CISO MAG - Free Issues Endpoint Security Powerlist | Page 26

COVER THEME T 26 oday, Issue 10 Vo l u m e 3 COVER THEME Issue 10 biggest local, national and global regulations, information and emerging data privacy concerns. security officers (CISOs) Above all, companies needed to put face is to find the perfect in place a strong mobile security balance test the Vo l u m e 3 chief between strategy. At the same time, focus on watertight security and seamless user employee experience was picking experience across all the endpoints up. Digital workspaces for users in their network. This even as the with personalized enterprise app traditional management of endpoints catalogue became imperative for has undergone a sea change from a seamless user experience across decade ago when all devices were devices. Enterprises had to build on-premises. Present-day CISOs find capabilities themselves in a quagmire as end- based on user behavior. users access unprecedented number The need for the tools and resources of devices and applications outside required to balance the benefits of the premises. mobility with its associated risks of recommend apps led to the metamorphosis of Mobile The quagmire of devices and apps Consumerization to Device Management Enterprise Mobility (MDM) into Management (EMM). However, over the last couple information of years, EMM solutions have lost technology (IT) over the last few years relevance as manual assessment and led to the rise of bring your own device remediation put businesses at risk. (BYOD) processes on the enterprise systems like Apple iOS, macOS, Traditional EMM losing relevance Google side. Which means enterprises had to contend with all major operating Microsoft Conventional EMM was proving to be Windows—and a host of applications Android, time-consuming, as IT was saddled for platforms. On with mountains of endpoint data. The the other hand, the proliferation of limited resources at disposal to solve smartphones expanded the use cases limitless issues made it inefficient. for businesses while also introducing For example, with EMM, IT managers more security challenges. After all, while investigating potential malware mobile data can inherently expose attacks had to manually assess and them to countless risks stemming research from its transmission, storage and threats, identify remediation methods overall protection mechanisms. and manually resolve for each of Apart from the above challenges, they the devices. In instances of new also need to ensure compliance with regulations or legal ramifications, these various and the potential malware they needed to talk to their legal CISO MAG | November 2019 CISO MAG | November 2019 27