‘Mobile-first’ Puts Spotlight on Security

Blog /Mobile-first-Puts-Spotlight-on-Security

Fueled by consumerization (i.e. the impact of technology designed first and foremost for consumers now permeating the enterprise), mobile apps and devices are rapidly becoming a core part of the enterprise IT stack, creating new ways of working, transforming existing business processes, driving productivity gains and generating new revenue streams.

Enterprise mobility snap shot – pundit predictions

  • As reported in CIOLeaving the Site Icon IDC pegs the number of mobile workers worldwide to reach 1.3 billion (37.2 percent of the global workforce) by 2015, with more than 153 million of those mobile workers in the United States and Canada.
  • MarketsandMarkets Leaving the Site Icon forecasts the global BYOD market to grow from $71.93 billion in 2013 to $266.17 billion in 2019.
  • According to Kable's Market Opportunity ForecastLeaving the Site Icon Mobile application platform management -- which currently constitutes the largest proportion (59%) of the overall enterprise mobility management market -- is forecasted to reach $9 billion by 2018.
  • A recent IDC survey Leaving the Site Icon found that over 80 percent of IT organizations say that skills for mobile app development and security positions will significantly change in the next three to five years as a result of mobile initiatives.

As organizations adopt a ‘mobile-first’ approach to business strategy and execution, they are also exposing an increasing number of core, internal systems and vital, sensitive data -- giving rapid rise to a ‘security-first’ mindset among CIOs and business leaders who need only scan news headlines to understand the potentially dire consequences of a mobile security breach.

According to a study from BT, as reported in eWeek,Leaving the Site Icon  mobile security breaches have affected more than two-thirds (68%) of global organizations in the last 12 months.

The BT study also reveals an alarming disconnect between BYOD policy and security practices: While nearly 150 personal or corporate-owned mobile devices, on average, have full access to a U.S. company’s internal information, more than half of American organizations (57%) do not have an enforceable policy governing access for BYOD.

While it’s difficult to put an exact dollar amount on the cost of mobile security breaches, we know the cost is high.  According to a recent study reported in Mobile Enterprise,Leaving the Site Icon  52% of large companies say the cost of mobile security incidents last year exceeded $500,000. 45% of businesses with less than 1,000 employees reported costs exceeded $100,000.

Mobile has taken over the enterprise, and with this growth (and consequent value), the challenge of mobile security becomes increasingly complex -- spanning everything from BYOD uptake, device management, identity and access management, authentication, encryption, and anti-malware solutions, network security, and cloud security, among other facets of security.

Ongoing governance is essential for a successful mobile-first strategy. Governance begins with uniform security and usage policy enforcement across all devices and should be the keystone of a mobile center of excellence (MCOE).

A mobile center of excellence is essential in today’s world of ubiquitous enterprise mobility and consists of dedicated team members who define and prioritize mobile initiatives, define people, processes and tools to drive mobile strategy, establish a mobile device management strategy, and conduct constant assessment of return on mobility (ROM) within the construct of a mobile security framework to drive future mobile initiatives.

Security is not just a technical solution. Security touches many other aspects of an enterprise, such as IP and trade-secret protection, and protection of sensitive customer and partner information as if flows through myriad business processes. Mobile center of excellence team members routinely study global operations to ensure mobile policy is defined and followed in unison on a global scale. It is equally vital that mobile security be tightly integrated with a holistic security program that goes beyond mere data protection.

Team members should be up to speed on SAP’s solutions for mobile security, which include: 

  • SAP Afaria, Mobile Device Management (securing the device).
  • Mocana Mobile Application Protection—mobile app-level security and data encryption (securing the app).
  • Mobile Docs—enterprise class cloud storage (similar to Box, Drop Box, Egnyte) allowing access and secure sharing of enterprise documents.

Whether you are defining your enterprise mobile strategy, need help designing and developing your next mobile apps, rolling out a comprehensive enterprise mobile platform, or looking to implement strategic, preconfigured mobile solutions for analytics, reporting, or workflow/workforce management, a winning mobile-first strategy begins and ends with a mobile center of excellence that understands that mobility is not a one-and-done project or singular technology but a continual, iterative, and dedicated mission for competitive advantage.

In its always-connected, ever-evolving state, mobility offers game-changing value to enterprises that embrace it strategically, holistically, and with an understanding that the security spotlight remains constant, vigilant and comprehensively present.

If you’re struggling with the question of ‘what next?’ on the mobile front, contact NTT DATA mobility experts today at http://www.nttdata.com/americas for help building a roadmap for a secure, effective mobile enterprise. 

Post Date: 12/22/2014

default blog image Nick Katzenbach

About the author

VIEW ALL POSTS
EXPLORE OUR BLOGS