceTei of microsoft O365 threat intelligence
Tei of microsoft O365 threat intelligence
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
 
Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]Impact of COVID-19 [Infographic]
Impact of COVID-19 [Infographic]
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 

Similar to Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?

Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfIDG
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionInfo-Tech Research Group
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsVMware Tanzu
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Flexera
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsIBM Security
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Accelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationAccelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationEnterprise Management Associates
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardSecurityScorecard
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapEnterprise Management Associates
 
The 2018 Threat Landscape
The 2018 Threat LandscapeThe 2018 Threat Landscape
The 2018 Threat LandscapeColloqueRISQ
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceEnterprise Management Associates
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetCrowdStrike
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasInterset
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 

Similar to Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020? (20)

Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOpsInfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
InfoSec: Evolve Thyself to Keep Pace in the Age of DevOps
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Accelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationAccelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident Investigation
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the Standard
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 
The 2018 Threat Landscape
The 2018 Threat LandscapeThe 2018 Threat Landscape
The 2018 Threat Landscape
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
Operationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum DallasOperationalizing Big Data Security Analytics - IANS Forum Dallas
Operationalizing Big Data Security Analytics - IANS Forum Dallas
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 

More from AGILLY

RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...AGILLY
 
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY
 
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfGroup-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfAGILLY
 
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY
 
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY
 
5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloudAGILLY
 
Agilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAgilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAGILLY
 
Ds sandblast-mobile fr
Ds sandblast-mobile frDs sandblast-mobile fr
Ds sandblast-mobile frAGILLY
 
Sandblast agent-solution-brief fr
Sandblast agent-solution-brief frSandblast agent-solution-brief fr
Sandblast agent-solution-brief frAGILLY
 
Sand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationSand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationAGILLY
 
12 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 201712 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 2017AGILLY
 
Mobility Training Series : Mobility 301 protect
Mobility Training Series  : Mobility 301 protectMobility Training Series  : Mobility 301 protect
Mobility Training Series : Mobility 301 protectAGILLY
 
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'EntreprisesLe Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'EntreprisesAGILLY
 
Bluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueBluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueAGILLY
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient TruthAGILLY
 
Bluemix Overview
Bluemix OverviewBluemix Overview
Bluemix OverviewAGILLY
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseAGILLY
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : ProvisionAGILLY
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : ProductivityAGILLY
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : ProtectAGILLY
 

More from AGILLY (20)

RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
RAPPORT Magic Quadrant 2022 de Gartner pour la gestion des accès à privilè...
 
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdfAGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
AGILLY-CISO-Guide de prévention des ransonwares.fr (1).pdf
 
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdfGroup-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
Group-IB_AGILLY-secteur financier_VS_Fraud_E-booklet_2022.en.fr .pdf
 
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdfAGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
AGILLY-sécurisez vos emails, qui le fait le mieux ?(1).pdf
 
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
AGILLY Présentation services MSP - Cloud & Security Workshop - 28 09 2022 v2...
 
5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud5 façons de transformer la connectivité cloud
5 façons de transformer la connectivité cloud
 
Agilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuriAgilly vulnérabilité log4j-sucuri
Agilly vulnérabilité log4j-sucuri
 
Ds sandblast-mobile fr
Ds sandblast-mobile frDs sandblast-mobile fr
Ds sandblast-mobile fr
 
Sandblast agent-solution-brief fr
Sandblast agent-solution-brief frSandblast agent-solution-brief fr
Sandblast agent-solution-brief fr
 
Sand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware PresentationSand Blast Agent Anti Ransomware Presentation
Sand Blast Agent Anti Ransomware Presentation
 
12 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 201712 Prédictions Majeures sur la Cyber Sécurité en 2017
12 Prédictions Majeures sur la Cyber Sécurité en 2017
 
Mobility Training Series : Mobility 301 protect
Mobility Training Series  : Mobility 301 protectMobility Training Series  : Mobility 301 protect
Mobility Training Series : Mobility 301 protect
 
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'EntreprisesLe Nouveau Défi des Applis et leur Adoption dans l'Entreprises
Le Nouveau Défi des Applis et leur Adoption dans l'Entreprises
 
Bluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation NumériqueBluemix Plateforme d'Innovation Numérique
Bluemix Plateforme d'Innovation Numérique
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Bluemix Overview
Bluemix OverviewBluemix Overview
Bluemix Overview
 
Windows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the EnterpriseWindows 10 A Guide to Secure Mobility in the Enterprise
Windows 10 A Guide to Secure Mobility in the Enterprise
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
 
Mobility 301 : Protect
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?

