SlideShare a Scribd company logo
1 of 1
Multiple
personal
devices
MDMIAM
APP
STORE
SVC
DESK
Security Starts with People
…and every person is unique and complex:
And People are Constantly Moving
How do you keep track of the new agile workforce?
What are the Risks?
Multiple
personal
applications
Multiple
locations
(office, home, remote
site, car, etc.)
Clearance
factors
(work status, places,
applications,time
of day, etc.)
37.2% 55%37.2%of the world’s workers are mobile.1
55%of workers view work-related
information on personal devices.2
Evolving
work roles
of organizations have
no transition process
for their workforce4
Job Hopping
By Industry
Information technology 42%
Leisure/hospitality 41%
Transportation 37%
Retail 36%
Manufacturing 32%
Shorter employee tenures
Part-timers
Contractors & freelancers
Seasonal workers
Users from outside organizations
(suppliers, partners, customers)
50%50%
Challenges:
Rapid onboarding, maintaining permissions, job status
changes, timely provisioning, accommodating personal
devices, timely off-boarding, and more…
Unauthorized access by former users Lost/stolen devices
System downtime
Lost/stolen data
Business disruption
Financial/legal liability
Loss of reputation & company value
still had system access after
leaving the company6
24%ofworkers
customer records were improperly
accessed from Morgan Stanley –
350,000
that’s an average of
$820peremployee
7
Non-compliance
Unauthorized devices used to access
sensitive data
exposing 900 super-rich clients
representing $2trillionof the
firm’s portfolio8
Think compliance is expensive?
Non-compliance costs
2.65X more–
Securing the Digital Workforce
The Prescription for
1
Profile every
user in detail
don’t rely on generic
profile “categories”
WORK STATUS
LOCATIONS
DEVICES
ADMINISTRATIVE RIGHTS
APPLICATIONS
TIME-OF-DAY RESTRICTIONS
ETC.
2
Unify and
correlate
leverage user profile
data across IT
service functions
3
Enable
“contextual
awareness”
centralize visibility and
control, tracking users
in real-time across the
entire employment
lifecycle
ONBOARDING WORK ROLE
CHANGES
OFF-BOARDING
4
Document
and analyze
user actions to
anticipate user needs
and optimize security
and compliance
PREDICTIVE IT SERVICES
LEARN MORE
about how you can enable users to work where, when
and how they prefer — all while securing those end points
and centralizing visibility, audit trails and controls.
1 IDC, 2012 study*
2 IDG, “How Mobility is Disrupting Technology and Information Consumption,” 2012
3 Freelance Union “Freelancing in America: A National Survey of the New Workforce”*
4 SilkRoad, “State of Talent Management Survey,” 2013
5 Harris Poll/CareerBuilder study, May 2014
6 Ponemon Institute, “Data Loss Risks During Downsizing,” February 2009
7 Ponemon Institute, “The True Cost of Compliance: A Benchmark Study of Multinational
Organizations,” January 2011
8 Wall Street Journal, January 6, 2015
*need to verify source/date
An IDC study released in January 2012 says that the world’s mobile worker population will reach 1.3
billion by 2015, representing 37.2% of the total workforce. Enterprises cannot afford to be slow in creating
budgets, strategies, policies and processes to address this trend.
A Citrix study forecasts that by mid 2013, 94% of companies will have a BYOD policy. Gartner adds that by
2014, 90% of organizations will support corporate applications on devices owned by workers.
of the global workforce
is contracting by 20153
34%34%
The User Enablement Dilemma:
How do you empower users while maximizing
security and compliance?
Personal Apps & Devices

More Related Content

What's hot

Avco Systems SCC Creating Single View
Avco Systems SCC Creating Single ViewAvco Systems SCC Creating Single View
Avco Systems SCC Creating Single View
xband
 

What's hot (20)

Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
The impact of the bring your own device byod trend in the workplace
The impact of the bring your own device byod trend in the workplaceThe impact of the bring your own device byod trend in the workplace
The impact of the bring your own device byod trend in the workplace
 
Careless Users In the Cloud (And What IT Can Do About It)
Careless Users In the Cloud (And What IT Can Do About It)Careless Users In the Cloud (And What IT Can Do About It)
Careless Users In the Cloud (And What IT Can Do About It)
 
5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off
 
Top Six reasons to choose IBM for Collaboration Solutions
Top Six reasons to choose IBM for Collaboration SolutionsTop Six reasons to choose IBM for Collaboration Solutions
Top Six reasons to choose IBM for Collaboration Solutions
 
Infographic: Mobile Security Research
Infographic: Mobile Security ResearchInfographic: Mobile Security Research
Infographic: Mobile Security Research
 
