Securing O365 & Enterprise Apps on Mobile Devices: Recommendations from Gartner

Logo
Presented by

Chris Silva, VP Analyst with Gartner; and Jon Paterson, CTO with Zimperium

About this talk

Microsoft Office 365 and other productivity apps are now commonplace on both corporate and personal (BYO) mobile devices. According to Zimperium’s 2022 Global Mobile Threat Report, 84% of organizations have enabled Microsoft Office 365 on mobile devices. And 51% of survey respondents say they have installed four to eight work-specific apps on their mobile devices. These apps are increasing productivity, but they are also exposing more IP and PII than ever before. Security teams around the world are wondering how they can effectively enable productivity tools on mobile devices without compromising security, so Zimperium asked the world’s leading technology analyst firm, Gartner, to provide their recommendations. Please join us as Gartner Analyst Chris Silva outlines his best practices for securing O365 and other enterprise applications on mobile devices, including: -How the nature of protecting data on mobile devices has changed -Why mobile security can no longer rely on device management -How organizations can gain more telemetry in order to detect which attacks will do the most damage -What the new infrastructure “stack” looks like - how MTD, MDM, MAM, and EPP technologies should work together -Real-world examples of large enterprise organizations’ approaches to securing employee enterprise application access

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (13)
Subscribers (1530)
As the only mobile security platform purpose-built for enterprise environments, Zimperium provides security solutions for mobile devices and applications, ensuring safe and secure access to critical data. Our patented, on-device, machine learning-based security provides visibility and protection against known threats and zero-day attacks, and our mobile application protection suite combines comprehensive in-app protection with centralized threat visibility. Here we share resources and information related to our mobile threat research, and best practices for securing mobile devices and mobile applications in the context of the modern threat landscape.