SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
HOW MANY PEOPLE WORK REMOTELY?
WHAT MOBILE DEVICES DO THEY USE?
50
Million
125
Million
About 125 million U.S. consumers own
smartphones, 50 million own tablets.
DO YOU BRING YOUR OWN DEVICE (BYOD)?
1out of 3people would gladly
break any anti-BYOD rules and
“contravene a company’s security
policy that forbids them to use their
personal devices at work or for work
purposes.” Young “20-something”
workers view BYOD policies as more
of a right than a privilege.
2012
2017
HOW BIG IS MOBILE DATA TRAFFIC?
342 MB
820 MB
In 2012: 342 MB per month per smartphone and 820 MB per tablet.
In 2017: Monthly global data traffic will surpass 10 exabytes.
ARE THERE ANY LOCAL DIFFERENCES?
RESULTS SO FAR
HOW CAN YOU MAKE YOUR
MOBILE STRATEGY MORE SECURE?
Have a well-understood mobile security policy1
2
3
Use an on-premise Mobile Information Management
solution that provides mobile data access via a mobile
app acting as a secure container
Add encryption and secure communication protocols
NetApp®
Connect is an on-premise solution from NetApp that helps connect people, devices
and corporate data without compromising your IT security. For more information go to:
http://www.netapp.com/us/products/software/connect/
HOW SECURE IS YOUR CORPORATE DATA
IN A MOBILE WORLD?
Most common security incidents
WHAT ARE THE DATA MOST AT RISK?
Personal and corporate-owned devices often store and access a variety
of sensitive information including:
79% email
(internal database or business applications)
WHAT IS THE AVERAGE COST OF
A SECURITY INCIDENT?
(includes data loss, damage to the brand, productivity loss, and loss of customer trust)
72%
say that careless employees are a greater security threat than
hackers. This is followed by:
- In 2008: 32,544 mobile phones
were left in taxis in New York alone in
a 6-month period
- There is an 83% chance that the
person who found a lost
corporate-connected device will
attempt to access corporate data or
the corporate network
Insecure Wi-Fi
Connectivity
59%
The average remote worker spends
About 80%of
companies in the U.S. offer
some form of telecommuting
US$429,000 for enterprises US$126,000 for small businesses
Malicious Mobile
Application Download
57%
Mobile Web Browsing
61%
Lost or Stolen Devices
58%
By 2015, the world’s mobile worker
population will reach 1.3 billion, or
37.2% of the total workforce.
The number of mobile-connected
devices will exceed the world’s
population in 2013.
25hrs = 40hrs
87%of managers report
increased productivity of between 5-25%
spent working
at home
spent in the office
11%more hours working than an office-based worker.
47% customer data
38% login credentials
!
Corporate Data
Goes Mobile
How to increase productivity and employee satisfaction at the same
time? Mobile data access seems to be the magic key. The pressure is high
on IT to provide solutions that don't put corporate data at risk. Let's see
what the latest trends are and how the right Mobile Information
Management solution can keep both IT and users smiling.
10 EB
1. According to a survey conducted by Chicago outplacement firm Challenger, Gray & Christmas Inc.
http://www.newsadvance.com/work_it_lynchburg/news/article_f6d82800-900c-11e2-b88d-001a4bcf6878.html
2. IDC press release 1/5/2012 http://www.idc.com/getdoc.jsp?containerId=prUS23251912
3. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html
4. ComScore's "2013 Mobile Future in Focus" report, http://www.comscore.com/Insights/Presentations_and_Whitepapers/2013/2013_Mobile_Future_in_Focus
5. http://www.cio.com/article/708718/Young_Employees_Say_BYOD_a_Right_Not_Privilege_
6. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html
7. http://www.rediff.com/business/slide-show/slide-show-1-india-moving-towards-a-mobile-workforce/20121004.html
8. http://finance.yahoo.com/news/mobile-workforce-productivity-rise-60-040100531.html
9. http://www.slideshare.net/jackies/presentation-remote-workforce-v2
10. http://www.checkpoint.com/press/2012/011812-check-point-businesses-admit-increase-security.html
11. The Smart Phone Honey Stick project survey conducted by Symantec conducted in 2012 http://discover.profitstars.com/strategicallyspeaking/?Tag=BYOD%20workforce
12. http://www.checkpoint.com/press/2012/011812-check-point-businesses-admit-increase-security.html
13. http://www.cfoinnovation.com/content/mobile-security-incidents-cost-enterprises-usd429000-year
© 2013 NetApp, Inc.
9
6
5
4
3
2
1
10
11
11
12
13
Percentage of mobile workers who sometime or obsessively wake up during the
night to check their smartphone:
83% of Indian organizations can technically support mobile work styles
compared to the global average of 57%.
8
31%
21%
56%
7