  • 1. Forrester Forecasts 2020 Is Your Mobile Strategy Aligned? Chris Sherman May 24, 2017 Senior Analyst & Guest Speaker Forrester Research Wes Gyure MaaS360 Portfolio Offering Manager IBM
  • 2. 2 IBM Security Housekeeping items ü Duration – 60 minutes ü Submit your questions to all panelists in the Q&A box located in the bottom right corner of your screen ü Recording and slides will be emailed to you
  • 3. © 2017 FORRESTER. REPRODUCTION PROHIBITED. Chris Sherman Senior Analyst, Forrester Research Forrester Forecasts 2020 Is Your Mobile Strategy Aligned?
  • 4. 4© 2017 FORRESTER. REPRODUCTION PROHIBITED. Study demographics v Online survey of 556 IT and security professionals involved with client, endpoint, or mobile management and security v Regions: US, UK, Germany, India and Australia v Company size: 1,000 or more employees v Job level: Director and above v Department: IT/Technology management v Involvement: Involved with client, endpoint, or mobile management and security
  • 5. 5© 2017 Forrester Research, Inc. Reproduction Prohibited Enterprises struggle to manage and secure their endpoint ecosystem
  • 6. 6© 2017 FORRESTER. REPRODUCTION PROHIBITED. Few organizations have a centralized team to manage devices Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017 0% 13% 17% 10% 12% 1% 47% 8% 14% 14% 9% 14% 5% 35% “Which group within your organization currently is primarily responsible for managing the following?” 5% 9% 9% 12% 16% 22% 27% Line-of-business (non-IT) Operational technology (OT) team Security operations team Dedicated traditional endpoint team Combined mobile/traditional endpoint team Dedicated mobile team Information technology (IT) team Smartphones/tablets N=556 PCs/laptops/hybrid PCs N=556 Servers N=556 2% 9% 8% 14% 13% 14% 41% Internet of Things devices N=318
  • 7. 7© 2017 FORRESTER. REPRODUCTION PROHIBITED. Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017 Device-specific: Mobile devices; PCs, laptops, hybrid PCs; servers; and IoT devices are managed separately Device-agnostic: Controls are focused at the application and data layers across all device types, regardless of endpoint form factor “Which of the following best describes your current approach to managing the different types of devices in use at your organization?” Device- agnostic 26% Device- specific 74% Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security The majority of organizations are taking a device-specific approach to management
  • 8. 8© 2017 FORRESTER. REPRODUCTION PROHIBITED. Introducing IoT to the enterprise infrastructure comes with a host of concerns “When thinking about IoT, how concerned is your organization with the following?” 56% 63% 63% 63% 65% 67% 68% 68% 70% 72% 74% 77% Firmware updates Third-party collection of device usage patterns and data from… Physical compromise due to IoT device failures IoT device hardening Denial of service attacks to intelligent devices Internal hackers Lack of authentication and authorization for access to intelligent devices Managing and analyzing data from IoT devices Use of things in denial of service attacks External hackers Privacy violations Lack of data leak protection Very/Extremely concerned Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017 57% are managing IoT devices now; 88% predict they will be managing IoT devices in 2020
  • 9. 9© 2017 FORRESTER. REPRODUCTION PROHIBITED. The amount of data from these endpoints has grown significantly over the past two years “How has the amount of endpoint data collected by your organization changed over the past 18 to 24 months?” “How do you predict the amount of endpoint data collected by your organization will change over the next three years?” Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017 Past 18 to 24 months 9% 56% 35% Over the next three years 4% 46% 50% No change Increase(d) by 1% to 49% Increase(d) by 50% or more
  • 10. 10© 2017 Forrester Research, Inc. Reproduction Prohibited UEM and AI will help turn data into insights
  • 11. 11© 2017 FORRESTER. REPRODUCTION PROHIBITED. As the volume of data collected from endpoints increases, AI/cognitive computing will become a necessity Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017 Only 36% of companies use AI/cognitive computing to analyze endpoint data today, but by 2020, over 80% will “What are your organization’s plans for implementing artificial intelligence/cognitive computing to analyze endpoint data?” 36% 26% 19% 7% 11% 3% Currently implemented Plan to implement within the next 12 months Plan to implement by 2020 Currently investigating Interested, but no plans to investigate or implement No plans
