SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Smart mobile devices will find their way to 
nearly two‐thirds of the worlds mobile 
workforce by 2015.
Having to carry two devices represents a clear 
opportunity for a better solution that must 
satisfy the needs of both IT professionals and 
the mobile users they serve.
Mobility ranks among the top enterprise 
priorities during the last year, and that 
enterprises are all set to improve their 
financial investments in the mobile devices, 
applications, middleware and services.
24 March 2014 PARAG DEODHAR 2
Automated 
Workforce 
•Document Management Systems (DMS), Field Force Automation (FFA), 
Salesforce Automation (SFA), Customer Relationship Management 
(CRM), and Enterprise Resource Planning (ERP).
•Minimize  paperwork,  reduce  back‐to‐office visits, improve productivity, 
and achieve higher sales closing ratios by simplifying and automating 
their day‐to‐day processes.
Always 
Connected 
Unified Communications (UC), Location‐based 
Services (LBS), and Business Intelligence (BI). 
Anytime, anywhere, any device real‐time 
communication and collaboration capabilities to 
employees. Enterprises can leverage LBS to track 
vehicles and employees in real‐time, while 
information can be extracted, analyzed and reported 
using BI. 
Pervasive 
Mobility 
Mobile Point‐of‐Sale (MPOS), 
Social Networking Services (SNS), 
Financial Management System 
(FMS)
Human Resource Management 
Systems (HRMS). 
Enhance brand image , facilitate 
efficient administration of internal 
operations 
24 March 2014 PARAG DEODHAR 3
• Consumerization of IT is driving new
devices and access requests
• Companies need to accept and address the 
reality
• People expect to work on multiple devices 
and from anywhere
• Companies need to provide access to 
applications and data from any device
• IT needs to change its processes and tools 
to manage the devices, taking security into 
consideration
PARAG DEODHAR 4
88%
Globally, 88% of 
executives report 
employees are using 
their personal computing 
technologies for business 
purposes today
‐ Gartner 
24 March 2014
The Blame Game – why company provided tools are not used?
– The system is too complicated and takes too long
– External partners have trouble accessing files I sent through company tools
– The company does not offer mobile access – convenience…
– I was never trained to use company systems
Source: Ponemon institute
Survey shows that 
many employees 
use high risk 
methods to store or 
move sensitive 
corporate data.
24 March 2014 PARAG DEODHAR 5
Laptops
Other devices – Tabs / Smart phones
– Company Owned
– BYOD 
• Shared devices
Risks!!!
– Data segregation
– Data Leakage
– Personal Data on device
– Unverified apps
– Lost, Stolen
24 March 2014 PARAG DEODHAR 6
Source: Symantec
24 March 2014 PARAG DEODHAR 7
Source: Checkpoint
HAVE YOU 
CHECKED FOR 
ROGUE WIFI 
NETWORKS IN 
YOUR OFFICE? 
24 March 2014 PARAG DEODHAR 8
Infecting legal web resources
– Mobile malware spreads via popular websites. More and more smartphone 
and tablet owners use their devices to access websites, unaware that even the 
most reputable resources can be hacked.
Distribution via alternative app stores. 
– In Asia there are numerous companies producing Android‐based devices and 
Android apps, and many of them offer users their own app stores containing 
programs that cannot be found in Google Play. The purely nominal control over 
the applications uploaded to these stores means attackers can conceal Trojans 
in apps made to look like innocent games or utilities.
Distribution via botnets.
– Bots self‐proliferate by sending out text messages with a malicious link to 
addresses in the victim’s address book. We also registered one episode of 
mobile malware spreading via a third‐party botnet.
Criminals are increasingly using obfuscation, the deliberate act of 
creating complex code to make it difficult to analyze. The more 
complex the obfuscation, the longer it will take an antivirus solution 
to neutralize the malicious code.
24 March 2014 PARAG DEODHAR 9
Android devices account for 60% of the infections observed in the mobile network. 