Mais conteúdo relacionado

Mais procurados

Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
DCWhite
 

Mais procurados (20)

Make data simple in the cognitive era
Make data simple in the cognitive eraMake data simple in the cognitive era
Make data simple in the cognitive era
 
Product Relationship Management (PRM): What Every Connected Business Needs
Product Relationship Management (PRM): What Every Connected Business NeedsProduct Relationship Management (PRM): What Every Connected Business Needs
Product Relationship Management (PRM): What Every Connected Business Needs
 
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
 
Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 final
 
Big Data LDN 2017: The Logical Data Warehouse – A Modern Analytical Architect...
Big Data LDN 2017: The Logical Data Warehouse – A Modern Analytical Architect...Big Data LDN 2017: The Logical Data Warehouse – A Modern Analytical Architect...
Big Data LDN 2017: The Logical Data Warehouse – A Modern Analytical Architect...
 
Terminology guide for digital health in 2021
Terminology guide for digital health in 2021Terminology guide for digital health in 2021
Terminology guide for digital health in 2021
 
Big Data LDN 2017: Big Impact with Big Data
Big Data LDN 2017: Big Impact with Big DataBig Data LDN 2017: Big Impact with Big Data
Big Data LDN 2017: Big Impact with Big Data
 
Data Analytics - The Insight
Data Analytics - The InsightData Analytics - The Insight
Data Analytics - The Insight
 
Data center trends in 2017
Data center trends in 2017Data center trends in 2017
Data center trends in 2017
 
Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
 
Html5 workshop part 1
Html5 workshop part 1Html5 workshop part 1
Html5 workshop part 1
 
Predictive Enterprise Strategic Overview
Predictive Enterprise Strategic OverviewPredictive Enterprise Strategic Overview
Predictive Enterprise Strategic Overview
 
Big Data and Artificial Intelligence in Indonesia
Big Data and Artificial Intelligence in IndonesiaBig Data and Artificial Intelligence in Indonesia
Big Data and Artificial Intelligence in Indonesia
 
90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?
 
What is the Social Graph?
What is the Social Graph?What is the Social Graph?
What is the Social Graph?
 
Cisco niels vd berg
Cisco niels vd bergCisco niels vd berg
Cisco niels vd berg
 
Company presentation Servicenoew
Company presentation ServicenoewCompany presentation Servicenoew
Company presentation Servicenoew
 
Palvelut ja uusi teknologia tuomassa tasapainoa työhön ja vapaa-aikaan
Palvelut ja uusi teknologia tuomassa tasapainoa työhön ja vapaa-aikaanPalvelut ja uusi teknologia tuomassa tasapainoa työhön ja vapaa-aikaan
Palvelut ja uusi teknologia tuomassa tasapainoa työhön ja vapaa-aikaan
 
Taming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeois
 
5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization
 

Semelhante a Corporate Data Goes Mobile

Security that works
Security that worksSecurity that works
Security that works
James1280
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
Cheapest SSLs
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
SelectedPresentations
 

Semelhante a Corporate Data Goes Mobile (20)

Security that works
Security that worksSecurity that works
Security that works
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerable
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
5 Ways BYOD Can Grow Your Business
5 Ways BYOD Can Grow Your Business5 Ways BYOD Can Grow Your Business
5 Ways BYOD Can Grow Your Business
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
BYOD
BYODBYOD
BYOD
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
 
10 Incredible BYOD Facts
10 Incredible BYOD Facts10 Incredible BYOD Facts
10 Incredible BYOD Facts
 
Melbourne ICT Scorecard
Melbourne ICT ScorecardMelbourne ICT Scorecard
Melbourne ICT Scorecard
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
 
The Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationThe Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and Consumerization
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
50 Powerful Statistics About Tech Megatrends Affecting Every Business
50 Powerful Statistics About Tech Megatrends Affecting Every Business50 Powerful Statistics About Tech Megatrends Affecting Every Business
50 Powerful Statistics About Tech Megatrends Affecting Every Business
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 

Mais de NetApp

Mais de NetApp (20)

