Android smartphones and tablets are used extensively for business purposes. Many of these devices are accessing sensitive company information that must be protected. Read this white paper to understand how additional hardware/software based protection can help you protect your business.
Before the age of smartphones, no one could imagine the kind of functionality we’d have at our fingertips in 2015.
Today, we don’t just use smartphones to communicate, we use them to do business, too. Business people now make use of mobile devices more and more because smartphones are more flexible than traditional office equipment.
The smartphone is no longer just a phone, it is now a mobile office.
Learn about all the new developments and features we have in store for you with the new Galaxy S6 edge+ and Galaxy Note 5.
Vojtěch Morávek, Senior Systems Engineer, VMware
Virtualization Forum 2014, Prague, 22.10.2014
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
BlackBerry Enterprise Mobility Suite enables enterprises to easily manage users, apps, devices, content and policies. Mobilize your business content, including documents, business intelligence, customer records and more, simply and securely. Users access the content they need, where and when they need it, while IT stays in control for corporate-owned, bring your own and shared use devices. Learn about the features of the suites and find out which fits your stage of mobility adoption.
Before the age of smartphones, no one could imagine the kind of functionality we’d have at our fingertips in 2015.
Today, we don’t just use smartphones to communicate, we use them to do business, too. Business people now make use of mobile devices more and more because smartphones are more flexible than traditional office equipment.
The smartphone is no longer just a phone, it is now a mobile office.
Learn about all the new developments and features we have in store for you with the new Galaxy S6 edge+ and Galaxy Note 5.
Vojtěch Morávek, Senior Systems Engineer, VMware
Virtualization Forum 2014, Prague, 22.10.2014
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
BlackBerry Enterprise Mobility Suite enables enterprises to easily manage users, apps, devices, content and policies. Mobilize your business content, including documents, business intelligence, customer records and more, simply and securely. Users access the content they need, where and when they need it, while IT stays in control for corporate-owned, bring your own and shared use devices. Learn about the features of the suites and find out which fits your stage of mobility adoption.
Our approach to security and management addresses real-world challenges that enterprises are faced with when it comes to mobility solutions. Most enterprises are offering a BYOD or COPE program today. And Android devices are heavily in demand by business users – in fact IDC estimates that this year, Android will sell more phones in business segment than Apple will sell in total.
And yet, there is a clear division of what is important to business users and IT when it comes to mobility.
IT wants devices that:
Provide strong security and control
Integrate easily with existing infrastructure
Keep deployment, maintenance and upgrade costs low
Users, on the other hand, want devices that:
- Make me productive
- Protect my privacy
- Give me a wide choice of features
In many cases, these requirements are working against each other. That is what makes KNOX so valuable in enterprise scenarios. Using KNOX, you get the best of both worlds – the security and control IT is looking for and the sleek design, productivity, and cutting edge features that users want in Galaxy smartphones and tablets.
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
When Android first made its way into the consumer market, no one could have predicted the impact it would have. Android was an operating system developed with a simple idea at its core: Google’s founders wanted smarter mobile devices that better served their users. Today, that simple idea has helped make Android the most popular mobile OS on the market, with a global share of 66%.
Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been an open platform, and there are countless devices from countless manufacturers that users can choose between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by criminals and malware with greater frequency than any other operating system. This means that although the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t patched in a timely fashion. Moreover, because so many different vendors count themselves as players in the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their devices will remain vulnerable, even as they’re being used to handle sensitive business data.
“Nearly every organization supporting smartphones and tablets must have a strategy to support Android devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates. “As we moved to a more mobile world over the past several years, the number of potential attack points increased dramatically, and many of them consisted of user-selected and often unsecured devices as a byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches consistently ranks among the top issues both IT and general management struggle with on a regular basis. A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely to have had a security breach due to a mobile device.”
Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves additional freedoms and run certain applications, many users choose to root their devices, stripping away core security functionality in the interest of personalization. And though measures such as Samsung KNOX and Android for Work exist to separate corporate and private data, these software solutions can be fooled by a savvy enough user.
That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android device market, bringing our full security expertise to bear.
Learn about Samsung KNOX Message, a business messaging app that enterprises and SMBs can use to collaborate conveniently and securely at anytime, from anywhere.
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
Smart phones and tablets are invading the business environment at top speed, with “bring your own device” (BYOD) providing a number of benefits for organisations across all sectors. With the right implementation, and ongoing secure support, performance through technology can be achieved in areas such as employee satisfaction, cost reduction, team work and collaboration and productivity.
Charlie Hales and Nigel Robson cover the important considerations a business should make before implementing an MDM/BYOD strategy, and will consider the ongoing implications of allowing corporate data to be accessed on personal devices ensuring the maximum benefit to businesses, customers and the end users.
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
Subjects covered will include mobile devices OS security, state of malware on mobile devices, data loss prevention, VPN and remote access, 802.1x and certificate deployment, profiling, posture, web security, MDMs and others. For more information please visit our website: http://www.cisco.com/web/CA/index.html
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
Secure Mobile Apps with Virtual Mobile Infrastructure (VMI)
Simple and easy to use remote access for Android Apps. Develop once and publish it on any client including Android, iOS, Blackberry, Firefox OS, Windows Phone and HTML5 clients. Transparent BYOD with no limits.
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.
No other solution in the industry provides the unified management and security of the breadth of Devices and Things, Apps and Content and People and Identity. And no other provider integrates with Watson to deliver a Trusted Advisor to help IT Leaders in their strategic and tactical challenges with UEM by offering actionable insights and contextual analytics.
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsLacoon Mobile Security
Spyphones are surveillance tools surreptitiously planted on a users handheld device. While malicious mobile applications mainly phone fraud applications distributed through common application channels - target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings.
How are these mobile cyber-espionage attacks carried out? In this engaging session, we present a novel proof-of-concept attack technique which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption.
http://www.blackhat.com/us-13/briefings.html#Brodie
With Samsung KNOX Customization, you can transform Samsung devices into purpose built appliances to better meet your business needs. The transportation industry takes advantage of KNOX Customization to provide enhanced in-transit experience and enable smart driving for passengers. To learn more about KNOX Customization, please visit www.samsung.com/business/knox-customization and contact us at knoxcustom@samsung.com
With Samsung KNOX Customization, you can transform Samsung devices into purpose built appliances to better meet your business needs. In the aviation industry, airline companies are adopting KNOX Customization to replace traditional back-seat displays with sleek mobile devices to provide passengers with optimal inflight entertainment. To learn more about KNOX Customization, please visit www.samsung.com/business/knox-customization or contact us at knoxcustom@samsung.com
Our approach to security and management addresses real-world challenges that enterprises are faced with when it comes to mobility solutions. Most enterprises are offering a BYOD or COPE program today. And Android devices are heavily in demand by business users – in fact IDC estimates that this year, Android will sell more phones in business segment than Apple will sell in total.
And yet, there is a clear division of what is important to business users and IT when it comes to mobility.
IT wants devices that:
Provide strong security and control
Integrate easily with existing infrastructure
Keep deployment, maintenance and upgrade costs low
Users, on the other hand, want devices that:
- Make me productive
- Protect my privacy
- Give me a wide choice of features
In many cases, these requirements are working against each other. That is what makes KNOX so valuable in enterprise scenarios. Using KNOX, you get the best of both worlds – the security and control IT is looking for and the sleek design, productivity, and cutting edge features that users want in Galaxy smartphones and tablets.
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
When Android first made its way into the consumer market, no one could have predicted the impact it would have. Android was an operating system developed with a simple idea at its core: Google’s founders wanted smarter mobile devices that better served their users. Today, that simple idea has helped make Android the most popular mobile OS on the market, with a global share of 66%.
Android’s popularity can largely be traced to its sheer diversity. Almost from the beginning, it has been an open platform, and there are countless devices from countless manufacturers that users can choose between. Therein lies the problem – due to its widespread popularity, Android finds itself targeted by criminals and malware with greater frequency than any other operating system. This means that although the OS is not inherently vulnerable, any vulnerabilities that do exist tend to be exploited if they aren’t patched in a timely fashion. Moreover, because so many different vendors count themselves as players in the Android space, it’s inevitable that some will lag behind with security patching. In the meantime, their devices will remain vulnerable, even as they’re being used to handle sensitive business data.
“Nearly every organization supporting smartphones and tablets must have a strategy to support Android devices, despite some of the security challenges,” reads a recent white paper by J. Gold Associates. “As we moved to a more mobile world over the past several years, the number of potential attack points increased dramatically, and many of them consisted of user-selected and often unsecured devices as a byproduct of BYOD,” the paper continues. “The ability to secure data and prevent corporate breaches consistently ranks among the top issues both IT and general management struggle with on a regular basis. A February 2016 Ponemon Institute survey shows that 67% of companies are either certain or very likely to have had a security breach due to a mobile device.”
Slow security patching is far from the only threat facing Android within the enterprise. To grant themselves additional freedoms and run certain applications, many users choose to root their devices, stripping away core security functionality in the interest of personalization. And though measures such as Samsung KNOX and Android for Work exist to separate corporate and private data, these software solutions can be fooled by a savvy enough user.
That’s where BlackBerry comes in. Security has always been in our blood, and we’ve always made it our priority to protect both our clients and their data. That’s why we’ve made our own foray into the Android device market, bringing our full security expertise to bear.
Learn about Samsung KNOX Message, a business messaging app that enterprises and SMBs can use to collaborate conveniently and securely at anytime, from anywhere.
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
Smart phones and tablets are invading the business environment at top speed, with “bring your own device” (BYOD) providing a number of benefits for organisations across all sectors. With the right implementation, and ongoing secure support, performance through technology can be achieved in areas such as employee satisfaction, cost reduction, team work and collaboration and productivity.
Charlie Hales and Nigel Robson cover the important considerations a business should make before implementing an MDM/BYOD strategy, and will consider the ongoing implications of allowing corporate data to be accessed on personal devices ensuring the maximum benefit to businesses, customers and the end users.