Malware is in the form of Trojanized apps with phishing spam campaigns luring 
victims to install the infected apps. 
Reasons:
– Android has largest smartphone market share. Maximize criminal’s RoI.
– Android offers the ability to load apps from third‐party app sites. Un‐policed mechanism 
to distribute their malware.
– It is trivial for an attacker to hijack a legitimate Android application, inject malware into 
it and redistribute it for consumption. There are now binder kits available that will allow 
an attacker to automatically inject malware into an existing application. This is only 
exacerbated by Android’s incredibly weak app signing policy that encourages using self‐
signed certificates to sign applications.
Common Malware:
– Adware
– Information Stealers
– Spy Phone
– SMS Trojans
– Banking Trojans
– Fake Security Software
24 March 2014 PARAG DEODHAR 10
24 March 2014 PARAG DEODHAR 11
Jailbreak Jammers
– Fool the MDM agent by patching the device leaving no trace for 
the MDM agent to detect if the device is Jailbroken or Rooted. 
mRAT
– Gets high privilege access and can access all communications that 
happen on the device, can access all encrypted emails and secure 
highly confidential documents and then sends these content to 
the attacker’s command and control (C&C) servers
– Bypass container encryption – grab the information at the point 
where the user pulls up the data to read it.
Mobile Device Tunnel Borers
– Since the tunnel is typically created on allowed ports (e.g. port 22, 
SSH) it cannot be blocked by Firewalls and or IDS/IPS solution.
24 March 2014 PARAG DEODHAR 12
Corporate Owned
• High Cost = Device  + Management
• Allow personal data – risk of “pirated” 
software / images / videos on corporate 
device
• Generally single OS/brand/model – easy to 
manage but no choice for employees
BYOD
• Increases Productivity – myth or fact?
• Lower cost
• Multiple OS/brands/models to manage
• Employee privacy – does law allow data 
wiping on assets owned by someone else? 
24 March 2014 PARAG DEODHAR 13
MAM
MIM
24 March 2014 PARAG DEODHAR 14
DEVICE
APPLICATION
DATA
• Ability to ensure the proper 
protection around the entire device 
and ensure compliance with the set 
policies.
• Central management of all mobile 
devices and ability to check 
compliance of each device.
• Security around the information is 
an unknown.
• Ability to apply controls becomes 
significantly difficult.
• Monitoring becomes significantly 
difficult.
• Centralized location for data and 
information.
• Ability to access information from 
almost any device and share 
between multiple platforms
• Loss of native apps and the “look 
and feel” of what the user is 
typically accustomed to
• Intrusive management & lock down
• Degraded user experience and 
added troubleshooting 
requirements
• Electronic Discovery difficult.
• Inability to separate personal data 
from company data.
• Containerization.
• Policies are pushed only to the 
container; user experience is not 
impacted for the entire phone.
• Applications within the container 
• Support single‐sign‐on 
COMPLY WITH APPLICABLE LAWS AND REGULATIONS 
FOCUS ON DATA – NOT ON DEVICE
POLICY AND TRAINING / AWARENESS
END USER AGREEMENT
LIST OF ALLOWED DEVICES
CHOOSE THE RIGHT MDM / MAM / MIM SOLUTION
– YOUR ENVIRONMENT & DEVICES
– DATA FLOW AND ACCESS REQUIREMENTS
– CONVENIENCE v/s SECURITY
• CONTAINERIZATION & DEVICE LEVEL POLICIES
• SECURE WIPE
• IDENTITY AND ACCESS
• ENCRYPTION 
– EMPLOYEE PERSONAL DATA PRIVACY
– CORPORATE APP STORE
– INTEGRATION WITH DLP & DRM
MOBILE SECURITY SOLUTIONS 
IMPLEMENT ENHANCED NETWORK SECURITY FOR MOBILE GATEWAYS
TRAIN APPLICATION DEVELOPERS IN SECURE CODING PRACTICES FOR MOBILE DEVICE PLATFORMS
LIMIT THE SENSITIVE DATA TRANSFERRED TO MOBILE  DEVICES, OR CONSIDER VIEW‐ONLY ACCESS.
PERFORM TECHNICAL SECURITY ASSESSMENTS ON MOBILE DEVICES AND THE SUPPORTING 
INFRASTRUCTURE — FOCUS ON DEVICE‐SIDE  DATA STORAGE. 
ESTABLISH A PROGRAM THAT CONTINUALLY EVALUATES NEW AND EMERGING THREATS IN MOBILE PLATFORMS. 
AUDIT THE DEVICES…
24 March 2014 PARAG DEODHAR 15
Securing the mobile enterprise - Sydney 24 Mar 2014