DevOps the NetApp Way: 10 Rules for Forming a DevOps Team
DevOps the NetApp Way: 10 Rules for Forming a DevOps TeamDevOps the NetApp Way: 10 Rules for Forming a DevOps Team
DevOps the NetApp Way: 10 Rules for Forming a DevOps Team
 
10 Reasons to Choose NetApp for EUC/VDI
10 Reasons to Choose NetApp for EUC/VDI10 Reasons to Choose NetApp for EUC/VDI
10 Reasons to Choose NetApp for EUC/VDI
 
Spot Lets NetApp Get the Most Out of the Cloud
Spot Lets NetApp Get the Most Out of the CloudSpot Lets NetApp Get the Most Out of the Cloud
Spot Lets NetApp Get the Most Out of the Cloud
 
NetApp #WFH: COVID-19 Impact Report
NetApp #WFH: COVID-19 Impact ReportNetApp #WFH: COVID-19 Impact Report
NetApp #WFH: COVID-19 Impact Report
 
4 Ways FlexPod Forms the Foundation for Cisco and NetApp Success
4 Ways FlexPod Forms the Foundation for Cisco and NetApp Success4 Ways FlexPod Forms the Foundation for Cisco and NetApp Success
4 Ways FlexPod Forms the Foundation for Cisco and NetApp Success
 
NetApp 2020 Predictions
NetApp 2020 Predictions NetApp 2020 Predictions
NetApp 2020 Predictions
 
NetApp 2020 Predictions
NetApp 2020 Predictions NetApp 2020 Predictions
NetApp 2020 Predictions
 
NetApp 2020 Predictions in Tech
NetApp 2020 Predictions in TechNetApp 2020 Predictions in Tech
NetApp 2020 Predictions in Tech
 
Corporate IT at NetApp
Corporate IT at NetAppCorporate IT at NetApp
Corporate IT at NetApp
 
Modernize small and mid-sized enterprise data management with the AFF C190
Modernize small and mid-sized enterprise data management with the AFF C190Modernize small and mid-sized enterprise data management with the AFF C190
Modernize small and mid-sized enterprise data management with the AFF C190
 
Achieving Target State Architecture in NetApp IT
Achieving Target State Architecture in NetApp ITAchieving Target State Architecture in NetApp IT
Achieving Target State Architecture in NetApp IT
 
10 Reasons Why Your SAP Applications Belong on NetApp
10 Reasons Why Your SAP Applications Belong on NetApp10 Reasons Why Your SAP Applications Belong on NetApp
10 Reasons Why Your SAP Applications Belong on NetApp
 
Turbocharge Your Data with Intel Optane Technology and MAX Data
Turbocharge Your Data with Intel Optane Technology and MAX DataTurbocharge Your Data with Intel Optane Technology and MAX Data
Turbocharge Your Data with Intel Optane Technology and MAX Data
 
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud Infrastructure
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud InfrastructureRedefining HCI: How to Go from Hyper Converged to Hybrid Cloud Infrastructure
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud Infrastructure
 
Webinar: NetApp SaaS Backup
Webinar: NetApp SaaS BackupWebinar: NetApp SaaS Backup
Webinar: NetApp SaaS Backup
 
NetApp 2019 Perspectives
NetApp 2019 PerspectivesNetApp 2019 Perspectives
NetApp 2019 Perspectives
 
Künstliche Intelligenz ist in deutschen Unter- nehmen Chefsache
Künstliche Intelligenz ist in deutschen Unter- nehmen ChefsacheKünstliche Intelligenz ist in deutschen Unter- nehmen Chefsache
Künstliche Intelligenz ist in deutschen Unter- nehmen Chefsache
 
Iperconvergenza come migliora gli economics del tuo IT
Iperconvergenza come migliora gli economics del tuo ITIperconvergenza come migliora gli economics del tuo IT
Iperconvergenza come migliora gli economics del tuo IT
 
10 Good Reasons: NetApp for Artificial Intelligence / Deep Learning
10 Good Reasons: NetApp for Artificial Intelligence / Deep Learning10 Good Reasons: NetApp for Artificial Intelligence / Deep Learning
10 Good Reasons: NetApp for Artificial Intelligence / Deep Learning
 
NetApp IT’s Tiered Archive Approach for Active IQ
NetApp IT’s Tiered Archive Approach for Active IQNetApp IT’s Tiered Archive Approach for Active IQ
NetApp IT’s Tiered Archive Approach for Active IQ
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

