Intelligent CISO Issue 02 | Page 84

Another challenge is managing the endpoints from day one , especially mobile devices .

RISING MOBILE CHALLENGES IN THE MOBILE-CLOUD ERA :

DATA AND ENDPOINT MANAGEMENT

Mobility and cloud computing are rapidly becoming the norm for enterprises around the world . In turn , enterprise IT departments are facing new management and security challenges as the amount of business data soars and the number of endpoints explodes . Mathivanan V , Vice President , ManageEngine , says the question doing the rounds is what IT teams need to consider to manage and secure their businesses in this new era .
ndustry analysts

I predict deep penetration of enterprise mobility by the year 2020 . IDC , for instance , forecasts that mobile workers will account for almost 75 % of the total workforce in the US . Meanwhile , Strategy Analytics predicts that the global mobile workforce will reach 1.75 billion users and account for 42 % of the global workforce overall .

The economic perspective is just as promising . The global enterprise mobility market will be worth as much as US $ 140 billion , predicts the National Association of Software and Services Companies . And the investments are paying off . To date , 84 % of all companies who consider themselves on the cutting edge of mobility report an increase in overall productivity as a direct result of incorporating mobile apps into their business , according to a survey by AppsFreedom .
Likewise , enterprises are expected to continue relentlessly adopting cloud technologies . By 2020 , Gartner forecasts the public cloud services market will reach US $ 383 billion . This includes spending on cloud business process services , cloud application infrastructure services , cloud application services , cloud management and security services , cloud system infrastructure services , and of course , cloud advertising .
The flip side of increasing enterprise mobility and cloud usage is the increasing risk to enterprise security . Today , most users have at least two endpoints – a laptop and mobile device – and 80 % of
Mathivanan V , Vice President , ManageEngine

Another challenge is managing the endpoints from day one , especially mobile devices .

network devices are the endpoints that are constantly connected to the Internet and exposed to its threats such as Meltdown , Spectre , Wannacry , and Petya .
More troubling , the typical end-user has little knowledge of those threats or their
84 Issue 02 | www . intelligentciso . com