CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • IoT
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • News
Editor's Pick (1 - 4 of 8)
left
Your Application is Mostly Written by Strangers

Edwin Kwan, Head of Application and Software Security at Tyro Payments

ESG Performance - Why It's Crucial To Future Success

Jo-Anne Ruhl, vice president and managing director, Workday Australia and New Zealand.

Olympic sports training applied to media agency clients?!?

Case Study: Media consultancy leverages data to self fund client marketing campaigns

Vertical value chain integration applied to media agency clients?!?

Enterprise Digital Transformation is not for the faint hearted: Guiding principles for a enterprise-wide digital transformation

Linda Zeelie, Enterprise Digital Transformation Architect and Leader, Metlife and Nina Evans (Professorial lead: UniSA STEM, University of South Australia (UniSA))

Digital Transformation/Modernisation, It is a Continuous Journey

Fahad Najeeb, Head of Data Platforms and Engineering, Latitude Financial Services

Drive Digital Transformation with a human-centric approach

Julius Zhu, Director, Digital Transformation and IT, Aptiv

right

THANK YOU FOR SUBSCRIBING

Need for Visibility and Operational Intelligence for Mobile Enterprise Security

CIOAdvisor Apac | Thursday, January 31, 2019
Tweet

Enterprises are voraciously working towards building secure mobile security policies to minimize the risk of security breaches. However, organizations can be a victim of threats and suffer from lack of visibility into what devices are doing when they are used on public WI-FI or hotspots; even the most comprehensive policies can fail at times. The lack of clarity can inevitably lead to real vulnerabilities.

However, enterprises are moving towards the advancement and are transforming devices into sensors to gain more profound insights about the networks that employees connect to. By leveraging information regarding the device, which concerns the system it is connected to, it has become more urgent to plan the measures to mitigate the security threats which does not hamper the performance, control costs and improve the user experience.

•  Better visibility is a must

Employees tend to use public WI-FI and other networks which lead to issues and IT personnel tend to lose visibility into their sessions. As per a study by Enterprise Mobility Exchange, a majority of businesses (63 percent) were unsure if they could monitor devices beyond the company firewall. It requires real-time data for organizations to protect their workers against possible threats.

The study revealed enterprises fear data leakage (45 percent of them) and the majority of them haven’t mandated the use of Virtual private network (VPN). Although malicious actors pose breaches, there can be a direct result of the actions from the employees' end as well. It can happen due to accidentally clicking on insecure links or not regularly running software updates. Apart from this, lack of visibility can have repercussions on the team productivity and customer service.

•  Evaluation Procedure

There is an urgent need to evaluate mobile data across networks. There are extensive data available, but it is scattered across many systems and environment and should be collected at one single place for easy accessibility.

Operational intelligence is one such approach, wherein business analytics delivers visibility and insights into business operations. It requires simple client software to gather data on mobile technology and the networks that employees use; this data can be further used to understand the big picture. 

Check this out: Top Enterprise Security Startups in APAC

tag

Startups

Firewall

Featured Vendors

  • MVI Technologies: Innovative, Future-proof Financial and Payment Switching
    MVI Technologies: Innovative, Future-proof Financial and Payment Switching
  • DATAMARK: Process Driven Solutions in Action
    DATAMARK: Process Driven Solutions in Action
  • IMACREA: Shaping the Future of Teleworking
    IMACREA: Shaping the Future of Teleworking
  • PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
    PuzzleBox BPO, Inc.: A Hybrid Platform for Customer Support and Sales Empowerment
ON THE DECK

Read Also

Safeguarding Quality through Proactive Risk Management

Cultivating a Culture of Agility: Nurturing Adaptability for Organizational Success

Governance for Smarter KPIs: Enhancing Performance Measurement

Embracing the Irreplaceable Human in Business and Beyond

Leveraging Gamification for Deeper Financial Engagement

Generative AI: The Game-Changer Automates Marketing For The Retail Industry

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2026 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioadvisorapac.com/news/need-for-visibility-and-operational-intelligence-for-mobile-enterprise-security-nwid-1291.html