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
Subjects covered will include mobile devices OS security, state of malware on mobile devices, data loss prevention, VPN and remote access, 802.1x and certificate deployment, profiling, posture, web security, MDMs and others. For more information please visit our website: http://www.cisco.com/web/CA/index.html
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
Secure Mobile Apps with Virtual Mobile Infrastructure (VMI)
Simple and easy to use remote access for Android Apps. Develop once and publish it on any client including Android, iOS, Blackberry, Firefox OS, Windows Phone and HTML5 clients. Transparent BYOD with no limits.
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.
No other solution in the industry provides the unified management and security of the breadth of Devices and Things, Apps and Content and People and Identity. And no other provider integrates with Watson to deliver a Trusted Advisor to help IT Leaders in their strategic and tactical challenges with UEM by offering actionable insights and contextual analytics.
BlackHat USA 2013 - Practical Attacks against Mobile Device Management SolutionsLacoon Mobile Security
Spyphones are surveillance tools surreptitiously planted on a users handheld device. While malicious mobile applications mainly phone fraud applications distributed through common application channels - target the typical consumer, spyphones are nation states tool of attacks. Why? Once installed, the software stealthy gathers information such as text messages (SMS), geo-location information, emails and even surround-recordings.
How are these mobile cyber-espionage attacks carried out? In this engaging session, we present a novel proof-of-concept attack technique which bypass traditional mobile malware detection measures- and even circumvent common Mobile Device Management (MDM) features, such as encryption.
http://www.blackhat.com/us-13/briefings.html#Brodie
With Samsung KNOX Customization, you can transform Samsung devices into purpose built appliances to better meet your business needs. The transportation industry takes advantage of KNOX Customization to provide enhanced in-transit experience and enable smart driving for passengers. To learn more about KNOX Customization, please visit www.samsung.com/business/knox-customization and contact us at knoxcustom@samsung.com
With Samsung KNOX Customization, you can transform Samsung devices into purpose built appliances to better meet your business needs. In the aviation industry, airline companies are adopting KNOX Customization to replace traditional back-seat displays with sleek mobile devices to provide passengers with optimal inflight entertainment. To learn more about KNOX Customization, please visit www.samsung.com/business/knox-customization or contact us at knoxcustom@samsung.com
We're pleased to share with you the 'Vertical Offering Deck for KNOX Customization'. The purpose of this deck is to help partners/customers identify the basic needs of enterprise customers in key vertical industries (including Aviation, Transportation, Manufacturing, Education, and Retail) and offer them a solution with KNOX Customization features.
The deck is structured to present 1) the needs from key vertical industries, 2) how KNOX Customization features can answer those needs, and 3) overall benefits with customized features. we hope this deck will be utilized to provide valuable talking points when communicating to your customers and SI/VAR partners about KNOX Customization.
Samsung Pay - Safe and secure mobile payments virtually anywhere you can swip...Samsung Biz Mobile
Samsung Pay is available virtually anywhere. It is secure, simple and easy to use.
Read this presentation to learn the benefits of using Samsung Pay as a consumer, retailer and Bank/Card issuer. There's also detailed instructions on how to set up Samsung Pay on your device.
With Samsung KNOX Customization, you can transform Samsung devices into purpose built appliances to better meet your business needs. In the education industry, content providers and academic institutions are adopting KNOX customization to create a smart learning environment and efficiently manage shared in-class devices. To learn more about KNOX Customization, please visit www.samsung.com/business/knox-customization and contact us at knoxcustom@samsung.com
With Samsung KNOX Customization, you can transform Samsung devices into purpose built appliances to better meet your business needs. The retail industry uses KNOX Customization to provide optimal dining and shopping experiences to customers. To learn more about KNOX Customization, please visit www.samsung.com/business/knox-customization and contact us at knoxcustom@samsung.com
This deck is intended to be customer-friendly deck for a easy overview of Knox Customization. If you have any questions, please feel free to contact the Customization Team at knoxcustom@samsung.com
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgeSamsung Biz Mobile
Both Galaxy S7 and Galaxy S7 Edge are a perfect match for your business needs. Boost your security productivity and management with these powerful devices.
With Samsung KNOX Customization, you can transform Samsung devices into purpose built appliances to better meet your business needs. The transportation industry takes advantage of KNOX Customization to provide enhanced in-transit experience and enable smart driving for passengers. To learn more about KNOX Customization, please visit www.samsung.com/business/knox-customization and contact us at knoxcustom@samsung.com
With Samsung KNOX Customization, you can transform Samsung devices into purpose built appliances to better meet your business needs. The media industry takes advantage of KNOX Customization when tying mobile devices with media solutions and optimized user experience to create a value-added offering to subscribers. To learn more about KNOX Customization, please visit www.samsung.com/business/knox-customization and contact us at knoxcustom@samsung.com
Apple по-прежнему продолжает править предприятиями, однако тотальность это правления ослабевает. Это данные нового Mobility Index Report от Good Technology.
Wearable technology has left the realm of science fiction and landed squarely in the real world. This Spiceworks white paper, based on a recent survey of IT pros, looks at barriers and benefits to adoption of wearables in the workplace. To learn more, visit http://smbz.us/1bbIhQv
A critical gap exists between the enterprise mobility vision and
real-world implementations.
Enterprise mobility and trends like bring your own device
(BYOD) aren’t just hot topics of conversation.
According to the over 1,600 IT and security professionals we surveyed, mobility is a top priority for most IT departments.
