SlideShare a Scribd company logo
1 of 1
Download to read offline
Source: Norton Mobile Insight data as of October 2014, Symantec
RISK
07
Centrally manage mobile threat protection to ensure devices
are protected
Proactively detect and prevent mobile threats such as malware
and risky apps
Whitelist or blacklist apps based on app behavior
Block access to enterprise apps and services if malware
is detected
SECURITY
MEASURES
WHAT ARE THE RISKY BEHAVIORS?
MALICIOUS AND RISKY APPS
Apps are fun, helpful and the weakest entry point for cyber-criminals.
Mobile apps are too often installed by users with little or no thought to the
dangers they may pose.
3MILLION
Malicious
Apps
8MILLION
Apps with
Risky Behaviors
Symantec™ Mobility:Suite
Deliver comprehensive mobile protection without compromising the user experience.
So your data, apps and users stay connected, productive and secure.
Learn more at symantec.com/mobility
#GoEmpower
© 2015 Symantec Corporation. All rights reserved. 21345272
Heterogeneous
Environment
Anywhere,
Anytime
Connectivity
Loss and Theft
Compromised
Devices
Data Leaks
Bring Your
Own Apps
Malicious and
Risky Apps
A: Steal Information
B: Track the User
C: Traditional Threats
D: Send Content
E: Reconfigure Device
19%
A B C D E
22%
26%
13%
13%
Employees are
bringing their own
apps to fill the gap of
apps not provided by
their employer
Source: Workforce Personas and the
Mobile App Gap, Forrester, Nov 2013
25%
Mobile apps will fail
basic security tests
through 2015
Source: Gartner, Sep 2014
75%
RISK
06
Provide a curated enterprise app store that provides easy
access to approved in-house and third-party apps
Deploy and manage user apps dependent on role
Implement app-level security policies for DLP, encryption
and authentication
BRING YOUR OWN APPS
Employees are relying on personal apps, such as file sync and sharing
tools, for work purposes. This increases the risk of data loss and
potential breaches.
SECURITY
MEASURES
IT leaders believe that
unmanaged file sharing
are causing data leaks
Source: Safe Sharing, Intralinks, June 2014
46%
IT professionals are
concerned about mobile
data leakage
Source: MobileCON 2013 Survey,
Symantec, Oct 2013
87%
RISK
05
Implement mobile DLP policies like blocking copy and paste
Manage “open in” controls to prevent content from being
accessed by unapproved apps
Control whether data is allowed to be stored locally or on a
Micro-SD card
DATA LEAKS
Workers rely on mobile apps for work and personal use.
SECURITY
MEASURES
iOS devices jailbroken
within six weeks
of jailbreak tool
availability
Source: Forbes, Mar 2013
18MILLION
Mobile phones on
corporate networks
are jailbroken
Source: Webroot, Oct 2013
24%
RISK
04
Continuously monitor device compliance
Prevent compromised devices from accessing enterprise
networks and apps
SECURITY
MEASURES
COMPROMISED DEVICES
Users can tamper with the device OS (jailbreak or root) to gain elevated
privileges and install malicious apps from unauthorized app stores.
Smartphones were
stolen in 2013, nearly
doubled from 2012
Source: 2014 Annual State of the Net
Survey, Consumer Reports, May 2014
3.1MILLION
2012 2013
RISK
03
Enforce password policies for devices and apps using
multi-factor authentication
Provide seamless access to corporate apps and resources with
certificates and single sign-on
Encrypt corporate apps and data so they’re protected even if
the device is compromised
Full or selective device wipe
Finders of lost devices
tried to access
corporate information
Source: Smartphone Honey Stick Project,
Symantec, Feb 2012
SECURITY
MEASURES
LOSS AND THEFT
Devices are small and portable, making them vulnerable to loss or theft.
All mobile
communications flow
over WiFi
Source: Wi-Fi Alliance
71%
RISK
02
Secure connectivity via certificate-based network access
Per-app VPNs that encrypt data in transit
Deploy app and email proxies that block unauthorized or
non-compliant device and apps
Public WiFi hotspots
have inadequate
security
Source: Forbes, May 2013
*
90%
*estimated
SECURITY
MEASURES
ANYWHERE, ANYTIME CONNECTIVITY
Mobile devices are hyper-connected and often access unsecured networks,
increasing the risk of data loss.
HETEROGENEOUS ENVIRONMENT
Unlike traditional endpoints, mobile is a motley collection of different
devices and operating systems. Workers use multiple devices, which may
or may not be owned by the company.RISK
01 Information workers
use three or more
devices for work
Source: 2013 Mobile Workforce Adoption
Trends, Forrester, Feb 2013
53%
Organizations allow the
use of employee-owned
devices in some form
Source: Cisco IBSG Horizons Study, Cisco,
May 2012
95%
Apply consistent policies across mobile operating systems
Separate personal and corporate data
SECURITY
MEASURES
TOP7
RISKSOF ENTERPRISE
MOBILITY
HOW TO HELP
PROTECT
YOUR BUSINESS
8/10
Source: Symantec Intelligence Report, Symantec, Oct 2014
Go ahead, you've got

