Monday Sep 26, 2011

Bring Your Own Device to Work (BYODW): Securing the Mobile Enterprise – OOW Session

Various studies predict that the mobile security market will explode within the next few years. One study estimates the mobile security market will grow to $4B by 2014 and to $14B by 2017. We believe there are a number of factors fueling this explosive growth. The popularity of mobile devices such as smart phones and tablets has resulted in numerous corporate users relying on these devices to access day-to-day business apps and data. It has been estimated by some studies that nearly 85% of these devices are unmanaged by IT and hence unsecured. Loss or theft of these mobile devices could result in security breaches. Organizations are consequently looking for solutions that not only secure the device, but also the backend where sensitive information resides. In our OpenWorld Session “ Bring Your Own Device to Work: Securing the Mobile Enterprise”, we dig deeper into this phenomenon which has taken most IT organizations by surprise.

In the modern mobile enterprise, IT organizations are looking at security from three perspectives

  • Context-aware Security: A few months ago, someone published a hack to reset an iPhone password in less than 6 minutes. Here is a link to that news article. Besides, there is ample evidence that indicates that threat vectors are beginning to migrate to mobile devices sparked by their widespread adoption. So security measures focused on securing the endpoint only are just one facet of the solution. Organizations should really focus their efforts on securing information. Sophisticated security measures should not only consider who is accessing what data but also from which device and from which geo-location and if the access is abnormal given historical behavior.
  • User Experience: Corporate users expect the same level of user experience from their mobile devices that they have come to expect from their SSO-enabled desktops and laptops. While single sign-on solutions streamline the user experience for most apps, there is often no single sign-on across rich mobile applications installed on mobile devices. This problem is expected to worsen because many enterprises are in the process of provisioning rich mobile applications to their employees. Rich mobile applications like employee white pages apps, etc are becoming very common in most enterprises.
  • Interoperability: Many organizations have a heterogeneous IT infrastructure with a well functioning identity management system that they do not want to replace. Instead organizations need solutions that can deliver all of the above while seamlessly integrating and interoperating with their existing platforms so they can get the best value of their investments. 

You don't want to miss Clayton Donley, Senior Director of Development, Oracle, and Daniel Killmer, Principal Product Manager at Oracle, discuss how you can successfully navigate the BYODW phenomenon on Tuesday October 4th at 1:15p in Moscone West 3020.

For a complete schedule of Identity Management sessions at OpenWorld, see the Identity Management Focus On.

About

Oracle Identity Management is a complete and integrated next-generation identity management platform that provides breakthrough scalability; enables organizations to achieve rapid compliance with regulatory mandates; secures sensitive applications and data regardless of whether they are hosted on-premise or in a cloud; and reduces operational costs. Oracle Identity Management enables secure user access to resources anytime on any device.

Search

Archives
« July 2015
SunMonTueWedThuFriSat
   
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
 
       
Today