Weitere ähnliche Inhalte

Was ist angesagt?

MSP Industry Brief - From Break / Fix to Recurring Revenue
MSP Industry Brief - From Break / Fix to Recurring Revenue MSP Industry Brief - From Break / Fix to Recurring Revenue
MSP Industry Brief - From Break / Fix to Recurring Revenue Madeline Titcomb
 
Why MBaaS Now
Why MBaaS NowWhy MBaaS Now
Why MBaaS NowCognizant
 
Personalized, Digital Marketing for Retailers in a Box
Personalized, Digital Marketing for Retailers in a BoxPersonalized, Digital Marketing for Retailers in a Box
Personalized, Digital Marketing for Retailers in a Boxgigantictyro9972
 
How technology is changing the business
How technology is changing the businessHow technology is changing the business
How technology is changing the businessManoj Bhuva
 
Digital Transformation and Power BI
Digital Transformation and Power BIDigital Transformation and Power BI
Digital Transformation and Power BIAniket Kanitkar
 
Mapping an effective location intelligence strategy
Mapping an effective location intelligence strategyMapping an effective location intelligence strategy
Mapping an effective location intelligence strategyThe Marketing Distillery
 
Digital Future of IT Service Providers - Converge Chennai 2015
Digital Future of IT Service Providers - Converge Chennai 2015Digital Future of IT Service Providers - Converge Chennai 2015
Digital Future of IT Service Providers - Converge Chennai 2015Thoughtworks
 
DigiQubeMedia - digital retail solutions
DigiQubeMedia - digital retail solutionsDigiQubeMedia - digital retail solutions
DigiQubeMedia - digital retail solutionsdigiqubemedia
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesCognizant
 
Intergen public sector datasheet
Intergen public sector datasheetIntergen public sector datasheet
Intergen public sector datasheetIntergen
 
Intershop Architecture Product Landscape
Intershop Architecture Product LandscapeIntershop Architecture Product Landscape
Intershop Architecture Product LandscapeMauro Boffardi
 
Creative Intelligence
Creative IntelligenceCreative Intelligence
Creative IntelligenceNadeem Amin
 
Crmnext's AI-driven CRM vs Traditional CRM systems
Crmnext's AI-driven CRM vs Traditional CRM systemsCrmnext's AI-driven CRM vs Traditional CRM systems
Crmnext's AI-driven CRM vs Traditional CRM systemsCRMNEXT
 
Intergen financial sector datasheet
Intergen financial sector datasheetIntergen financial sector datasheet
Intergen financial sector datasheetIntergen
 
Re7 hink performance management (pm) fj
Re7 hink performance management (pm) fjRe7 hink performance management (pm) fj
Re7 hink performance management (pm) fjFriedel Jonker
 
Insurance Mobility Business Strategy: A Roadmap and Implementation Approach
Insurance Mobility Business Strategy: A Roadmap and Implementation ApproachInsurance Mobility Business Strategy: A Roadmap and Implementation Approach
Insurance Mobility Business Strategy: A Roadmap and Implementation ApproachCognizant
 

Was ist angesagt? (20)