Unfortunately, there’s a critical gap between the vision these IT leaders have for enterprise mobility and the real-world implementations.
The insights gathered from IT professionals in the Americas, Asia Pacific, Europe, the Middle East, and Africa demonstrate that organisations from around the world share many of the same priorities, challenges and risks.
While regulatory actions and the move to SaaS has added complexity to keeping enterprise IT secure, new technologies such as AI and DevSecOps offer new forms of relief.
Application Security Market PPT: Overview, Dynamics, Trends, Segmentation, Ap...IMARC Group
The global application security market size reached US$ 9.1 Billion in 2023. Looking forward, IMARC Group expects the market to reach US$ 32.9 Billion by 2032, exhibiting a growth rate (CAGR) of 14.93% during 2024-2032.
More Info:- https://www.imarcgroup.com/application-security-market
We surveyed 275 attendees to learn what their top concerns in Europe were. See what we learned from our infographic. For more information, please visit us at www.synopsys.com/software.
Osterman Research conducted two surveys in February and March 2013 focused on Bring Your Own Device (BYOD) issues in small, mid-sized and large organizations, primarily in North America.
94% enterprises will use IoT by end of 2021: Microsoft announces IoT Signals ...Mindbowser Inc
This report is from Microsoft. All copyrights belong to original publishers.
Mindbowser Info solutions is a digital transformation services provider working with global brands aiding on their journey to digital transformation. Mindbowser offers a suite of products and services around user experience, automation, analytics, and mobility that in turn helps businesses become more efficient and improves profitability.
If you have an IoT implementation on mind, connect with us on https://mindbowser.com/digital-transformation-with-iot/
Follow theiotmagazine.com for more updates on IOT
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
The potential trillion dollar Internet of Things (IoT) business opportunity rests precariously on one critical factor – security. 71% of executives in our survey agreed that security concerns will influence customers’ purchase decision for IoT products. However, despite increasing cyber attacks and ample warning from security experts, most organizations do not provide adequate security and privacy safeguards for their IoT products. In fact, only 33% of IoT executives in our survey believe that the IoT products in their industry are highly resilient to cyber security attacks. Further, despite rising consumer concerns regarding data privacy, 47% of organizations do not provide any privacy related information regarding their IoT products.
So, why are organizations lagging behind in securing their IoT products and systems? Key reasons for this include an expanded attack surface, inefficiencies in the IoT product development process, and the lack of specialized security skill-sets. For instance, our survey showed that only 48% of companies focus on securing their IoT products from the beginning of the product development phase. Building a secure IoT system begins with the recognition that security needs to be as much of a priority as the features and functionality of an IoT product. The report highlights the key measures that organizations must take in order to put security at the core of their IoT value proposition.
A Systematic Review of Android Malware Detection TechniquesCSCJournals
Malware detection is a significant key to Android application security. Malwares threat to Android users is increasing day by day. End users need security because they use mobile device to communicate information. Therefore, developing malware detection and control technology should be a priority. This research has extensively explored various state of the art techniques and mechanisms to detect malwares in Android applications by systematic literature review. It categorized the current researches into static, dynamic and hybrid approaches. This research work identifies the limitation and strength current research work. According to the restrictions of current malware detection technologies, it can conclude that detection technologies that use statistical analysis consume more time, energy and resources as compare to machine learning techniques. The results obtained from this research work reinforce the assertion that detection approaches designed for Android malware do not produce 100% efficient detection accuracy.
Similar to White Paper: Balance Between Embedded Operating System Security Features and Additional Hardware/Software Based Protection Needs (20)
Enterprise Mobility Management made easy and affordable, yet powerful.
Check out this flyer to find out what you can do with Knox Manage!
For more information, please contact the Knox Manage Team at knoxmanage@samsung.com.
Enterprise Mobility Management made easy and affordable, yet powerful.
Knox Manage is a cloud-based EMM with flexible management and granular control of mobile devices at affordable price.
For more information, please contact the Knox Manage Team at knoxmanage@samsung.com.
Knox Manage is a cloud-based EMM solution that allows IT admins to set up, manage and monitor devices remotely to increase business efficiency and secure corporate data.
For more information, please contact the Knox Manage Team at knoxmanage@samsung.com.
An EMM cloud-based solution that allows IT departments to set up, monitor, and manage devices remotely, easily and efficiently protecting them from viruses, malware, and intrusion.
Transforming off-the-shelf devices into business machines has never been easier.
This flyer demonstrates what you can do with Knox Configure.
For more information, please contact to the Knox Configure Team at knoxconfigure@samsung.com
White Paper: Anytime, anywhere secure email access with Samsung mobile devices Samsung Biz Mobile
CIOs and IT professionals realize that business users increasingly rely on personal smartphones and tablets to do their work- both at the office and at home. Recent studies show that email is the most widely used mobile client application in businesses and users increasingly expect the same level of features and functionality they get on PCs.
Read this white paper to learn how Samsung smartphones and tablets are designed to meet enterprise productivity and security needs.
White Paper: Anytime, anywhere secure email access with Samsung mobile devices
White Paper: Balance Between Embedded Operating System Security Features and Additional Hardware/Software Based Protection Needs
1. Organisations in Australia, the UK and the US can Benefit from Android
Security Features Which Extend Beyond Native Operating System Capabilities
Survey conducted by IDG Connect on behalf of Samsung
IDG Connect is the demand generation division of International Data Group (IDG), the world's largest technology
media company. Established in 2006, it utilises access to 38 million business decision makers' details to unite
technology marketers with relevant targets from 137 countries around the world. Committed to engaging a
disparate global IT audience with truly localised messaging, IDG Connect also publishes market specific thought
leadership papers on behalf of its clients, and produces research for B2B marketers worldwide.
Role: Solution Buyer/Decision Maker
Organisation Size: Enterprise
Region: United States, United Kingdom and Australia
Buying Stage: Business Case Development
Android Mobile Security for Enterprise
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
2. Summary of Research
Android Mobile Security for Enterprise
Infographic Summary
Ability to encrypt data at rest and in
transit, secure mobile boot and two-
factor authentication identified as biggest
potential Android security improvements
In 55% of organisations, over half of employees use
Android devices for business purposes
Most organisations utilise default Android security
options rather than third party applications or services
Android Usage
Default Security Options
Desired Security Features
Default Android
OS Security
Features
Third Party
Security Software
Application
External, Hosted
Mobile Security
Service
Device Hardware
Embedded
Security Tool
93% 4% 2% 1%
On Device
Application and
Data Encryption
70%
Application
Specific Virtual
Private Networks
46%
Secure Mobile Boot
Capabilities
44%
Single Sign-
On/Biometric/
Smart Card User
Authentication
40%
On Device Virtual
Container to Separate
Personal from
Business Profile
36%
Integration with MDM
Platforms Already
Deployed Within the
Organisation
35%
Government
Agency Validation
of Security Solution
29%
17%
28% 36%
19%
Up to 25%
26-50% 51-75%
Over 75%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
3. Introduction
Enterprise mobile usage has accelerated sharply over
the last five years as the emergence of powerful, large
screen smartphones and tablets coupled with a parallel
expansion of high speed wireless WiFi, 3G/4G networks
have improved employees’ ability to access a broad
range of business applications and data from wherever
they happen to be.
The benefits of that trend in terms of business flexibility
and worker productivity are incontrovertible, but it has
also presented significant challenges to IT departments
responsible for deploying, configuring and managing
large numbers of staff issued or owned mobile devices.
The requirement to maintain adequate security on
Google Android devices is especially acute given that up
to 80% of smartphones shipped in the last few years are
pre-installed with the operating system.
A large portion of those handsets are finding their
way into business environments, so it is vital that IT
departments find ways to protect the integrity of the
data stored on, and accessed by, Android devices -
more so considering the increased volume of malware
and viruses now being targeted specifically at mobile
operating systems and the opportunities for unauthorised
access due to lost or stolen devices, and unsecured
networks those operating systems present.
IDG Connect interviewed around 150 people based in
Australia, the UK and the US to build up a more detailed
picture of how they approach security provision for
Android devices used for business activity within their
organisation. All of those polled worked for companies
employing 1,000 people or more and 55% over 5,000,
with 71% holding IT management related roles such as
administrators, directors, chief technology/information/
security officers and business managers and board
room executives making up the remainder. The largest
contingent (20%) came from the software and computer
services industry, followed by key verticals including
health, medical and pharmaceutical (13%), finance and
investment (11%), manufacturing (9%) and retail (7%).
The results gauge the current scale of their Android
smartphone and tablet usage, identifies the applications most commonly accessed and attempts
to assess the extent to which enterprises are content to rely solely on the default security tools
embedded within the Android OS as standard. It also identifies which additional security mechanisms
or services are most likely to be on their wish lists and judges what smartphone and tablet
manufacturers are considered to offer more robust platforms for extra protection.
Introduction
Android Mobile Security for Enterprise
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
4. Business Android Usage
Android smartphones and tablets are widely used for
work related tasks across Australia, the UK and the
US. Of those taking part in the IDG Connect survey
55% estimated that over half of the employees working
within their organisation use them for business purposes
as growing numbers of staff look to improve their
productivity by remotely accessing data and applications
from locations outside of the office.
Almost a fifth (19%) of those polled on aggregate
reported large scale rollouts of Android devices to
employees, reporting that they were used for business
purposes by over 75% of the employees working at, or
for, their companies. This number was marginally lower
in the US specifically (14%) which conversely recorded
the highest number (34%) of organisations where
Android devices are used by 25-50% of employees.
The findings confirm that penetration of Android devices
is widespread in business environments, with sales
forecasts from research company IDC and others
indicating that penetration will expand further in the next
few years.
IDC estimates that a total of 334.4m smartphones
were shipped worldwide in the first quarter of 2015, for
example, up 16% from 288.3m year on year, with over
three quarters of those devices (78%) being Android
smartphones. Research firm Gartner posits similar
figures, suggesting that 336m smartphones were sold in
Q1 2015, 79% of which were Android devices, though
that market share was down almost 2% on Q1 2014.
