Download presentation
Presentation is loading. Please wait.
Published byFrank Chattin Modified over 9 years ago
1
The Global Enterprise Mobility Community
2
The Five Myths of Enterprise Mobility Tuesday 6 th March, 2012 10am - 11am (GMT) with Sharon Clancy, Editor-in-Chief of the Enterprise Mobility Network, Nick McQuire, Principal Analyst at IDC and Andrew Moloney, Security Expert and CEO at Artisan Consulting.
3
10.00-10.10am Welcome & introductions by Sharon Clancy 10.10-10.20am Introduction to the Enterprise Mobility Network 10.20-10.45amInterview with Sharon Clancy, Nick McQuire and Andrew Moloney 10.45-10.55am Q&A 10.55-11.00am Closing remarks
4
Sharon Clancy Editor-in-Chief, Enterprise Mobility Network
5
Nick McQuire, Research Director, IDC Andrew Moloney CEO, Artisan Consulting
6
Nick McQuire Research Director, IDC Andrew Moloney CEO, Artisan Consulting Sharon Clancy, Editor-in-Chief, Enterprise Mobility Network
7
The Five Myths of Enterprise Mobility Nick McQuire Research Director, IDC
8
The Five Myths of Enterprise Mobility 1.Companies can afford to wait until technology has stabilised before deploying a mobility strategy
9
The Five Myths of Enterprise Mobility 2.Increased mobility for workforces means increased risk of security breaches 3.The consumerisation of IT is having no impact on sectors that use rugged mobile devices
10
The Five Myths of Enterprise Mobility 4.A Mobile Device Management strategy is an optional extra, not an essential tool 5.Enterprises can manage mobility in-house behind the firewall without outsourcing to a cloud-based platform
11
Nick McQuire Research Director, IDC Andrew Moloney CEO, Artisan Consulting Sharon Clancy, Editor-in-Chief, Enterprise Mobility Network
12
Andrew Moloney CEO, Artisan Consulting Why Enabling your Mobile Workforce may actually make you more Secure
13
Identifying the risks Getting a handle on your information A holistic assessment of your information security posture Risk brought about by process Risk brought about by practice
14
Five Steps to Improving Mobile Security 1.Define your “Playground” 2.Put a basic mobile policy in place 3.Put in place a basic Mobile Device Management (MDM) platform 4.Apply some basic security controls 5.Assert identity
15
How “Going Mobile” can improve information security 1.Encryption 2.Geolocation 3.Biometrics 4.OTP (One Time Passcode/ Password) 5.OOB (Out of Band) 6.Secure Element
16
FIVE KEY REMINDERS 1. Assess how Information is already at risk in your business - through Process - through Practice 2. Don't assume that broader market trends will not impact your business - plan accordingly 3. Think holistically about “End Points” - extend systems, policies, process and strategies to encompass them 4. Think holistically about the broader security benefits 5. Don't Panic. The sky isn't falling...
17
Any Questions?
18
Closing Remarks
19
Thank You! www.enterprisemobilitynetwork.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.