Smart CRM through Smart Internet of Things
Smart CRM through Smart Internet of ThingsSmart CRM through Smart Internet of Things
Smart CRM through Smart Internet of Things
 
I ty x_platform_jw
I ty x_platform_jwI ty x_platform_jw
I ty x_platform_jw
 
MSP Industry Brief - From Break / Fix to Recurring Revenue
MSP Industry Brief - From Break / Fix to Recurring Revenue MSP Industry Brief - From Break / Fix to Recurring Revenue
MSP Industry Brief - From Break / Fix to Recurring Revenue
 
2014 phillyForce keynote
2014 phillyForce keynote2014 phillyForce keynote
2014 phillyForce keynote
 
Why MBaaS Now
Why MBaaS NowWhy MBaaS Now
Why MBaaS Now
 
Personalized, Digital Marketing for Retailers in a Box
Personalized, Digital Marketing for Retailers in a BoxPersonalized, Digital Marketing for Retailers in a Box
Personalized, Digital Marketing for Retailers in a Box
 
How technology is changing the business
How technology is changing the businessHow technology is changing the business
How technology is changing the business
 
Digital Transformation and Power BI
Digital Transformation and Power BIDigital Transformation and Power BI
Digital Transformation and Power BI
 
Mapping an effective location intelligence strategy
Mapping an effective location intelligence strategyMapping an effective location intelligence strategy
Mapping an effective location intelligence strategy
 
Digital Future of IT Service Providers - Converge Chennai 2015
Digital Future of IT Service Providers - Converge Chennai 2015Digital Future of IT Service Providers - Converge Chennai 2015
Digital Future of IT Service Providers - Converge Chennai 2015
 
ServiceFirstdoc
ServiceFirstdocServiceFirstdoc
ServiceFirstdoc
 
DigiQubeMedia - digital retail solutions
DigiQubeMedia - digital retail solutionsDigiQubeMedia - digital retail solutions
DigiQubeMedia - digital retail solutions
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
 
Intergen public sector datasheet
Intergen public sector datasheetIntergen public sector datasheet
Intergen public sector datasheet
 
Intershop Architecture Product Landscape
Intershop Architecture Product LandscapeIntershop Architecture Product Landscape
Intershop Architecture Product Landscape
 
Creative Intelligence
Creative IntelligenceCreative Intelligence
Creative Intelligence
 
Crmnext's AI-driven CRM vs Traditional CRM systems
Crmnext's AI-driven CRM vs Traditional CRM systemsCrmnext's AI-driven CRM vs Traditional CRM systems
Crmnext's AI-driven CRM vs Traditional CRM systems
 
Intergen financial sector datasheet
Intergen financial sector datasheetIntergen financial sector datasheet
Intergen financial sector datasheet
 
Re7 hink performance management (pm) fj
Re7 hink performance management (pm) fjRe7 hink performance management (pm) fj
Re7 hink performance management (pm) fj
 
Insurance Mobility Business Strategy: A Roadmap and Implementation Approach
Insurance Mobility Business Strategy: A Roadmap and Implementation ApproachInsurance Mobility Business Strategy: A Roadmap and Implementation Approach
Insurance Mobility Business Strategy: A Roadmap and Implementation Approach
 

Andere mochten auch

Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challengesParag Deodhar
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computingTISEE
 
POJER E SANDRI Vinix 15.08 2011
 POJER E SANDRI Vinix  15.08 2011  POJER E SANDRI Vinix  15.08 2011
POJER E SANDRI Vinix 15.08 2011 Daniel Cerami
 
Twitter for local business
Twitter for local businessTwitter for local business
Twitter for local businessWhizbang
 
Healtheducation 090714065946 Phpapp02
Healtheducation 090714065946 Phpapp02Healtheducation 090714065946 Phpapp02
Healtheducation 090714065946 Phpapp02Nidheesha Manganam
 