Corporate Data Goes Mobile

  • 1. HOW MANY PEOPLE WORK REMOTELY? WHAT MOBILE DEVICES DO THEY USE? 50 Million 125 Million About 125 million U.S. consumers own smartphones, 50 million own tablets. DO YOU BRING YOUR OWN DEVICE (BYOD)? 1out of 3people would gladly break any anti-BYOD rules and “contravene a company’s security policy that forbids them to use their personal devices at work or for work purposes.” Young “20-something” workers view BYOD policies as more of a right than a privilege. 2012 2017 HOW BIG IS MOBILE DATA TRAFFIC? 342 MB 820 MB In 2012: 342 MB per month per smartphone and 820 MB per tablet. In 2017: Monthly global data traffic will surpass 10 exabytes. ARE THERE ANY LOCAL DIFFERENCES? RESULTS SO FAR HOW CAN YOU MAKE YOUR MOBILE STRATEGY MORE SECURE? Have a well-understood mobile security policy1 2 3 Use an on-premise Mobile Information Management solution that provides mobile data access via a mobile app acting as a secure container Add encryption and secure communication protocols NetApp® Connect is an on-premise solution from NetApp that helps connect people, devices and corporate data without compromising your IT security. For more information go to: http://www.netapp.com/us/products/software/connect/ HOW SECURE IS YOUR CORPORATE DATA IN A MOBILE WORLD? Most common security incidents WHAT ARE THE DATA MOST AT RISK? Personal and corporate-owned devices often store and access a variety of sensitive information including: 79% email (internal database or business applications) WHAT IS THE AVERAGE COST OF A SECURITY INCIDENT? (includes data loss, damage to the brand, productivity loss, and loss of customer trust) 72% say that careless employees are a greater security threat than hackers. This is followed by: - In 2008: 32,544 mobile phones were left in taxis in New York alone in a 6-month period - There is an 83% chance that the person who found a lost corporate-connected device will attempt to access corporate data or the corporate network Insecure Wi-Fi Connectivity 59% The average remote worker spends About 80%of companies in the U.S. offer some form of telecommuting US$429,000 for enterprises US$126,000 for small businesses Malicious Mobile Application Download 57% Mobile Web Browsing 61% Lost or Stolen Devices 58% By 2015, the world’s mobile worker population will reach 1.3 billion, or 37.2% of the total workforce. The number of mobile-connected devices will exceed the world’s population in 2013. 25hrs = 40hrs 87%of managers report increased productivity of between 5-25% spent working at home spent in the office 11%more hours working than an office-based worker. 47% customer data 38% login credentials ! Corporate Data Goes Mobile How to increase productivity and employee satisfaction at the same time? Mobile data access seems to be the magic key. The pressure is high on IT to provide solutions that don't put corporate data at risk. Let's see what the latest trends are and how the right Mobile Information Management solution can keep both IT and users smiling. 10 EB 1. According to a survey conducted by Chicago outplacement firm Challenger, Gray & Christmas Inc. http://www.newsadvance.com/work_it_lynchburg/news/article_f6d82800-900c-11e2-b88d-001a4bcf6878.html 2. IDC press release 1/5/2012 http://www.idc.com/getdoc.jsp?containerId=prUS23251912 3. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html 4. ComScore's "2013 Mobile Future in Focus" report, http://www.comscore.com/Insights/Presentations_and_Whitepapers/2013/2013_Mobile_Future_in_Focus 5. http://www.cio.com/article/708718/Young_Employees_Say_BYOD_a_Right_Not_Privilege_ 6. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html 7. http://www.rediff.com/business/slide-show/slide-show-1-india-moving-towards-a-mobile-workforce/20121004.html 8. http://finance.yahoo.com/news/mobile-workforce-productivity-rise-60-040100531.html 9. http://www.slideshare.net/jackies/presentation-remote-workforce-v2 10. http://www.checkpoint.com/press/2012/011812-check-point-businesses-admit-increase-security.html 11. The Smart Phone Honey Stick project survey conducted by Symantec conducted in 2012 http://discover.profitstars.com/strategicallyspeaking/?Tag=BYOD%20workforce 12. http://www.checkpoint.com/press/2012/011812-check-point-businesses-admit-increase-security.html 13. http://www.cfoinnovation.com/content/mobile-security-incidents-cost-enterprises-usd429000-year © 2013 NetApp, Inc. 9 6 5 4 3 2 1 10 11 11 12 13 Percentage of mobile workers who sometime or obsessively wake up during the night to check their smartphone: 83% of Indian organizations can technically support mobile work styles compared to the global average of 57%. 8 31% 21% 56% 7