More Related Content

What's hot

INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
 
The Facility Manager of Tomorrow
The Facility Manager of TomorrowThe Facility Manager of Tomorrow
The Facility Manager of TomorrowDr. Mazlan Abbas
 
The Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationThe Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationJay McBain
 
What's Keeping Higher Education CIOs Up at Night?
What's Keeping Higher Education CIOs Up at Night?What's Keeping Higher Education CIOs Up at Night?
What's Keeping Higher Education CIOs Up at Night?Vala Afshar
 
FAVORSENSE - Building Smart Cities Through The Eyes of the Citizens
FAVORSENSE - Building Smart Cities Through The Eyes of the CitizensFAVORSENSE - Building Smart Cities Through The Eyes of the Citizens
FAVORSENSE - Building Smart Cities Through The Eyes of the CitizensDr. Mazlan Abbas
 
The New Technology Elite March 2012
The New Technology Elite March 2012The New Technology Elite March 2012
The New Technology Elite March 2012vinnie mirchandani
 
Reflections on 10 hot consumer trends 2016, Ericsson ConsumerLab
Reflections on 10 hot consumer trends 2016, Ericsson ConsumerLabReflections on 10 hot consumer trends 2016, Ericsson ConsumerLab
Reflections on 10 hot consumer trends 2016, Ericsson ConsumerLabEricsson
 
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTHOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTTekRevol LLC
 
Remote facility monitoring and control using IoT
Remote facility monitoring and control using IoTRemote facility monitoring and control using IoT
Remote facility monitoring and control using IoTBernhard Mehl
 
A Day In Our Lives Without Data
A Day In Our Lives Without DataA Day In Our Lives Without Data
A Day In Our Lives Without DataNetApp
 
Sandy carter social 20 final
Sandy carter  social 20   finalSandy carter  social 20   final
Sandy carter social 20 finalSandy Carter
 
Three main pain points from today’s smartphones
Three main pain points from today’s smartphonesThree main pain points from today’s smartphones
Three main pain points from today’s smartphonesAlexander Decker
 
Multi-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-ChannelMulti-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-ChannelDipesh Mukerji
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremDipesh Mukerji
 
How Is Mobile Changing How You Capture And Create Process-Based Content?
How Is Mobile Changing How You Capture And Create Process-Based Content?How Is Mobile Changing How You Capture And Create Process-Based Content?
How Is Mobile Changing How You Capture And Create Process-Based Content?AIIM International
 
IoT - The Building Block for IR 4.0
IoT - The Building Block for IR 4.0IoT - The Building Block for IR 4.0
IoT - The Building Block for IR 4.0Dr. Mazlan Abbas
 
Mobile Is Eating the World (2014)
Mobile Is Eating the World (2014)Mobile Is Eating the World (2014)
Mobile Is Eating the World (2014)a16z
 
Unified Communications: The Winning Edge
Unified Communications:  The Winning EdgeUnified Communications:  The Winning Edge
Unified Communications: The Winning EdgeMari Hansen
 

What's hot (20)

INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
The Facility Manager of Tomorrow
The Facility Manager of TomorrowThe Facility Manager of Tomorrow
The Facility Manager of Tomorrow
 
The Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationThe Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and Consumerization
 
What's Keeping Higher Education CIOs Up at Night?
What's Keeping Higher Education CIOs Up at Night?What's Keeping Higher Education CIOs Up at Night?
What's Keeping Higher Education CIOs Up at Night?
 
FAVORSENSE - Building Smart Cities Through The Eyes of the Citizens
FAVORSENSE - Building Smart Cities Through The Eyes of the CitizensFAVORSENSE - Building Smart Cities Through The Eyes of the Citizens
FAVORSENSE - Building Smart Cities Through The Eyes of the Citizens
 
The New Technology Elite March 2012
The New Technology Elite March 2012The New Technology Elite March 2012
The New Technology Elite March 2012
 
Reflections on 10 hot consumer trends 2016, Ericsson ConsumerLab
Reflections on 10 hot consumer trends 2016, Ericsson ConsumerLabReflections on 10 hot consumer trends 2016, Ericsson ConsumerLab
Reflections on 10 hot consumer trends 2016, Ericsson ConsumerLab
 
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTHOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
 
Remote facility monitoring and control using IoT
Remote facility monitoring and control using IoTRemote facility monitoring and control using IoT
Remote facility monitoring and control using IoT
 
A Day In Our Lives Without Data
A Day In Our Lives Without DataA Day In Our Lives Without Data
A Day In Our Lives Without Data
 
Sandy carter social 20 final
Sandy carter  social 20   finalSandy carter  social 20   final
Sandy carter social 20 final
 
Three main pain points from today’s smartphones
Three main pain points from today’s smartphonesThree main pain points from today’s smartphones
Three main pain points from today’s smartphones
 
Multi-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-ChannelMulti-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-Channel
 
Your First IoT Journey
Your First IoT JourneyYour First IoT Journey
Your First IoT Journey
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
How Is Mobile Changing How You Capture And Create Process-Based Content?
How Is Mobile Changing How You Capture And Create Process-Based Content?How Is Mobile Changing How You Capture And Create Process-Based Content?
How Is Mobile Changing How You Capture And Create Process-Based Content?
 
IoT - The Building Block for IR 4.0
IoT - The Building Block for IR 4.0IoT - The Building Block for IR 4.0
IoT - The Building Block for IR 4.0
 
Mobile Is Eating the World (2014)
Mobile Is Eating the World (2014)Mobile Is Eating the World (2014)
Mobile Is Eating the World (2014)
 
ICT Outlook 2016
ICT Outlook 2016ICT Outlook 2016
ICT Outlook 2016
 
Unified Communications: The Winning Edge
Unified Communications:  The Winning EdgeUnified Communications:  The Winning Edge
Unified Communications: The Winning Edge
 

Viewers also liked

Cehv8 - Module 16: Hacking Mobile Platforms
Cehv8 - Module 16: Hacking Mobile PlatformsCehv8 - Module 16: Hacking Mobile Platforms
Cehv8 - Module 16: Hacking Mobile PlatformsVuz Dở Hơi
 
Submit in class presentation # 2
Submit in class presentation # 2Submit in class presentation # 2
Submit in class presentation # 2so3137
 
Marketing Basics Guide for Small Business
Marketing Basics Guide for Small BusinessMarketing Basics Guide for Small Business
Marketing Basics Guide for Small BusinessInJust5.com
 
Design Thinking for Entrepreneurs and Small Businesses.
Design Thinking for Entrepreneurs and Small Businesses.Design Thinking for Entrepreneurs and Small Businesses.
Design Thinking for Entrepreneurs and Small Businesses.Universal Business School
 
Small business man
Small business manSmall business man
Small business manepaqgz
 
Get an Industrial Design Job
Get an Industrial Design JobGet an Industrial Design Job
Get an Industrial Design JobMarcio Dupont
 
Why invest in Design? From Canada Design Leaders
Why invest in  Design?  From Canada Design Leaders Why invest in  Design?  From Canada Design Leaders
Why invest in Design? From Canada Design Leaders Marcio Dupont
 
Creative Sprint Online - The development and future of Creative Industries
Creative Sprint Online - The development and future of Creative Industries Creative Sprint Online - The development and future of Creative Industries
Creative Sprint Online - The development and future of Creative Industries Marcio Dupont
 
Business plan template to start a small business – free
Business plan template to start a small business – freeBusiness plan template to start a small business – free
Business plan template to start a small business – freeInJust5.com
 
Business idea planning tool
Business idea planning tool Business idea planning tool
Business idea planning tool InJust5.com
 
Sample business proposal for restaurant
Sample business proposal for restaurantSample business proposal for restaurant
Sample business proposal for restaurantphysiojonh
 
The Brave 100: The Battle for Supremacy in Small Business Lending
The Brave 100: The Battle for Supremacy in Small Business LendingThe Brave 100: The Battle for Supremacy in Small Business Lending
The Brave 100: The Battle for Supremacy in Small Business LendingFrank Rotman
 
Why Robert Kiyosaki & Donald Trump Recommend Network Marketing
Why Robert Kiyosaki & Donald Trump Recommend Network MarketingWhy Robert Kiyosaki & Donald Trump Recommend Network Marketing
Why Robert Kiyosaki & Donald Trump Recommend Network MarketingMelissa Schäfers
 
The Hourglass Effect - A Decade of Displacement
The Hourglass Effect - A Decade of DisplacementThe Hourglass Effect - A Decade of Displacement
The Hourglass Effect - A Decade of DisplacementFrank Rotman
 

Viewers also liked (16)

Cehv8 - Module 16: Hacking Mobile Platforms
Cehv8 - Module 16: Hacking Mobile PlatformsCehv8 - Module 16: Hacking Mobile Platforms
Cehv8 - Module 16: Hacking Mobile Platforms
 
Submit in class presentation # 2
Submit in class presentation # 2Submit in class presentation # 2
Submit in class presentation # 2
 
Marketing Basics Guide for Small Business
Marketing Basics Guide for Small BusinessMarketing Basics Guide for Small Business
Marketing Basics Guide for Small Business
 
Paul zanepilzer
Paul zanepilzerPaul zanepilzer
Paul zanepilzer
 
Design Thinking for Entrepreneurs and Small Businesses.
Design Thinking for Entrepreneurs and Small Businesses.Design Thinking for Entrepreneurs and Small Businesses.
Design Thinking for Entrepreneurs and Small Businesses.
 
Small business man
Small business manSmall business man
Small business man
 
Get an Industrial Design Job
Get an Industrial Design JobGet an Industrial Design Job
Get an Industrial Design Job
 
Why invest in Design? From Canada Design Leaders
Why invest in  Design?  From Canada Design Leaders Why invest in  Design?  From Canada Design Leaders
Why invest in Design? From Canada Design Leaders
 
Creative Sprint Online - The development and future of Creative Industries
Creative Sprint Online - The development and future of Creative Industries Creative Sprint Online - The development and future of Creative Industries
Creative Sprint Online - The development and future of Creative Industries
 
Business plan template to start a small business – free
Business plan template to start a small business – freeBusiness plan template to start a small business – free
Business plan template to start a small business – free
 
Business idea planning tool
Business idea planning tool Business idea planning tool
Business idea planning tool
 
Hustlelin
HustlelinHustlelin
Hustlelin
 
Sample business proposal for restaurant
Sample business proposal for restaurantSample business proposal for restaurant
Sample business proposal for restaurant
 
The Brave 100: The Battle for Supremacy in Small Business Lending
The Brave 100: The Battle for Supremacy in Small Business LendingThe Brave 100: The Battle for Supremacy in Small Business Lending
The Brave 100: The Battle for Supremacy in Small Business Lending
 
Why Robert Kiyosaki & Donald Trump Recommend Network Marketing
Why Robert Kiyosaki & Donald Trump Recommend Network MarketingWhy Robert Kiyosaki & Donald Trump Recommend Network Marketing
Why Robert Kiyosaki & Donald Trump Recommend Network Marketing
 
The Hourglass Effect - A Decade of Displacement
The Hourglass Effect - A Decade of DisplacementThe Hourglass Effect - A Decade of Displacement
The Hourglass Effect - A Decade of Displacement
 

Similar to Top Seven Risks of Enterprise Mobility - How to protect your business

Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistJignesh Solanki
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Blueboxer2014
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats ReportJuniper Networks
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 

Similar to Top Seven Risks of Enterprise Mobility - How to protect your business (20)

Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Mobile App Security: Enterprise Checklist
Mobile App Security: Enterprise ChecklistMobile App Security: Enterprise Checklist
Mobile App Security: Enterprise Checklist
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
880 st011
880 st011880 st011
880 st011
 
Third Annual Mobile Threats Report
Third Annual Mobile Threats ReportThird Annual Mobile Threats Report
Third Annual Mobile Threats Report
 
Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 

Top Seven Risks of Enterprise Mobility - How to protect your business

  • 1. Source: Norton Mobile Insight data as of October 2014, Symantec RISK 07 Centrally manage mobile threat protection to ensure devices are protected Proactively detect and prevent mobile threats such as malware and risky apps Whitelist or blacklist apps based on app behavior Block access to enterprise apps and services if malware is detected SECURITY MEASURES WHAT ARE THE RISKY BEHAVIORS? MALICIOUS AND RISKY APPS Apps are fun, helpful and the weakest entry point for cyber-criminals. Mobile apps are too often installed by users with little or no thought to the dangers they may pose. 3MILLION Malicious Apps 8MILLION Apps with Risky Behaviors Symantec™ Mobility:Suite Deliver comprehensive mobile protection without compromising the user experience. So your data, apps and users stay connected, productive and secure. Learn more at symantec.com/mobility #GoEmpower © 2015 Symantec Corporation. All rights reserved. 21345272 Heterogeneous Environment Anywhere, Anytime Connectivity Loss and Theft Compromised Devices Data Leaks Bring Your Own Apps Malicious and Risky Apps A: Steal Information B: Track the User C: Traditional Threats D: Send Content E: Reconfigure Device 19% A B C D E 22% 26% 13% 13% Employees are bringing their own apps to fill the gap of apps not provided by their employer Source: Workforce Personas and the Mobile App Gap, Forrester, Nov 2013 25% Mobile apps will fail basic security tests through 2015 Source: Gartner, Sep 2014 75% RISK 06 Provide a curated enterprise app store that provides easy access to approved in-house and third-party apps Deploy and manage user apps dependent on role Implement app-level security policies for DLP, encryption and authentication BRING YOUR OWN APPS Employees are relying on personal apps, such as file sync and sharing tools, for work purposes. This increases the risk of data loss and potential breaches. SECURITY MEASURES IT leaders believe that unmanaged file sharing are causing data leaks Source: Safe Sharing, Intralinks, June 2014 46% IT professionals are concerned about mobile data leakage Source: MobileCON 2013 Survey, Symantec, Oct 2013 87% RISK 05 Implement mobile DLP policies like blocking copy and paste Manage “open in” controls to prevent content from being accessed by unapproved apps Control whether data is allowed to be stored locally or on a Micro-SD card DATA LEAKS Workers rely on mobile apps for work and personal use. SECURITY MEASURES iOS devices jailbroken within six weeks of jailbreak tool availability Source: Forbes, Mar 2013 18MILLION Mobile phones on corporate networks are jailbroken Source: Webroot, Oct 2013 24% RISK 04 Continuously monitor device compliance Prevent compromised devices from accessing enterprise networks and apps SECURITY MEASURES COMPROMISED DEVICES Users can tamper with the device OS (jailbreak or root) to gain elevated privileges and install malicious apps from unauthorized app stores. Smartphones were stolen in 2013, nearly doubled from 2012 Source: 2014 Annual State of the Net Survey, Consumer Reports, May 2014 3.1MILLION 2012 2013 RISK 03 Enforce password policies for devices and apps using multi-factor authentication Provide seamless access to corporate apps and resources with certificates and single sign-on Encrypt corporate apps and data so they’re protected even if the device is compromised Full or selective device wipe Finders of lost devices tried to access corporate information Source: Smartphone Honey Stick Project, Symantec, Feb 2012 SECURITY MEASURES LOSS AND THEFT Devices are small and portable, making them vulnerable to loss or theft. All mobile communications flow over WiFi Source: Wi-Fi Alliance 71% RISK 02 Secure connectivity via certificate-based network access Per-app VPNs that encrypt data in transit Deploy app and email proxies that block unauthorized or non-compliant device and apps Public WiFi hotspots have inadequate security Source: Forbes, May 2013 * 90% *estimated SECURITY MEASURES ANYWHERE, ANYTIME CONNECTIVITY Mobile devices are hyper-connected and often access unsecured networks, increasing the risk of data loss. HETEROGENEOUS ENVIRONMENT Unlike traditional endpoints, mobile is a motley collection of different devices and operating systems. Workers use multiple devices, which may or may not be owned by the company.RISK 01 Information workers use three or more devices for work Source: 2013 Mobile Workforce Adoption Trends, Forrester, Feb 2013 53% Organizations allow the use of employee-owned devices in some form Source: Cisco IBSG Horizons Study, Cisco, May 2012 95% Apply consistent policies across mobile operating systems Separate personal and corporate data SECURITY MEASURES TOP7 RISKSOF ENTERPRISE MOBILITY HOW TO HELP PROTECT YOUR BUSINESS 8/10 Source: Symantec Intelligence Report, Symantec, Oct 2014 Go ahead, you've got