Mobile strategy leads security

Enterprise Security in a mobile-first world does not stop at the device

Mobile technology has come incredibly far over the past few years, from smartphones and tablet computers being a luxury to becoming an essential tool for the enterprise, fundamentally changing how we do business. This transformation provided the backdrop for Gigaom’s recent Webinar Evolving Enterprise Security for the Mobile-First World.

As we discussed, mobile security has lagged behind the way we now use such devices, which have moved significantly beyond email to offering a wide range of complex functions. At least until now, as considerable strides have been made to secure the data and services that can now be delivered.

But security does not stop at the device. Speaking to Sam Phillips, Samsung USA’s Chief Information Security Officer and VP of Samsung Business Services for Enterprise Security, it became clear that while the features now available provide a robust foundation for mobile security, they should not be treated in isolation.

We are working in a mobile-first world. Many organisations see mobile technologies as a source of innovation, of new business models and growth. Quite rightly so, as they hold a great deal of promise for both externally facing and operational tasks, for suppliers and customers, for support engineers and warehouse managers.

The theme ‘security as a business enabler’ has evolved from its past, internally-facing beginnings. Where good security once reduced risk, enabling better business by freeing sales representatives or supporting home workers, today security has become an essential part of the trust all stakeholders place in an organisation.

In the platform economy, where a company is perceived through the services it offers online and via mobile, trust becomes a most important asset.  Lose this trust and you lose business, as many organisations have found out to their cost.

As a result, we discussed, mobile security becomes both a strategic business imperative and tangible opportunity. This is recognised across the business, but adoption can sometimes happen without the basics being in place. “Business adoption of Mobile has gotten ahead of CISOs and the CIOs they work with,” says Sam.

The mobile security mechanisms now available on devices, coupled with the services available from a variety of partners, enable mobile services to be locked down or opened up, depending on data to be transferred and apps to be installed.

While this gives organisations the flexibility to create secure mobile solutions to fit their own needs, it emphasises a key element of any mobile strategy. “Businesses need to decide what they really want to do with mobile,” explains Sam. With no one-size-fits-all, so organisations first need to understand what the data and apps are to achieve.

This means more than aligning mobile strategy with business strategy. In reality, mobile becomes a fundamental element of the business models required in today’s increasingly digital world, and therefore needs to be treated as such.

Understanding this, and getting the basics right in terms of securing the mobile assets of the business, implementing a secure development life cycle for apps and so on, ensures mobile can become a powerful platform for business model innovation and enterprise transformation. The alternative means building a castle on sand.

It remains to be seen how far mobile will go in the next five years, but it will only become a more embedded element of our business and personal lives. As it moves from an extension of the enterprise to an intrinsic part, getting the right pieces in place now will stand a firm in good stead for the future.

13 Responses to “Enterprise Security in a mobile-first world does not stop at the device”

  1. It’s really great and true news. Mobile-optimization has become very important now If you want to gain more traffic as per Google terms. I have optimized my all the sites now. Your post is really nice and I would love to share it on my site. Thanks Gigaom again

  2. Hi Jon,

    Mobile gadgets – the weakest link of enterprise security?

    The concept of mobility has changed completely in latest years. The cell corporation is not only a business that optimises its website for cellular devices, neither is it one which allows its employees to do business from home sometimes. actual cell businesses area mobility at their middle, remodeling their operations, attractive better with customers and partners, even as all of the time creating modern, cell-centric enterprise fashions that gain the bottom line.

    As windows into the cell organisation, the safety of mobile devices (whether or not phone, tablet, computer or M2M device) is severely crucial. certainly if such devices are not blanketed inside the right manner, they may nicely constitute a susceptible link inside the armour that protects organisation structures and information. a good example of this comes from recent Oracle studies which in component checked out how nicely professionals look after cell devices.

    misplaced and stolen
    Our survey showed that cell gadgets are being lost and stolen to a reasonably alarming diploma – especially by way of the younger. We observed that a whopping seventy-three percentage of employees aged between sixteen and 24 admitted to having lost their cellular tool at the least as soon as. additionally, 52 percentage owned up to having had their cell device stolen on at the least one event. The research additionally exposed a generational fashion: amongst 45-fifty four-year-olds, tool robbery became reported at just 20 percentage and losses at 36 percent.

    The loss of cell devices must deliver corporations actual motive for concern.

    cell firms are agile and efficient precisely due to the fact they allow get entry to to a big range of mission-critical systems and facts. the worry is if a cell device falls into the wrong palms it can be used to get entry to those systems for malicious motives. With records breaches, hacks and other cybercrimes making headlines every day, concerns over mobile protection are rightly high up at the enterprise agenda. these issues ought to now not, but, forestall corporations moving as quickly as they are able to closer to mobility. It way only that they have to achieve this in a way that places protection at the coronary heart of everything.

    protective the company
    If the cellular gadgets that are being used by employees are owned by the agency then a good deal of the danger we’ve just discussed can be mitigated. groups can lock down the gadgets; making sure that they’re password covered and, in case of loss, sensitive information remotely deleted.