Mobile Device Mgmt Healthcare Whitepaper
Mobile Device Mgmt Healthcare WhitepaperMobile Device Mgmt Healthcare Whitepaper
Mobile Device Mgmt Healthcare Whitepaper
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECM
 
Ecm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sampleEcm implementation planning_workshop_hospital_sample
Ecm implementation planning_workshop_hospital_sample
 
Benefits and Challenges of Notified Body Remote Audits
Benefits and Challenges of Notified Body Remote AuditsBenefits and Challenges of Notified Body Remote Audits
Benefits and Challenges of Notified Body Remote Audits
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
 
Ethical Questions of Facial Recognition Technologies by Mika Nieminen
Ethical Questions of Facial Recognition Technologies by Mika Nieminen Ethical Questions of Facial Recognition Technologies by Mika Nieminen
Ethical Questions of Facial Recognition Technologies by Mika Nieminen
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articles
 
Bring IT together_2015_ECOOandOASBO
Bring IT together_2015_ECOOandOASBOBring IT together_2015_ECOOandOASBO
Bring IT together_2015_ECOOandOASBO
 
Workflow enhances ECM adoption_LaserFicheEpower14
Workflow enhances ECM adoption_LaserFicheEpower14Workflow enhances ECM adoption_LaserFicheEpower14
Workflow enhances ECM adoption_LaserFicheEpower14
 
Avco Systems SCC Creating Single View
Avco Systems SCC Creating Single ViewAvco Systems SCC Creating Single View
Avco Systems SCC Creating Single View
 
Student Mobile Workspaces Infographic
Student Mobile Workspaces InfographicStudent Mobile Workspaces Infographic
Student Mobile Workspaces Infographic
 
Healthcare trends and information management strategy
Healthcare trends and information management strategyHealthcare trends and information management strategy
Healthcare trends and information management strategy
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 

Similar to The User Enablement Dilemma: How do you empower users while maximizing security and compliance?

Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
It's all about big data
It's all about big dataIt's all about big data
It's all about big data
Yuxin Tu, PhD
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
Транслируем.бел
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
Sno Jutt
 

Similar to The User Enablement Dilemma: How do you empower users while maximizing security and compliance? (20)

When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
2014 Guide to Backroom-to-Boardroom Payroll and HR
2014 Guide to Backroom-to-Boardroom Payroll and HR2014 Guide to Backroom-to-Boardroom Payroll and HR
2014 Guide to Backroom-to-Boardroom Payroll and HR
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Secure data access in a mobile universe
Secure data access in a mobile universeSecure data access in a mobile universe
Secure data access in a mobile universe
 
Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
It's all about big data
It's all about big dataIt's all about big data
It's all about big data
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At Work
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 

More from RES

Business Meets IT Webinar - Automation For A Better Tomorrow
Business Meets IT Webinar - Automation For A Better TomorrowBusiness Meets IT Webinar - Automation For A Better Tomorrow
Business Meets IT Webinar - Automation For A Better Tomorrow
RES
 

More from RES (20)

Sobering Truths of Windows 10 Migration
Sobering Truths of Windows 10 Migration Sobering Truths of Windows 10 Migration
Sobering Truths of Windows 10 Migration
 
Transforming the digital experience of your workforce
Transforming the digital experience of your workforceTransforming the digital experience of your workforce
Transforming the digital experience of your workforce
 
RES Viewpoint 2016
RES Viewpoint 2016RES Viewpoint 2016
RES Viewpoint 2016
 
Empower Your Workforce Through Self Service
Empower Your Workforce Through Self ServiceEmpower Your Workforce Through Self Service
Empower Your Workforce Through Self Service
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
 
Conquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service AdoptionConquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service Adoption
 
Technology for People in Healthcare
Technology for People in HealthcareTechnology for People in Healthcare
Technology for People in Healthcare
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
I Need it Right Now! Successfully Equipping and Empowering the Digital WorkforceI Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
I Need it Right Now! Successfully Equipping and Empowering the Digital Workforce
 
Het IT-Dilemma: Biedt Optimale Gebruikersondersteuning én Maximaliseer Veilig...
Het IT-Dilemma: Biedt Optimale Gebruikersondersteuning én Maximaliseer Veilig...Het IT-Dilemma: Biedt Optimale Gebruikersondersteuning én Maximaliseer Veilig...
Het IT-Dilemma: Biedt Optimale Gebruikersondersteuning én Maximaliseer Veilig...
 