FY 2012 Consolidated Results (March 15, 2013)
FY 2012 Consolidated Results (March 15, 2013)FY 2012 Consolidated Results (March 15, 2013)
FY 2012 Consolidated Results (March 15, 2013)Terna SpA
 
Quantitative microbial population characterization to reveal sources of bacte...
Quantitative microbial population characterization to reveal sources of bacte...Quantitative microbial population characterization to reveal sources of bacte...
Quantitative microbial population characterization to reveal sources of bacte...WWNazaroff
 
Carpeta tradicional
Carpeta tradicionalCarpeta tradicional
Carpeta tradicionalCVAugusto
 
Ist storyboard final
Ist storyboard finalIst storyboard final
Ist storyboard finalkayeleanne
 
Associated Partners - Business Profile
Associated Partners - Business ProfileAssociated Partners - Business Profile
Associated Partners - Business ProfileDhananjay Walke
 
1H12 Consolidated Results
1H12 Consolidated Results1H12 Consolidated Results
1H12 Consolidated ResultsTerna SpA
 
BQ-Engg Design Services 2012
BQ-Engg Design Services 2012BQ-Engg Design Services 2012
BQ-Engg Design Services 2012NEERAJ SRIVASTAVA
 
Appropriate healthcare technologies for low resource settings use of m-tech...
Appropriate healthcare technologies  for low resource settings  use of m-tech...Appropriate healthcare technologies  for low resource settings  use of m-tech...
Appropriate healthcare technologies for low resource settings use of m-tech...MobileDiagnosis Non Profit Association
 

Andere mochten auch (20)

Cloud computing risk & challenges
Cloud computing risk & challengesCloud computing risk & challenges
Cloud computing risk & challenges
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computing
 
MobileDiagnosis 2013
MobileDiagnosis 2013 MobileDiagnosis 2013
MobileDiagnosis 2013
 
POJER E SANDRI Vinix 15.08 2011
 POJER E SANDRI Vinix  15.08 2011  POJER E SANDRI Vinix  15.08 2011
POJER E SANDRI Vinix 15.08 2011
 
Twitter for local business
Twitter for local businessTwitter for local business
Twitter for local business
 
Blanca nelly diaz
Blanca nelly diaz Blanca nelly diaz
Blanca nelly diaz
 
Healtheducation 090714065946 Phpapp02
Healtheducation 090714065946 Phpapp02Healtheducation 090714065946 Phpapp02
Healtheducation 090714065946 Phpapp02
 
Photos
PhotosPhotos
Photos
 
FY 2012 Consolidated Results (March 15, 2013)
FY 2012 Consolidated Results (March 15, 2013)FY 2012 Consolidated Results (March 15, 2013)
FY 2012 Consolidated Results (March 15, 2013)
 
Blanca nelly diaz
Blanca nelly diaz Blanca nelly diaz
Blanca nelly diaz
 
Amazon summit 2015
Amazon summit 2015Amazon summit 2015
Amazon summit 2015
 
Quantitative microbial population characterization to reveal sources of bacte...
Quantitative microbial population characterization to reveal sources of bacte...Quantitative microbial population characterization to reveal sources of bacte...
Quantitative microbial population characterization to reveal sources of bacte...
 
Carpeta tradicional
Carpeta tradicionalCarpeta tradicional
Carpeta tradicional
 
Ist storyboard final
Ist storyboard finalIst storyboard final
Ist storyboard final
 
Associated Partners - Business Profile
Associated Partners - Business ProfileAssociated Partners - Business Profile
Associated Partners - Business Profile
 
Coe rapporto novembre 2014
Coe rapporto novembre 2014Coe rapporto novembre 2014
Coe rapporto novembre 2014
 
Asha
AshaAsha
Asha
 
1H12 Consolidated Results
1H12 Consolidated Results1H12 Consolidated Results
1H12 Consolidated Results
 
BQ-Engg Design Services 2012
BQ-Engg Design Services 2012BQ-Engg Design Services 2012
BQ-Engg Design Services 2012
 
Appropriate healthcare technologies for low resource settings use of m-tech...
Appropriate healthcare technologies  for low resource settings  use of m-tech...Appropriate healthcare technologies  for low resource settings  use of m-tech...
Appropriate healthcare technologies for low resource settings use of m-tech...
 

