Discover Performance

HP Software's community for IT leaders // October 2012
Subscribe

Overview

4 steps to security in the BYOD age

The perimeter is breached, and you can’t secure every device. Look at the data, the apps and the users.

A new beachhead

In depth

Lead on mobile IT

IT shouldn’t follow the business on mobility. IT leaders should start by making their own department fully mobile.

Take command

Trend watch

Strong application security in the mobile device era

Complex mobile apps plus increasing attacks equal a need to identify risks and instill best practices.

Move forward

CIO insight

Managing risk in an insecure world

At HP Protect, security expert Bruce Schneier discusses accepting that you can’t “get in front” of security threats, and an HP Enterprise Security exec talks risk management.

Watch now

Security index

60
Percentage of respondents who cited security as a top mobile concern.1


155
Percentage increase of mobile malware attacks in 2011 across all platforms.2


47.2
Percentage of companies that are "completely" (9.1%) or "extremely" (38.1%) confident they know which types of devices are used to access business resources.3

One question

Q: In a mobile/cloud world, how can you secure the data in transit and at rest, regardless of device?


A: Considerations need to include a combination of role, device and location. For example, a solution that lets your production manager access their email on an iPad at home, but not the assembly line control system. For that kind of access, they’d need to be on an approved device in the factory. … What about devices that are [lost or] “borrowed”? Consider how to secure the data, rather than simply the network. Then you can still provide agility for the organization, while managing the risks.


— Roger Lawrence, CTO, Enterprise Cloud Services, HP South Pacific, on the Grounded in the Cloud blog

1 "Quick Poll: Enterprise Mobility Trends," IDG for HP, August 2012

2 "2011 Mobile Threats Report," Juniper Networks, February 2012

3 "SANS Mobility/BYOD Security Survey," SANS, sponsored by HP, March 2012


x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Popular tags

Most read articles

Discover Performance

Archive