October 9, 2012
LONDON, Oct. 9, 2012 /PRNewswire/ -- RSA CONFERENCE EUROPE 2012 --
-- Security for Business Innovation Council (SBIC) report features
recommendations for managing mobile devices in the enterprise from 19
global security thought leaders
-- Recommendations outline how organizations can leverage the power of
mobile devices, while also managing associated risks Full Story:
RSA, The Security Division of EMC (NYSE: EMC), released a new research report today from the Security for Business Innovation Council (SBIC) that addresses the continued surge of consumer mobile devices in the enterprise and shares security leaders' insights on how to manage the fast-changing mobility risks while maximizing business opportunities. Mobile threats are developing quickly and technologies keep shifting creating new security holes. As more and more consumer devices access corporate networks and store corporate data, potentially devastating consequences range from the loss or leakage of valuable intellectual property to brand damage if fraudulent access results in a high-profile security breach. The Council consensus is that the time is now for enterprises to integrate risk management into their mobile vision. The potential benefits include increased agility, improved productivity, faster sales, and reduced costs. Capitalizing on the business opportunities of mobile computing is only possible if enterprises know the risks and how to manage them.
The Security for Business Innovation Council's latest report, titled "Realizing the Mobile Enterprise: Balancing the Risks and Rewards of Consumer Devices," is derived from the expertise and real-world experiences of 19 security leaders, who represent some of the world's most forward-thinking security organizations.
The report identifies today's major sources of risk for the mobile enterprise and the outlook for the near future. It also answers critical questions such as:
-- What are the most important mobile policy decisions and who should make
-- How do you mitigate risks such as lost or stolen devices?
-- What should be included in a "Bring Your Own Device (BYOD)" agreement?
-- Why or why not use a mobile device management (MDM) solution?
-- What are the requirements for designing secure mobile apps?
In the report, the Council presents five strategies for building effective, adaptable mobile programs:
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023