  • 12. 12© 2017 FORRESTER. REPRODUCTION PROHIBITED. Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017 Base: 481 IT and security professionals involved with client, endpoint, or mobile management and security at companies who have implemented, plan to implement, or are investigating AI/cognitive computing AI/cognitive computing plays a significant role in endpoint management and security Q19. “How important a role does – or will – artificial intelligence/cognitive computing play in your organization’s endpoint management and security strategy?” 3% 2% 19% 14% 54% 46% 22% 37% None Not that important Somewhat important Very important Critical 76% 83% Endpoint management Endpoint security
  • 13. 13© 2017 FORRESTER. REPRODUCTION PROHIBITED. By leveraging AI/cognitive computing, orgs can improve threat detection and remediation capabilities . . . “To what extent has – or could – artificial intelligence/cognitive computing improve(d) your organization’s capabilities in the following security areas?” 72% 73% 74% 74% 75% 76% 78% 79% 79% 80% Contextualizing security policies to individuals rather than to devices, groups or whole organization Reducing false positives Remediating threats Suggesting or automating corrective actions Analyzing unstructured data from external sources Identifying false positives Recognizing patterns in security data that signify threats Alleviating the cybersecurity skills gap Increasing security process efficiency Analyzing threats in real time Moderate/Significant improvement Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017 Base: 481 IT and security professionals involved with client, endpoint, or mobile management and security at companies who have implemented, plan to implement, or are investigating AI/cognitive computing
  • 14. 14© 2017 FORRESTER. REPRODUCTION PROHIBITED. . . . While also bolstering business efficiencies and insights “To what extent has – or could – artificial intelligence/cognitive computing improve(d) your organization’s capabilities in the following productivity or business insight areas?” 71% 74% 75% 75% 76% 76% 76% 76% 76% 77% 77% 81% Addressing lack of skills to manage mobility Uncovering insights from external sources about mobility and how… Addressing lack of headcount to manage mobility Addressing lack of time to optimize the management of mobility Optimizing mobile projects Reducing costs with managing mobility Providing key business insights to benefit the company Making data-driven decisions Analyzing IoT data Improving user experience for employees and contractors Uncovering insights from all of the structured data in mobility… Making our operations and administration more efficient Some/Significant Improvement Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017 Base: 481 IT and security professionals involved with client, endpoint, or mobile management and security at companies who have implemented, plan to implement, or are investigating AI/cognitive computing
  • 15. 15© 2017 FORRESTER. REPRODUCTION PROHIBITED. Unified endpoint management (UEM) is an approach to securing and controlling personal computers (PCs), smartphones, and tablets in a connected, cohesive manner from a single console 31% of organizations will implement UEM within the next year; 54% will have it in place by 2020 Q13. “What are your organization’s plans to implement unified endpoint management?” Not implemented and no plans to evaluate 1% Interested, but no short- term plans to evaluate 36% Currently evaluating 9% Plan to implement by 2020 23% Plan to implement within the next 12 months 16% Currently implemented 15% Implementation of UEM will increase as organizations work toward a more integrated and device-agnostic management approach Base: 556 IT and security professionals involved with client, endpoint, or mobile management and security Source: A commissioned study conducted by Forrester Consulting on behalf of IBM, January 2017
  • 16. 16© 2017 Forrester Research, Inc. Reproduction Prohibited UEM will help automate the practice of endpoint security
  • 17. 17© 2017 FORRESTER. REPRODUCTION PROHIBITED. Endpoint Security Requires A Balanced Approach Prevention Detection Control / Remediation
  • 18. 18© 2017 FORRESTER. REPRODUCTION PROHIBITED. Endpoint Security Requires A Balanced Approach Prevention Detection Control / Remediation • Addresses attack surface • Limits time spent on detection/response • Doesn’t require frequent updates
  • 19. 19© 2017 FORRESTER. REPRODUCTION PROHIBITED. Endpoint Security Requires A Balanced Approach Prevention Detection Control / Remediation • Addresses attack surface • Limits time spent on detection/response • Doesn’t require frequent updates • Endpoint visibility and integration • Catches what gets through • Threat intelligence required
