Chief Information Security Officer

Synchronoss' Field Chief Technology Officer on the State of Enterprise Mobility

Daren Glenister, Field Chief Technology Officer, Synchronoss, discussed enterprise mobility and what it means for today’s organizations in his presentation to Argyle’s CISO membership at the 2017 Chief Information Security Officer Leadership Forum in Chicago on May 4. In his presentation, “The State of Enterprise Mobility,” Glenister described what it takes for an organization to launch a successful enterprise mobility strategy.

According to Glenister, there are three pillars of enterprise mobility:

  • Security: Security is essential and ranges from no device protection to various levels of on-device, multi-factor authentication combined with encryption of data in transit.
  • Productivity: Greater productivity is the key objective of mobility, Glenister said.
  • Contextuality: Basic enterprise mobility offers little or no visibility into how mobile devices are being used and how employees are benefiting from it.

Moreover, Glenister said the mobility maturity model features four levels:

  • Entry-Level: Includes basic tools (calendar, email, etc.) without the need for data collection or mobile device security requirements.
  • Opportunistic: Involves the use of some file-sharing tools, along with limited use of data collection and passwords for security.
  • Additive: Incorporates proprietary apps, creative use of mobile data and location data for improved business processes and multi-factor authentication and other measures to bolster security.
  • Transformational: Empowers users with the ability to securely share information with external third parties at any time.

Glenister indicated about a recent study showed 81 percent of organizations are using “very basic” security – something that puts both organizations and employees at risk.

“[Many organizations] are using entry-level devices, and they are not putting any security around those devices,” Glenister pointed out. “The device security is completely inadequate, and that’s scary.”

Over time, an organization may start to see notable productivity increases if it implements an effective enterprise mobility model, Glenister indicated.

“As you start to integrate your mobile devices into your business workflow, you start to see an increase in productivity.”

With this model in place, employees will be able to use fast, secure mobile devices day after day. Meanwhile, workers will be able to use these devices to streamline everyday process to become more productive and boost an organization’s chances to achieve its immediate and long-term goals.

“As you start to integrate your mobile devices into your business workflow, you start to see an increase in productivity,” Glenister said.

Furthermore, enterprise mobility that goes beyond entry-level processes and procedures may help an organization foster a security-centric approach to mobile device management.

Teaching employees how to use mobile devices safely and adding mobile features and functionality empowers users to get the most out of the mobile devices available to them. As such, organizations may be able to reduce the number its help desk calls if they educate employees about enterprise mobility.

“Help desk calls will drop if people are trained on how to use multi-factor authentication on their phones,” Glenister stated. “Multi-factor authentication becomes less of a problem for people as organizations start to roll out more features and functions.”

The end goal of an enterprise mobility program involves providing value for both an organization and its employees, Glenister said. However, many organizations struggle to measure the success of an enterprise mobility program.

“[Many organizations] are using entry-level devices, and they are not putting any security around those devices.”

To overcome this hurdle, Glenister recommended that organizations foster collaboration between IT teams and C-suite executives. Together, IT teams and C-suite executives can uncover the best ways to launch a successful enterprise mobility strategy.

“Looking at the impacts of a more mature mobile platform has a direct impact on the IT team, the CIO and the CISO,” Glenister said. “That impact comes from the perception of the value that you’re having on the organization.”

Glenister also pointed out that many organizations want to use mobile devices to drive ongoing business enhancements, yet few organizations possess the skills and know-how to do so effectively.

Allocating the necessary time and resources to understand an organization’s goals – and how an effective enterprise mobility strategy can contribute to meeting or surpassing these goals – is paramount.

If an organization develops an enterprise mobility strategy in conjunction with its everyday goals, it can find ways to help employees get the most out of their mobile devices. In addition, this organization will be able to measure the progress of its enterprise mobility strategy for an extended period of time, identify strategy strengths and weaknesses and explore innovative ways to optimize the value of this strategy consistently.

“When you move from entry-level mobile devices to additive or opportunistic, there is a significant increase in internal perception,” Glenister noted. “In our roles, the CIO and CISO have a three- or four-year role. If you want to improve that lifespan, you may want to look at how you impact the business and drive business improvement.”

Visit Argyle Executive Forum's CYBERSECURITY LEADERSHIP FORUM - San Francisco in San Francisco, CA on Mar 19, 2020

right arrow icon

Next Article:
ObserveIT's CEO Provides Best Practices for Building an Insider Threat Program