IDC has also forecast that that global smartphone sales
will continue to grow over the next four years, albeit
at a slower compound annual growth rate (CAGR) of
5% compared to previous years. Australia, the UK and
the US account for a significant portion of global sales
between them. IDC’s Worldwide Quarterly Mobile Phone
Tracker estimates that the US will account for 11.8% of
all smartphone sales in 2015, with the UK 2.4%.
Android Mobile Security for Enterprise
Over Half of Employees use Android Devices for
Business Purposes in 55% of Organisations
What percentage (%) employees at your organisation currently use
Android smartphones or tablets for work related tasks?
28%
17%
36%
19%
Over 75%
51-75%
26-50%
Up to 25%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
5. Application/Data Security and Mobile Device Management
Needs Most Likely to Dictate Investment Priorities
The ongoing need to protect the integrity of sensitive
commercial information and user authentication details
remains foremost in enterprise buyers’ minds when it
comes to choosing which mobile devices are deployed
across their workforce and/or allowed to access
enterprise networks, applications and data stores.
This is reflected in the survey’s finding that application
and data security is the factor considered most important
in influencing any management decision to deploy
Android devices for business usage (weighted at 88% by
those polled).
Mobile device management (MDM) features (76%), cost
(72%) and support for a broad application ecosystem
(69%) that provides a wide choice of business software
for use on mobile devices are given roughly equal
weighting by the survey base on aggregate.
Those same MDM features (82%), cost (80%) and
application ecosystem support (76%) are considered
more important to procurement strategies by larger
companies employing 10,000 people or more, and there
are regional differences: fewer people in the UK rate
the importance of MDM features (68%) and application
ecosystem support (62%) than those in Australia and the
US, for example.
Nor is the strong current focus on application and data
security likely to change in the future - almost all of
those polled (98%) additionally predicted that it would
represent the single most important factor influencing
investment in Android smartphone or tablets for business
purposes two years down the line.
Security Foremost Concern
Application and Data
Security
88%
Mobile Device
Management Features
76%
Cost
72%
Application
Ecosystem
69%
My Organisation Does
Not Trust Android Mobile
Devices for Business
Purposes
42%
Android Mobile Security for Enterprise
Please rate the importance of the following factors which would
influence your organisation’s decision to deploy Android smartphones
or tablets for business usage?
X
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
6. Most Organisations Utilise Default Android Security
Options Rather than Third Party Applications or Services
Despite their present and future focus on application and
data security, few organisations in Australia, the UK and
the US currently employ any security tools beyond those
already available within the Android operating system.
When asked to identify one method harnessed to provide
mobile security on Android devices used for business
purposes, 93% reported that they relied on the default
security features built into the OS itself. There was again
some regional variation amongst the survey base, with
those in Australia showing a preference for both third
party security software (8%) and hosted mobile security
services (4%) which was slightly above the aggregate.
At face value this finding may suggest that almost all
believe that their organisations are satisfied with the
level of mobile security protection that the Android
OS provides to meet current requirements. But it is
also possible that some respondents remain either
unaware of the precise features or functions which have
been deployed and/or have been given no reason to
suppose that their organisation has sufficient motivation
to supplement default Android security provision with
additional layers of mobile protection using third party
software or services.
As we will see later in this paper, the same number
(93%) appear vague on whether default Android options
security match their business security requirements or
not (Tab 10) – another indication that they may not be
aware of what those Android security capabilities are, or
how they measure up against security frameworks set
out by their IT departments.
Current Android Security
93% 4% 2% 1%
Default Android OS
Security Features
Third Party
Security Software
Application
External, Hosted
Mobile Security
Service
Device Hardware
Embedded Security
Tool
Android Mobile Security for Enterprise
How does your organisation currently deliver enterprise security on
Android devices?Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
7. Ability to Encrypt Data at Rest and in Transit Identified
as Biggest Potential Android Security Improvement
In contrast to their acceptance and usage of default
Android OS security options as the mainstay of
their current enterprise mobile security provision,
organisations in Australia, the UK and the US have
very clear ideas on how best to harden current Android
security protection.
On device application and data encryption is seen as
the approach most likely to improve security levels
currently implemented on Android devices used for
business purposes by 70% of those polled, further
identified as the single most important technology by
94% on aggregate. More organisations in the UK rated
encryption as particular source of potential security
improvement (76%) with 100% additionally considering it
most important within two years’ time.
The ability to protect data in transit as well as at rest
on Android devices is another important priority for
many companies, with application specific virtual
private networks (VPNs – those that set up encrypted
communication sessions with individual remote
applications without affecting the operations of other
applications) cited as a top three feature by 46% of
respondents on aggregate.
The benefits of secure mobile boot capabilities which
safeguard sensitive data and user login details stored
on Android smartphones and tablets by preventing
unauthorised access if they are lost or stolen were also
acknowledged by 44%.
Whilst they were cited as a top three feature by a
lower number of respondents many of those polled
also highlighted single sign on, biometric and smart
card authentication tools (40%) as potential areas of
Android security improvement, alongside on device
virtual containers which separate personal from business
profiles (36%) and integration with MDM platforms.
