Recommendations outline how organizations can leverage the power of mobile devices

October 9, 2012

2 Min Read

PRESS RELEASE

LONDON, Oct. 9, 2012 /PRNewswire/ -- RSA CONFERENCE EUROPE 2012 --

News Summary:

-- Security for Business Innovation Council (SBIC) report features

recommendations for managing mobile devices in the enterprise from 19

global security thought leaders

-- Recommendations outline how organizations can leverage the power of

mobile devices, while also managing associated risks Full Story:

RSA, The Security Division of EMC (NYSE: EMC), released a new research report today from the Security for Business Innovation Council (SBIC) that addresses the continued surge of consumer mobile devices in the enterprise and shares security leaders' insights on how to manage the fast-changing mobility risks while maximizing business opportunities. Mobile threats are developing quickly and technologies keep shifting creating new security holes. As more and more consumer devices access corporate networks and store corporate data, potentially devastating consequences range from the loss or leakage of valuable intellectual property to brand damage if fraudulent access results in a high-profile security breach. The Council consensus is that the time is now for enterprises to integrate risk management into their mobile vision. The potential benefits include increased agility, improved productivity, faster sales, and reduced costs. Capitalizing on the business opportunities of mobile computing is only possible if enterprises know the risks and how to manage them.

The Security for Business Innovation Council's latest report, titled "Realizing the Mobile Enterprise: Balancing the Risks and Rewards of Consumer Devices," is derived from the expertise and real-world experiences of 19 security leaders, who represent some of the world's most forward-thinking security organizations.

The report identifies today's major sources of risk for the mobile enterprise and the outlook for the near future. It also answers critical questions such as:

-- What are the most important mobile policy decisions and who should make

them?

-- How do you mitigate risks such as lost or stolen devices?

-- What should be included in a "Bring Your Own Device (BYOD)" agreement?

-- Why or why not use a mobile device management (MDM) solution?

-- What are the requirements for designing secure mobile apps?

In the report, the Council presents five strategies for building effective, adaptable mobile programs:

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights