SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
EMPLOYEES
ALWAYS CONNECTED, ALWAYS MOBILE
AND MOBILE PRIORITIES ARE NOW CHANGING
INFORMATION
WORKERS
52%OF
ALL
USE 3 DEVICES
OR
MORE
*
INTHEYEAR 2013
OF
FIRMS54%AREINCREASINGTHISSPENDING
INTHEYEAR 2012
OF
FIRMS60%CREATED COMPREHENSIVE
MOBILEANDTABLETSTRATEGY
OF
&
*
DEVICES
REPORTED
60%
BY INFORMATION
WORKERS ARE USED
FOR BOTH
PERSONAL
PURPOSES
WORK
DESKTOP/LAPTOP
71%
MOBILE DEVICES
43%
PEOPLE THAT EITHER SOMEWHAT OR STRONGLY AGREE
PERCEPTION: DEVICE SECURITY
THE MOBILE REALITY INTHE ENTERPRISE IS SHIFTING
BUT ...
MOBILE SECURITY65%ENTERPRISES MAKING IMPLEMENTATION OR IMPROVING
OF MOBILE SECURITY A HIGH OR CRITICAL PRIORITY
GROWING SUPPORT53%ENTERPRISES MAKING SUPPORT OF INTERNET-CONNECTED MOBILE
DEVICES & OPERATING SYSTEMS A HIGH OR CRITICAL PRIORITY
ASPERCEPTIONSOF
ENTERPRISES
AREINFLUENCED,
SO DOTHEIR
MOBILE
PRIORITIES
FUTURE OF SECURITY
RELIES ON MOBILE DEVICES & IDENTITIES
WHY IS MOBILE SECURITY CHANGING MINDS?
ABILITYTOQUICKLYADAPTTOTHREATS
ARE TRUE CATALYSTS FOR MOBILE ADOPTION IN THE ENTERPRISE
OF
ENTERPRISESAGREE
68%
THATIMPROVEDFLEXIBILITYCOMPARED
TO TRADITIONAL AUTHENTICATION
IS MOTIVATIONTO USE MOBILE SECURITY
OF
ENTERPRISESAGREE
64%
THAT ABILITYTO ADAPTTOTHREATS
IS MOTIVATIONTO USE MOBILE SECURITY
VSPERCEPTIONWHY PERCEPTION OF MOBILE SECURITY IS CHANGING WITHIN ENTERPRISES
M O B I L E S E C U R I T Y
REALITY
THE
REALITY:MOBILE DEVICES
AREMORESECURE
IT DECISION-MAKERS
STILL BELIEVE
THE TRADITIONAL
DESKTOP/LAPTOP IS
MORE SECURE
THAN MOBILE DEVICES
MOBILE PERCEPTION IS SKEWED
PRIORITIES OVER THE NEXT 12 MONTHS
ABOUT ENTRUST
A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s
award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access,
citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.
* “Mobile Authentication: Is This My App? Is This My User?”Andras Cser and Chenxi Wang, Forrester Research, December 2012.
All other findings repurposed with permission from a commissioned March 2013 study,“Technology Adoption Profile: Mobility Helps Enterprise Enter a New Age,”conducted by Forrester Consulting on behalf of Entrust Inc.
THE MOST SECURE
PLATFORM
FOR BUSINESS-CRITICAL
PROCESSES
MOBILE
DEVICES:
entrust.com/mobile-perceptions | entrust@entrust.com | 877.660.2497
EASY-TO-USESECURITYFLEXIBLE, EASY-TO-USE MOBILE SECURITY
MEASURES AVAILABLE TODAY 1
BUSINESSENABLEMENTSHIFT TO MOBILE BRINGS
NEW BUSINESS ENABLEMENT 2
MALWAREDEFENSEIDENTITIES & ORGANIZATIONS
PROTECTED FROM MALWARE 3

Más contenido relacionado

Más de Entrust Datacard

Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareEntrust Datacard
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Entrust Datacard
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesEntrust Datacard
 
Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionEntrust Datacard
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEntrust Datacard
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

Más de Entrust Datacard (9)

Defeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser MalwareDefeating Man-in-the-Browser Malware
Defeating Man-in-the-Browser Malware
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
 
Zero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutesZero to Dual_EC_DRBG in 30 minutes
Zero to Dual_EC_DRBG in 30 minutes
 
Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure Protection
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Último

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 

Mobile Security: Perception vs Reality

  • 1. EMPLOYEES ALWAYS CONNECTED, ALWAYS MOBILE AND MOBILE PRIORITIES ARE NOW CHANGING INFORMATION WORKERS 52%OF ALL USE 3 DEVICES OR MORE * INTHEYEAR 2013 OF FIRMS54%AREINCREASINGTHISSPENDING INTHEYEAR 2012 OF FIRMS60%CREATED COMPREHENSIVE MOBILEANDTABLETSTRATEGY OF & * DEVICES REPORTED 60% BY INFORMATION WORKERS ARE USED FOR BOTH PERSONAL PURPOSES WORK DESKTOP/LAPTOP 71% MOBILE DEVICES 43% PEOPLE THAT EITHER SOMEWHAT OR STRONGLY AGREE PERCEPTION: DEVICE SECURITY THE MOBILE REALITY INTHE ENTERPRISE IS SHIFTING BUT ... MOBILE SECURITY65%ENTERPRISES MAKING IMPLEMENTATION OR IMPROVING OF MOBILE SECURITY A HIGH OR CRITICAL PRIORITY GROWING SUPPORT53%ENTERPRISES MAKING SUPPORT OF INTERNET-CONNECTED MOBILE DEVICES & OPERATING SYSTEMS A HIGH OR CRITICAL PRIORITY ASPERCEPTIONSOF ENTERPRISES AREINFLUENCED, SO DOTHEIR MOBILE PRIORITIES FUTURE OF SECURITY RELIES ON MOBILE DEVICES & IDENTITIES WHY IS MOBILE SECURITY CHANGING MINDS? ABILITYTOQUICKLYADAPTTOTHREATS ARE TRUE CATALYSTS FOR MOBILE ADOPTION IN THE ENTERPRISE OF ENTERPRISESAGREE 68% THATIMPROVEDFLEXIBILITYCOMPARED TO TRADITIONAL AUTHENTICATION IS MOTIVATIONTO USE MOBILE SECURITY OF ENTERPRISESAGREE 64% THAT ABILITYTO ADAPTTOTHREATS IS MOTIVATIONTO USE MOBILE SECURITY VSPERCEPTIONWHY PERCEPTION OF MOBILE SECURITY IS CHANGING WITHIN ENTERPRISES M O B I L E S E C U R I T Y REALITY THE REALITY:MOBILE DEVICES AREMORESECURE IT DECISION-MAKERS STILL BELIEVE THE TRADITIONAL DESKTOP/LAPTOP IS MORE SECURE THAN MOBILE DEVICES MOBILE PERCEPTION IS SKEWED PRIORITIES OVER THE NEXT 12 MONTHS ABOUT ENTRUST A trusted provider of identity-based security solutions, Entrust secures governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. * “Mobile Authentication: Is This My App? Is This My User?”Andras Cser and Chenxi Wang, Forrester Research, December 2012. All other findings repurposed with permission from a commissioned March 2013 study,“Technology Adoption Profile: Mobility Helps Enterprise Enter a New Age,”conducted by Forrester Consulting on behalf of Entrust Inc. THE MOST SECURE PLATFORM FOR BUSINESS-CRITICAL PROCESSES MOBILE DEVICES: entrust.com/mobile-perceptions | entrust@entrust.com | 877.660.2497 EASY-TO-USESECURITYFLEXIBLE, EASY-TO-USE MOBILE SECURITY MEASURES AVAILABLE TODAY 1 BUSINESSENABLEMENTSHIFT TO MOBILE BRINGS NEW BUSINESS ENABLEMENT 2 MALWAREDEFENSEIDENTITIES & ORGANIZATIONS PROTECTED FROM MALWARE 3