Desired Security Features
Android Mobile Security for Enterprise
On Device Application and Data Encryption
Application Specific Virtual Private Networks
Secure Mobile Boot Capabilities
Single Sign-On/Biometric/Smart Card User Authentication
On Device Virtual Container to Separate Personal from Business Profile
Integration with MDM Platforms Already Deployed Within the Organisation
Government Agency Validation of Security Solution
Which are the top three of the following features would improve
the level of enterprise security currently deployed on Android
smartphones and tablets used for business purposes within your
organisation?
35%
29%
36%
40%
44%
46%
70%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
8. Email, Messaging, Productivity Suites and Communications
Software Forms Mainstay of Mobile Business App Usage
Mobile Applications
With so many employees using Android devices for work
related tasks it is inevitable they will run a broad mix of
enterprise orientated mobile software to support their
daily activity, and each application is likely to present its
own security challenges and requirements.
The most widely used applications accessed from
Android smartphones and tablets were reported as email
clients and messaging tools (28%), closely followed
by cloud based productivity suites (20%), examples of
which include Microsoft Office365 or Google Docs, and
which both incorporate email and messaging elements of
their own.
Communication and collaboration between colleagues,
business partners and customers using Android mobile
devices is a recurrent theme, with 19% of those polled
also indicating organisation-wide use of conferencing
tools which may include GoToMeeting, Skype and
WebEx.
A smaller percentage also use Android smartphones and
tablets to access customer relationship management
(CRM) and enterprise resource planning (ERP)
applications, traditionally favoured by sales staff who
spend large amounts of time out of the office. An
equal number (9%) either replicate their entire desktop
environment or specific applications by logging into
centrally hosted virtual desktop or application images
provided by platforms such as Citrix XenDesktop/
XenApp or Oracle’s Virtual Desktop Client.
Enterprise IT departments and employees need to bear
in mind that these and many other applications are
vulnerable to exploitation by hackers and unauthorised
users, and take steps to implement appropriate security
measures to protect themselves and their organisation
from the loss of sensitive commercial information which
is often subject to national laws and industry regulation
around data protection.
28%
20%
19%
9%
9%
9%
7%
Email/Messaging Apps
Cloud Based Productivity Suites
Communication, Video/Audio Conferencing and Collaboration
Hosted Virtual Desktop Environments or Applications
Customer Relationship Management (CRM) or Enterprise Resource
Planning (ERP) Applications
Web Browsers
File Synchronisation Software
Android Mobile Security for Enterprise
What business applications do employees within your organisation
typically access from Android smartphones and tablets?Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
9. Importance of Validating Enterprise Security Solutions
Against Government Requirements is Widely Recognised
For many organisations, particularly central or local
government departments or their business partners
and suppliers, compliance with formal IT security
policies which include the mobile devices used by their
employees is mandatory.
Organisations across the three territories certainly
appear to see a clear imperative for matching enterprise
security provision against security certification
frameworks and/or guidance outlined by government
bodies, but this does not take precedence in most cases.
The vast majority of those polled (99%) believe it is
important to know that any enterprise security solution
meets national government requirements such as those
set out by the US DoD, Australian ASD or the UK NTAIA
for example, but a much smaller number (9%) see this as
a priority.
Respondents in the US appear particularly keen on
co-operation with government data security certification
initiatives with a much higher percentage (18%) reporting
this as significantly important, much higher than those in
Australia (2%) and the UK (6%).
Relevant data security frameworks in the US include
the Defense Federal Acquisition Regulation Supplement
(DFARS) which insists that minimum data protection
levels be implemented by both US and foreign
companies acting as Department of Defence contractors.
The Digital Services Advisory Group and Federal Chief
Information Officers Council has also issued security
toolkit covering bring your own device (BYOD) polices
for both federal government agency and the contractors
they employ which demand that smartphones and tablets
brought onto government premises have appropriate
user authentication controls, password policies, remote
wipe features and root kit protection.
The Australian Signals Directorate has published advice
on risk management for companies implementing
BYOD schemes designed to protect against sensitive
data being lost or compromised, and approved KNOX
enabled mobile devices certified under the Mobile Device
Fundamentals Protection Profile (MDFPP) standard for
use by Australian government employees to unclassified
or dissemination limiting marker (DLM) level. The UK CESG issues security guidance for specific
mobile devices to government departments, including those running Android and Samsung KNOX
devices specifically.
While the number rating compliance with these security certifications as significantly important is
low at 9%, it is important to remember that imperative will vary considerably from one company to
another according to a variety of factors, including vertical sector, the precise security requirements
of public sector partners, the type of data and applications accessed from employee mobile devices,
and the penalties imposed for non-compliance.
Government Security Compliance
Android Mobile Security for Enterprise
How important is it to know an enterprise security solution has met
requirements such as those set out by the US Department of Defence
or UK national technical authority for information assurance ?
Somewhat
Important
Significantly
Important
Not
Important
at All
91% 9% 1%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
10. Majority of Respondents Ambivalent Towards Default
Android Security Options
Security Confidence
Despite so many organisations appearing to use default
Android OS security features as the sole basis for their
enterprise Android security protection policies, it is not
clear if these are perceived to offer the best match for
enterprise data and application security requirements
when used in isolation.
The vast majority of respondents displayed what is best
described as ambivalence in this respect - 93% said that
their organisations were neither likely nor unlikely to trust
default security options alone.
The most obvious explanation for this finding is that
those polled are not sufficiently aware of the specific
security capabilities available within the Android OS to
make a reasoned assessment on whether using them in
isolation can meet their organisation’s requirements or
not, and/or that they may be unfamiliar with the specific
security metrics set by their IT departments.
The figure is lower for those respondents from the
US (82%), where 10% said they were very likely to
trust default Android security options and 6% unlikely,
indicating there may at least be a greater awareness
of Android capabilities in this territory and the extent to
which they match top down mobile security requirements
if at all.
The default security options provided in Google’s latest
Android 5.0 Lollipop OS were upgraded in early 2015,
but remain largely focussed on user identification and
authentication techniques rather than MDM features,
application specific VPNs, government certified security
certifications, secure mobile boot capabilities or virtual
containers that separate business from personal profiles,
for example.
Existing pattern, personal identification number (PIN)
and password options have been supplemented with
new Smart Lock features that employ facial recognition
technology, global positioning system (GPS) technology
to link the device’s location to the users home or office,
and the ability to wirelessly pair the smartphone or tablet
with another portable device (such as an NFC tag) to
verify the user’s identity.
Lollipop also provides remote wipe features and 128-bit AES full disk encryption (FDE) to encrypt
all of the user data on the device, though it cannot be applied selectively to specific data sets or
applications and relies heavily on the strength of its disk encryption passphrase for its effectiveness.
Neither Likely or
Unlikely
Very Likely Unlikely Likely
Android Mobile Security for Enterprise
How likely is your organisation to trust the default security options
within the Android mobile operating system alone to support its
enterprise data and application security requirements?
93% 3% 2% 1%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
11. Samsung Considered Leader in Enhancing Android
Security Provision
Integral support for additional mobile security capabilities
beyond that provided by the Android OS itself varies
considerably from one manufacturer to another. Samsung
is one company with a strong reputation for building
security features into Android smartphones and tablets
and is perceived to be a leader in this field by over three
quarters (77%) of respondents on aggregate.
Significantly more organisations in the US (92%)
see Samsung as a leader compared to those in both
Australia (69%) and the UK (70%), whilst Lenovo - which
completed its $2.9bn acquisition of Motorola Mobility from
Google in 2014 - is rated for Android security by a larger
number of companies employing 10,000 people or more
(14%) compared to the aggregate figure (7%).
Samsung introduced the first version of its enterprise
grade mobile security platform, KNOX, in 2013. KNOX
initially incorporated Security Enhanced (SE) Android
tools which separated personal and business data and
applications into different containers, distributed business
profiles and provided data encryption, remote wipe and
browser/camera locking functions.
Upgraded in 2014, KNOX 2.0 added additional features
which are not found in default versions of the Android
OS. These include TrustZone protected certificate
management, a universal MDM client and support for
fingerprint scanner biometric authentication, split billing,
and multi-vendor VPNs integrated with containerisation
platform, single sign on directory services, an authorised
market place from which employees can download secure
apps and customisation options.
KNOX enabled mobile devices have also been approved
for use by a range of national government bodies which
are particularly sensitive to potential issues caused by lost
data and unauthorised system access. These include the
US Department of Defence and National Security Agency
(NSA), as well as the Australian Signals Directorate (ASD)
intelligence agency and the UK Certified Cyber Security
Consultancy (CESG) - the information arm of Government
Communications Headquarters (GCHQ) and the National
Technical Authority for Information Assurance (NTAIA) -
which offers security guidance and support to government
departments.
Secure Android Handsets
Samsung
HTC
Lenovo
LG
Huawei
Android Mobile Security for Enterprise
Which Android manufacturer have you considered as the leading
company to enhance Android security?
77%
10%
7%
5%
1%
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion
12. Conclusion
Conclusion
Android smartphones and tablets are used extensively
for business purposes across Australia, the UK and
the US, with 55% of those polled by the IDG Connect
survey estimating that over half of workers within their
organisation use them to run a broad mix of enterprise
orientated software applications, including email and
messaging tools, cloud based productivity suites and
various communication and collaboration platforms.
That level of mobile device and application usage
inevitably demands adequate security protection and
safeguarding sensitive commercial data including
customer information, financial transactions and user
authentication details is the foremost consideration
during Android device deployment decisions. Application
and data security was seen as the most important
factor amongst those surveyed, with mobile device
management (MDM) features, cost and an application
ecosystem that delivers a broad range of business
applications for use on mobile devices also rated highly.
Yet 93% of respondents were unable to provide a
definitive assessment as to how likely their employers
were to trust the default security options embedded
within the Android mobile operating system to support
those requirements, suggesting many may have little or
no knowledge of precise security capabilities or of any
enterprise data and application security obligations set
out by their IT departments.
In some cases then, there may well be a gap between
current Android enterprise security provision and
requirements which third party suppliers - including
Samsung which is already recognised as a leader in
this field by 77% of those polled - can fill with enterprise
mobile security and management platforms such as
KNOX.
Android Mobile Security for Enterprise
Home
Infographic Summary
Introduction
Business Android Usage
Security Concern
Current Android Security
Desired Security Features
Mobile Applications
Government Security
Security Confidence
Secure Handsets
Conclusion