Healthcare Security by the Numbers - 2015
Healthcare Security by the Numbers - 2015Healthcare Security by the Numbers - 2015
Healthcare Security by the Numbers - 2015
 
HET GEVECHT voor IT
HET GEVECHT voor ITHET GEVECHT voor IT
HET GEVECHT voor IT
 
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be InnovatingAre Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
 
How to Empower Your Clinician with Automated Self-Service Technology
How to Empower Your Clinician with Automated Self-Service TechnologyHow to Empower Your Clinician with Automated Self-Service Technology
How to Empower Your Clinician with Automated Self-Service Technology
 
Empowering The End User - The Future of IT Support, Developing a First Class ...
Empowering The End User - The Future of IT Support, Developing a First Class ...Empowering The End User - The Future of IT Support, Developing a First Class ...
Empowering The End User - The Future of IT Support, Developing a First Class ...
 
Business Meets IT Webinar - Automation For A Better Tomorrow
Business Meets IT Webinar - Automation For A Better TomorrowBusiness Meets IT Webinar - Automation For A Better Tomorrow
Business Meets IT Webinar - Automation For A Better Tomorrow
 
Beyond the Enterprise App Store – Webinar Slides
Beyond the Enterprise App Store – Webinar SlidesBeyond the Enterprise App Store – Webinar Slides
Beyond the Enterprise App Store – Webinar Slides
 
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar SlidesMind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
 
VDIdealist - 7 Ways to Improve Your IT by 10X in 2014
VDIdealist - 7 Ways to Improve Your IT by 10X in 2014VDIdealist - 7 Ways to Improve Your IT by 10X in 2014
VDIdealist - 7 Ways to Improve Your IT by 10X in 2014
 

Recently uploaded

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
instagramfab782445
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 

Recently uploaded (20)

The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 

The User Enablement Dilemma: How do you empower users while maximizing security and compliance?

  • 1. Multiple personal devices MDMIAM APP STORE SVC DESK Security Starts with People …and every person is unique and complex: And People are Constantly Moving How do you keep track of the new agile workforce? What are the Risks? Multiple personal applications Multiple locations (office, home, remote site, car, etc.) Clearance factors (work status, places, applications,time of day, etc.) 37.2% 55%37.2%of the world’s workers are mobile.1 55%of workers view work-related information on personal devices.2 Evolving work roles of organizations have no transition process for their workforce4 Job Hopping By Industry Information technology 42% Leisure/hospitality 41% Transportation 37% Retail 36% Manufacturing 32% Shorter employee tenures Part-timers Contractors & freelancers Seasonal workers Users from outside organizations (suppliers, partners, customers) 50%50% Challenges: Rapid onboarding, maintaining permissions, job status changes, timely provisioning, accommodating personal devices, timely off-boarding, and more… Unauthorized access by former users Lost/stolen devices System downtime Lost/stolen data Business disruption Financial/legal liability Loss of reputation & company value still had system access after leaving the company6 24%ofworkers customer records were improperly accessed from Morgan Stanley – 350,000 that’s an average of $820peremployee 7 Non-compliance Unauthorized devices used to access sensitive data exposing 900 super-rich clients representing $2trillionof the firm’s portfolio8 Think compliance is expensive? Non-compliance costs 2.65X more– Securing the Digital Workforce The Prescription for 1 Profile every user in detail don’t rely on generic profile “categories” WORK STATUS LOCATIONS DEVICES ADMINISTRATIVE RIGHTS APPLICATIONS TIME-OF-DAY RESTRICTIONS ETC. 2 Unify and correlate leverage user profile data across IT service functions 3 Enable “contextual awareness” centralize visibility and control, tracking users in real-time across the entire employment lifecycle ONBOARDING WORK ROLE CHANGES OFF-BOARDING 4 Document and analyze user actions to anticipate user needs and optimize security and compliance PREDICTIVE IT SERVICES LEARN MORE about how you can enable users to work where, when and how they prefer — all while securing those end points and centralizing visibility, audit trails and controls. 1 IDC, 2012 study* 2 IDG, “How Mobility is Disrupting Technology and Information Consumption,” 2012 3 Freelance Union “Freelancing in America: A National Survey of the New Workforce”* 4 SilkRoad, “State of Talent Management Survey,” 2013 5 Harris Poll/CareerBuilder study, May 2014 6 Ponemon Institute, “Data Loss Risks During Downsizing,” February 2009 7 Ponemon Institute, “The True Cost of Compliance: A Benchmark Study of Multinational Organizations,” January 2011 8 Wall Street Journal, January 6, 2015 *need to verify source/date An IDC study released in January 2012 says that the world’s mobile worker population will reach 1.3 billion by 2015, representing 37.2% of the total workforce. Enterprises cannot afford to be slow in creating budgets, strategies, policies and processes to address this trend. A Citrix study forecasts that by mid 2013, 94% of companies will have a BYOD policy. Gartner adds that by 2014, 90% of organizations will support corporate applications on devices owned by workers. of the global workforce is contracting by 20153 34%34% The User Enablement Dilemma: How do you empower users while maximizing security and compliance? Personal Apps & Devices