  • 20. 20© 2017 FORRESTER. REPRODUCTION PROHIBITED. Endpoint Security Requires A Balanced Approach Prevention Detection Control / Remediation • Addresses attack surface • Limits time spent on detection/response • Doesn’t require frequent updates • Endpoint visibility and integration • Catches what gets through • Threat intelligence required • Automated/assisted remediation reduces friction • Ensures policy compliance • Operationalizes threat intelligence
  • 21. 21 © 2017 FORRESTER. REPRODUCTION PROHIBITED. Recommendations › Begin the move towards UEM › Identify key tasks that would benefit from AI • Look to reduce friction through automated prevention, detection, and remediation. › Build out controls at the app and data levels › Choose prevention technologies based on your risk appetite and impact to user experience.
  • 22. 22 IBM Security Cognitive offers a new approach • Digging through news & blogs randomly • Manually searching in platform DISCOVER • Being alerted with insights & news • Asking questions, getting answers • Spending hours learning DEFINE • Getting knowledge served to you • Fumbling for relevancy & best practices ASSESS • Gaining instant understanding & recommendations • Developing an action plan ACT • Taking immediate action within context GO FROM TO
  • 23. 23 IBM Security IBM MaaS360 with Watson for cognitive UEM Global Cloud Delivery
  • 24. 24 IBM Security EMM evolves to Unified Endpoint Management Devices and things People and identity Apps and content Leveraging the power of ... Benefits • Break thru organizational silos. • Improved security operations, management automation & business intelligence. • Reduced TCO and improved efficiency. • Intuitive and simple employee experience, regardless of device type. • Simplified Administration experience.
  • 25. 25 IBM Security Manage device that manages IoT device Manage embedded Android/Win10/Linux/ Android Things/Windows IoT device Manage IoT gateway to cloud or platform UEM includes the Internet of Things Secure apps that manages IoT device
  • 26. 26 IBM Security MaaS360 Cognitive Advisor is here to help Follow Through Actions Automatically generated Insights provided contextually to Administrator Data Sources: MaaS360 data captured from device and aggregated for customer & community; Third Party Sources – Structured & Unstructured ü Delivers actionable insights for improved productivity and protection ü Enables context-driven best practices and recommendations ü Discover avenues of improvement based on Peer Benchmarks, Best Practices and New Capabilities IBM CONFIDENTIAL UNTIL MARCH 20, 2017
  • 27. 27 IBM Security Discovering a new mobile malware threat • MaaS360 Advisor With Watson ̶ Self-discovered zero day threat ̶ Impact assessed immediately ̶ Hotlink to enforce a more restrictive device policy • Other EMM solutions ̶ Random discovery ̶ Research the malware ̶ Manually assess impact ̶ Investigate remediation methods ̶ Implement fix IBM CONFIDENTIAL UNTIL MARCH 20, 2017
  • 28. 28 IBM Security Assessing new privacy regulations • MaaS360 Advisor With Watson ̶ Self-discovered new regulations ̶ Education and potential of impact provided ̶ Recommended next steps • Other EMM solutions ̶ Finds out through the grape vine ̶ Arranges calls with the legal team ̶ Reviews how regulations affect current policies ̶ Reviews how the changes impact users ̶ Manually adjusts policies to become compliant IBM CONFIDENTIAL UNTIL MARCH 20, 2017
  • 29. 29 IBM Security Sizing up the Win 10 migration • MaaS360 Advisor With Watson ̶ Automatically notified of OS, EOL ̶ Assessment of endpoints affected / qualified for upgrade ̶ Recommended next steps / shortcut to fix provided • Other EMM solutions ̶ Notified by Microsoft about Windows 7 EOL ̶ Sets up a reoccurring meeting with the desktop team ̶ Reviews Win 7 – Win 10 migration with-in a separate endpoint management system ̶ Continues without a unified platform IBM CONFIDENTIAL UNTIL MARCH 20, 2017
  • 30. 30 IBM Security with Watson – cognitive UEM editions Solution Essentials Deluxe Premier Enterprise Device Management iOS, Android, Windows Mobile, Windows & macOS ✔ ✔ ✔ ✔ App Management iOS, Android, Windows Mobile, Windows & macOS ✔ ✔ ✔ ✔ Patch and Update Management ✔ ✔ ✔ ✔ Identity Management ✔ ✔ ✔ ✔ Cognitive Advisor ✔ ✔ ✔ ✔ Container App ✔ ✔ ✔ ✔ Mobile Expense Management ✔ ✔ ✔ ✔ Secure Mobile Mail ✔ ✔ ✔ Secure Mobile Chat ✔ ✔ ✔ OS VPN ✔ ✔ Secure Browser ✔ ✔ Gateway for Browser ✔ ✔ Content Management ✔ ✔ Gateway for Documents ✔ ✔ App Security ✔ ✔ Gateway for Apps ✔ ✔ Mobile Document Editor ✔ Mobile Document Sync ✔ Mobile Threat Management ✔ TeamViewer Remote Support O O O O
  • 31. 31 IBM Security Do more than manage endpoints Transform your business with
  • 32. 32 IBM Security Next steps Demo Participate in a deep-dive demo with our experts Deploy Start managing and securing your mobile environment Evaluate Set up and configure your custom trial service 1 2 3 www.ibm.com/maas360trymaas360.agilly.net
  • 34. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU