KRISHNA The State of Mobile Security in India The 23 rd IFIP World Computer Congress 2015 October 5 A Market Analysis and Recommendations for Enterprises.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Rider Universitys BYOD Story. First two short films…… Dilbert Humorous skit about an employee, desperate to get his work done more efficiently tries to.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
BYOD in practice KPMG case study 13 March © 2013KPMG Romania, a Romanian limited liability company and a member firm of the KPMG network of independent.
The transformation of the MSP market Alastair Edwards, Principal Analyst 13 June 2012 Insight. Innovation. Impact. Presentation download
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing the BYOD Management Gap: the evolution of enterprise mobility.
Week 9, Network Communication Software, Dept of Informatics, Faculty of Business.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
“American high-school education is ‘obsolete’… In 2001, India graduated almost a million more students from college than the United States did. China graduates.
Opening a new office in a foreign country Prepared by Christian Gurny
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
YOUR INTERNET EXPERIENCE
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Top Myths about Future Employment in IT. Society for Information Management 2 Why We are Here The understanding of simple economic principles has sent.
L OUISIANA T ECH U NIVERSITY MECHANICAL ENGINEERING PROGRAM Computer Science Salesforce Cloud By Parthasarathi Mahadasyam.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Fast, Friendly, Secure Authentication. Hackers favor authentication-based attacks, report shows. Summary: A suitable password replacement could disrupt.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
The rising stakes of digital leadership ICT, e-Business and SMEs Dennis Gabor Applied University, Hungary Dr. Solt Eszter 2008.
SHAAMS-Social Acceleration -State of the art in Lebanon- Presented by Krystel Khalil Berytech.
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Deploying Windows 10 in the Enterprise Introduction and Windows as a Service Michael blogs.technet.com/mniehaus.
What is Lenovo Goal Mission & Vision Business Groups SWOT Analysis
How Mobile Transforms the Enterprise
What is Lenovo Goal Mission & Vision Business Groups SWOT Analysis
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Organization  As a member of the Strategy & Business Development team, this position will support the development and execution of Corporate, Sector,
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
BlackBerry, TSX, (BB) Brandon Morin Technology Recommended Buy (Proposal Voted Down)
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Moving to BYOD Gary Audin 1.
The New Cloud Playbook Emerges Agatha Poon Research Manager, 451 Research.
Vodafone Business Cloud
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Workshifting Transform your business – empower your people.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
LINKAGES BETWEEN INSTITUTIONS OF HE, VET AND LABOUR MARKET MR NIKOS IOANNOU.
What Are the Different Platforms for Enterprise Mobility Solutions?
Total Enterprise Mobility Comprehensive Management and Security
Global 3rd Platform Market, By Technologies (Cloud, Big Data, Social, Mobile), By Verticals (Telecom, BFSI, Healthcare, Transportation, Manufacturing,
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Bring Your Own Device Market share to hit $366.95bn by 2022: Fractovia.org.
The time to address enterprise mobility is now
How to Define a Successful Mobility Strategy
Transforming business
Challenges facing Enterprise Mobility
Mobile Device Management options in Office 365 and beyond
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Impact of IT Consumerisation on Enterprise Security
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
William Band, Vice President, Principal Analyst
Predictions For The Future of Cloud Computing. Cloud Services In India.
Company Overview & Strategy
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
THE FRENCH DIVERSITY CHARTER: A SUCCESSFUL STORY
IT Management, Simplified
Presentation transcript:

KRISHNA The State of Mobile Security in India The 23 rd IFIP World Computer Congress 2015 October 5 A Market Analysis and Recommendations for Enterprises Penmetsa Murali Krishna

I am Business Management Professional with an MBA from Denmark, Masters in Information Security from Norway and have more then 16 years of professional experience mainly in the education management industry in the areas of Strategic Planning, Operations Management, Student Recruitment, University Cooperation’s and Lecturing in International Business. About me MBA from Copenhagen Business School, Denmark Master’s in Information Security, Norway Bachelors in Computer Science and Engineering, India Germany, Austria, Switzerland Denmark, Sweden, Finland, Norway UK,France, Italy, Spain, Netherlands MBA : 24 Nationalities (America, EMEA, Asia Pacific ) Dean of Gokaraju RangaRaju Institute of Science and Technology Guest Professor for International Management at FH Joannuem,Austria from April 2015 Guest Professor in International Business,,Cross Cultural Management,Leadership and Indian Advisor for UAS Upper Austria & UAS Tech Wien & FH Campus Wien,Austria from 2013,2014 Head of Operations for Mantena Laboratories Limited, India, (Pharma Manufacturing Company) External Strategy Consultant for Tata Consultancy Services A/S, Denmark, Co-Founder and Business Development Manager for Spangle Consultants Private Limited, India, Student Recruitment Teaching : International Business, Marketing University Cooperation's Career Planning Professional ExpertiseWork Experience16 Years Cultural AffinityEducational Qualifications

“State of Mobile Security Political Trends Political Trends Social Trends Social Trends Technological Trends Technological Trends Economic Trends Economic Trends Industry Analysis – PEST Considerations

Industry analysis Technological trends Economic trends Socio cultural trends Recommendations Conclusion Agenda

Technological Trends Mobile data traffic is growing exponentially  Declining hardware prices  Roll out of 4G technology  Growth in mobile internet use  Mobile devices are used as enterprise tool With this protecting corporate data on mobile will become a more prevalent issue for enterprises. Source : Mobility Adoption is Poised For Strong Growth in India by Forrester,June,2012,Enterprise Mobility Market-Part II/IV,Sep 2011,Financialexpress

Technological Trends Android is the prefered mobile platforms in enterprises  Top mobile OS are android,windows and iOS and blackberry  iphone used in corporates and android mostly in mass market Android platforms will be more prone to mobile attacks & raises need more security on mobile operating system level. Source : Mobile Matinee

Technological Trends Cloud to drive next advanced mobile apps for enterprises  Mobile devices are used as enterprise tool  Advanced applications like CRM,ERP and SFA are gearing up.  Saas as an alternative for on premises applications is increasing This increases the need for development of secure mobile applications, data encryption and authentication methods. Source : May 2012,Mobility Adoption is Poised For Strong Growth in India, Forrester, February 2012,Sizing the Cloud Markets in Asia pacific,Forrester and October,2011,Navigating the APAC Saas market,

Technological Trends Majority lack necessary initiatives to address security risks. This pushes enterprises to implement mobile device management, authentication solutions and security policies. Source : India Information Security Survey at glance by PWC,2014

Industry analysis Technological trends Economic trends Socio cultural trends Recommendations Conclusion Agenda

Economic Trends Budget allocation for info security has decreased This will make enterprises more prone to security risks and threats. Source :,Security and Authentication : An Industry perspective CCA,PWC October,2014 $4.8 million $4 million Drop in total average information security budgets in India Key drivers for information security spending in India

Economic Trends Enterprises are increasing spending for more productivity  Mobile devices are used as an enterprise tool  Replacements for desktops and laptops  Majority plan to increase spending on mobile devices This will make enterprises more prone to security risks and in turn push to increase budget for mobile security. Source :,Mobility Adoption is Poised For Strong Growth in India, Forrester

Industry analysis Technological trends Economic trends Socio cultural trends Recommendations Conclusion Agenda

Socio Cultural Trends Mobile security awareness is a challenge in indian firms  Employees non seriousness is a challenge  Majority do not have security policies for mobile devices This makes enterprises more prone to security risks and need for creating more awareness on mobile security. Source : The State of Data Security and Privacy in Indian Industry by DSCI & KPMG and July 2012,Norton Survey and May 2012,Decoding The Behavior of Indian IT Security Buyers, Forrester, Security and Authentication : An Industry perspective CCA,PWC 2014

Socio Cultural Trends BYOD with no mobile security strategy a major challenge  Majority do not have security policies for mobile devices.  BYOD & working from anywhere and anytime is increasing. This impacts the security culture of organization, behavior, accountability of employees. This impacts the security culture of organization, behavior, accountability of employees. Source : Decoding The Behavior of Indian IT Security Buyers, Forrester and and Dataquest BYOD takes a big leap

Industry analysis Technological trends Economic trends Socio cultural trends Recommendations Conclusion Agenda

Recommendations  Develop mobile security policies for your organization Security professionals develop mobile security policies on acceptable and non acceptable use of applications.  Develop BYOD strategy with security functions Security professionals encourage employees to BYOD which satisfies organization defined set of devices & has security functions like password entry, remote lock & wipe, biometrics and can deploy VDI based on need.  Mobile security awareness program Security professionals must measure mobile security awareness on people factor,compliance to policies,loyality,controls and create awareness.

Mobility is a strong support for Indian organizations and cannot be stopped.

KRISHNA Penmetsa Murali Krishna Thank you