Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address the opportunities and risk of secure mobility from the top down.The first blog in this series discussing how concerns outweigh actions when it comes to mobility security can be found here. The second blog in this series highlighting how IT and business leaders can work together to develop secure mobility policies can be found here. The third blog in this series discussing how to close the gap between vision and real-world implementation can be found here.
Throughout this blog series, we’ve discussed several key aspects of implementing secure mobility policies and programs to ensure organizations can reap the benefits of mobility now and in the future. It’s clear that mobility is a top priority for IT and business leaders and most have a clear vision of the role mobility can and will play in their organization. Overall, they see both the risks and the rewards.
That said, responses gathered in the recent Dimension Data Secure Mobility Global Survey point to a gap between that overall vision and the likely real-world outcomes organizations will face – given that a number of crucial initial steps can ultimately save time, reduce costs, and, most importantly, ensure appropriate security controls are in place.
In this post, I’ll highlight the real opportunities and risk regarding mobility and security – and how business leaders can address the disparity between vision and actual deployment now and for years to come.
Understanding the Opportunity and the Real Risk
The threat to an organization’s proprietary information is certainly foremost in the minds of IT and security leaders. Interestingly, 71% of respondents of the recent Dimension Data survey indicated that their business leaders view employee utilization of personal mobile devices as potentially dangerous, costly and not business critical.
IT concerns about secure enterprise mobility risk are many. These include the introduction of malware into the environment from largely unmanaged devices or devices that organizations have little to no control over and the data leakage challenges by allowing users to have various parts of data outside of the network. In addition, many IT leaders ask:
“How are we actually going to deploy mobility security?”
“How are we going to support the users?”
“Will our IT help desk be able to meet the around-the-clock requests that today’s users demand?”
This week we are celebrating with more than 25,000 attendees at the Moscone Center in San Francisco, and many more viewers on line the 25th anniversary of Cisco Live and it’s an exciting time for Cisco and our partners! As John Chambers described it so eloquently in his Monday keynotes, customers are embracing the opportunities around the Internet of Everything and are looking for us to help them realize the benefits and manage the transition. And cloud deployment is certainly a critical component of this new IT world.
Cisco is Moving Fast with ourPartners to deliver on the Promise of an Intercloud
Read Robert Lloyd bio.
Rob Lloyd President, Development and Salesintends to demonstrate in his keynotes how fast Cisco has been able to move by driving a partner-centric Cloud strategy.
You can watch on line Rob’s keynote for a deeper dive into what is happening both at Cisco and with our customers as the Internet of Everything becomes a reality. Find out what Cisco is doing today, what we’re planning in the future, and what others are doing to tap into the power of the Internet of Everything.
Edison Peres, Senior Vice President, Worldwide Channels at Cisco.
A partner-centric approach differentiates Cisco and our partners
Innovation is required to meet the rapidly changing business requirements for cloud, mobile and the Internet of Everything. With that, new Intercloud reference architectures are being added to the Cloud and Managed Service Program for partners who deliver Cisco Powered services.
Aligning Your Strategy and Business for Cloud Success
Dr. Gee Rittenhouse and Faiyaz Shahpurwala
This afternoon , Cisco executives Dr. Gee Rittenhouse –CDO and Faiyaz Shahpurwala -- Senior Vice President, Cloud Infrastructure and Managed Services share our hybrid cloud strategy with you, including solutions such as Cisco InterCloud and Intelligent Automation for Cloud. They also discuss in their keynotes the role of applications and our partner ecosystem.
Our customers have been asking Cisco to expand beyond our hosted collaboration and SaaS offerings (such as WebEx, Meraki and Cisco Cloud Web Security) with a richer set of cloud services. Today, in San Francisco, we are announcing a substantial expansion of those services with new infrastructure-as-a-service offerings and cloud disaster recovery applications that leverage the cloud platforms of new Intercloud partners Dimension Data and Sungard Availability Services. They join Telstra as our first Intercloud partners.
Mobile security is a top concern for IT and business leaders. This blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies and mobility goals. This blog will address closing the gap between secure mobility vision and real-world implementation. The first blog in this series discussing how concerns outweigh actions when it comes to mobility security is here. The second blog in this series highlighting how IT and business leaders can work together to develop secure mobility policies is here.
There is a gap between the vision for secure mobility and the real-world implementation.
How do we know a gap exists? A recent Dimension Data Secure Mobility Survey report indicates 79% of IT leaders believe mobility is a top priority and 69% of those surveyed already have a mobility roadmap in place. The vision looks good, right? However, only 29% of those implementing their roadmap have tested their core applications, and only 32% have conducted a security audit of the applications.
Today, IT is faced with the challenge of providing any user from any location on any device access to any of the corporate applications, all while keeping assets and users secure. These perimeters add up to a complex equation and it’s contributing to this gap in IT leaders’ approach to vision and action for mobility deployments. How can IT and business leaders work to address this disparity?
Listed below are a few steps that should be considered to help turn the secure mobility vision into a reality. Taking a careful assessment of what mobility can offer and applying these steps can make the difference between a successful implementation and being derailed by unforeseen problems.
Mobile security is a top concern for IT and business leaders. This guest authored blog series with Dimension Data explores how organizational leaders can work together to mitigate concern and implement clearly defined policies to achieve mobility goals. We are pleased to introduce our guest author Darryl Wilson, Director, Enterprise Mobility for Dimension Data Americas, as the first in this series – Darryl will address how a balanced approach to security can yield better business results.
By Guest Contributor Darryl Wilson
Director, Enterprise Mobility for Dimension Data Americas
Darryl Wilson has more than 15 years of experience overseeing large scale network communications projects both from a technical delivery and pre-sales perspective. Wilson’s areas of expertise include unified communications, network performance, troubleshooting and optimization.
The evolution to a mobile-centric workforce has been relatively short, thanks to an explosion of innovation and emerging mobile and cloud technologies. Just a few years ago, BYOD was a hot topic of conversation and mobile device management (MDM) solutions offered a simple way to secure an influx of devices and users.
However, today we are seeing that the tactical implementation of MDM solutions is not enough to control a multi-device, multi-vendor, and multi-OS mobility landscape. In fact, most of the companies I work with are using solutions that have not been optimized or customized for today’s ever-changing mobile world. In addition, security concerns have left many organizations feeling like they need to choose between control and truly reaping the business value mobility offers.
For example, in a recent Dimension Data Secure Mobility Survey Report, 79% say mobility is a top priority for their organization. However, the report indicates that a much smaller segment of those IT leaders’ actions back it up. Seventy-seven percent of those surveyed believe data is the greatest concern pertaining to mobility, yet only 55% have a mobility roadmap in place. If securing company data and successfully implementing a mobile policy is of such importance, why aren’t more IT leaders taking strategic action?