Ähnlich wie Securing the mobile enterprise - Sydney 24 Mar 2014

Mastering Service Management Top Software Solutions for Every Business.pptx
Mastering Service Management Top Software Solutions for Every Business.pptxMastering Service Management Top Software Solutions for Every Business.pptx
Mastering Service Management Top Software Solutions for Every Business.pptxGenic Teams
 
Mobility, at the heart of business
Mobility, at the heart of businessMobility, at the heart of business
Mobility, at the heart of businessGFI Portugal
 
The Top 4 Components of a Leave Management System for 2024.pdf
The Top 4 Components of a Leave Management System for 2024.pdfThe Top 4 Components of a Leave Management System for 2024.pdf
The Top 4 Components of a Leave Management System for 2024.pdfJose thomas
 
Mobile Enterprise Analytics in 60 Minutes
Mobile Enterprise Analytics in 60 MinutesMobile Enterprise Analytics in 60 Minutes
Mobile Enterprise Analytics in 60 MinutesCognizant
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachRapidValue
 
What to look for in a Digital Experience Platform?
What to look for in a Digital Experience Platform?What to look for in a Digital Experience Platform?
What to look for in a Digital Experience Platform?Ruud Kluivers
 
Recoding the Customer Experience
Recoding the Customer ExperienceRecoding the Customer Experience
Recoding the Customer ExperienceCognizant
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperAbhishek Sood
 
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Happiest Minds Technologies
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013 Regalix
 
Executive Briefing Business Anywhere Transformed
Executive Briefing   Business Anywhere     TransformedExecutive Briefing   Business Anywhere     Transformed
Executive Briefing Business Anywhere TransformedChris Keaton
 
HTCpro White Paper
HTCpro White PaperHTCpro White Paper
HTCpro White Papersthakkar12
 
8 reasons why your business needs mobile CRM
8 reasons why your business needs mobile CRM8 reasons why your business needs mobile CRM
8 reasons why your business needs mobile CRMSage
 
Enterprise Mobility Apps for SBM
Enterprise Mobility Apps for SBMEnterprise Mobility Apps for SBM
Enterprise Mobility Apps for SBMWirehead Technology
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfJPLoft Solutions
 
Facts about Mobile Enterprise Applications
Facts about Mobile Enterprise ApplicationsFacts about Mobile Enterprise Applications
Facts about Mobile Enterprise Applicationsvlink india
 
Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011fivehmg_m
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-BusinessEyad Almasri
 

Ähnlich wie Securing the mobile enterprise - Sydney 24 Mar 2014 (20)

The Individual Enterprise
The Individual EnterpriseThe Individual Enterprise
The Individual Enterprise
 
London 2012 brochure - Smart Mobility
London 2012 brochure - Smart MobilityLondon 2012 brochure - Smart Mobility
London 2012 brochure - Smart Mobility
 
Mastering Service Management Top Software Solutions for Every Business.pptx
Mastering Service Management Top Software Solutions for Every Business.pptxMastering Service Management Top Software Solutions for Every Business.pptx
Mastering Service Management Top Software Solutions for Every Business.pptx
 
Mobility, at the heart of business
Mobility, at the heart of businessMobility, at the heart of business
Mobility, at the heart of business
 
The Top 4 Components of a Leave Management System for 2024.pdf
The Top 4 Components of a Leave Management System for 2024.pdfThe Top 4 Components of a Leave Management System for 2024.pdf
The Top 4 Components of a Leave Management System for 2024.pdf
 
Mobile Enterprise Analytics in 60 Minutes
Mobile Enterprise Analytics in 60 MinutesMobile Enterprise Analytics in 60 Minutes
Mobile Enterprise Analytics in 60 Minutes
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approach
 
What to look for in a Digital Experience Platform?
What to look for in a Digital Experience Platform?What to look for in a Digital Experience Platform?
What to look for in a Digital Experience Platform?
 
Recoding the Customer Experience
Recoding the Customer ExperienceRecoding the Customer Experience
Recoding the Customer Experience
 
Don't come last in a mobile first --Whitepaper
Don't come last in a mobile first --WhitepaperDon't come last in a mobile first --Whitepaper
Don't come last in a mobile first --Whitepaper
 
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
Whitepaper: Enabling Enterprise to Implement Mobility Strategy Using an Unort...
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
Executive Briefing Business Anywhere Transformed
Executive Briefing   Business Anywhere     TransformedExecutive Briefing   Business Anywhere     Transformed
Executive Briefing Business Anywhere Transformed
 
HTCpro White Paper
HTCpro White PaperHTCpro White Paper
HTCpro White Paper
 
8 reasons why your business needs mobile CRM
8 reasons why your business needs mobile CRM8 reasons why your business needs mobile CRM
8 reasons why your business needs mobile CRM
 
Enterprise Mobility Apps for SBM
Enterprise Mobility Apps for SBMEnterprise Mobility Apps for SBM
Enterprise Mobility Apps for SBM
 
Enterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdfEnterprise Mobility Solutions Guides.pdf
Enterprise Mobility Solutions Guides.pdf
 
Facts about Mobile Enterprise Applications
Facts about Mobile Enterprise ApplicationsFacts about Mobile Enterprise Applications
Facts about Mobile Enterprise Applications
 
Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011Unlocking the power of mdm aug 2011
Unlocking the power of mdm aug 2011
 
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-BusinessChapter 6/Mobile Commerce  and Ubiquitous Computing Technology of E-Business
Chapter 6/Mobile Commerce and Ubiquitous Computing Technology of E-Business
 

Mehr von Parag Deodhar

Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Parag Deodhar
 
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Parag Deodhar
 
How to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkHow to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkParag Deodhar
 
BCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentBCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentParag Deodhar
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right postureParag Deodhar
 
Scouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag DeodharScouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag DeodharParag Deodhar
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Defining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationDefining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationParag Deodhar
 
Frauds making fs companies uncompetitive parag deodhar
Frauds making fs companies uncompetitive   parag deodharFrauds making fs companies uncompetitive   parag deodhar
Frauds making fs companies uncompetitive parag deodharParag Deodhar
 
Acfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharAcfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharParag Deodhar
 

Mehr von Parag Deodhar (11)

Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
Risks Beyond the Boundary: Data Protection & Privacy Challenges, OpRiskAsia 2...
 
How to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC FrameworkHow to implement and align Technology within your GRC Framework
How to implement and align Technology within your GRC Framework
 
BCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & AssessmentBCM Continuous improvement - Audit & Assessment
BCM Continuous improvement - Audit & Assessment
 
IT Risk Management - the right posture
IT Risk Management - the right postureIT Risk Management - the right posture
IT Risk Management - the right posture
 
Scouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag DeodharScouting For Fraud - Parag Deodhar
Scouting For Fraud - Parag Deodhar
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Defining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaborationDefining effective governance structures and nurturing collaboration
Defining effective governance structures and nurturing collaboration
 
Frauds making fs companies uncompetitive parag deodhar
Frauds making fs companies uncompetitive   parag deodharFrauds making fs companies uncompetitive   parag deodhar
Frauds making fs companies uncompetitive parag deodhar
 
Acfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodharAcfe bangalore pdm 2 fraud risk - parag deodhar
Acfe bangalore pdm 2 fraud risk - parag deodhar
 

Kürzlich hochgeladen

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Kürzlich hochgeladen (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Securing the mobile enterprise - Sydney 24 Mar 2014