Improve manageability
and visibility.

Mobile Security Index
2020 Report




  • The most advanced organizations are adopting a platform-based approach to mobile security. This means that security fades into the background, working invisibly but effectively. Instead of hindering your employees, it enables innovation and growth.
     

    Need to deliver a better employee experience?
     

    Putting the user experience first and creating well-designed security rules is important for your security posture. Badly designed or implemented security policies can be detrimental to both the user experience and company performance. Something as simple as a password policy could impede employees and increase support costs (due to more resets). And it’s likely to drive up your cybersecurity risks, by frustrating your employees and driving them to circumvent the rules.

    On the other hand, well-implemented security solutions can help dramatically reduce risk while remaining largely transparent to users. For example, secure mobile gateways, adaptive authentication and zero-trust services can actually reduce the number of intrusive login prompts without putting systems and data at greater risk. The best systems take a single-pane-of-glass approach and bring all of these solutions together, so you have better visibility of your users and defenses.
     

    Want greater transparency and visibility?
     

    No matter how much you trust your employees, it’s important to remember that humans are fallible. No amount of mobile training can guarantee that every staff member will follow the rules 100% of the time. They might be under enormous pressure to meet deadlines and decide to temporarily switch off their two-factor authentication (2FA). Or they might be stranded at an airport without mobile data—sometimes that’s all  it takes for someone to break a rule about using public Wi-Fi. That’s why the best approach to security is one that has built-in controls that are automatically enforced, instead of relying on observance of policies. This can also help improve your transparency and visibility, as you don’t have to rely on employees to report problems or behave in a certain way when nobody is watching.

  • 20%

    According to NetMotion, 20% of mobile workers list a restrictive IT security policy as their most frustrating issue at work—“cumbersome authentication” came fifth overall.47



  • A set of security controls and countermeasures that address mobile threats in a holistic manner must be identified, necessitating a broader view of the entire mobile security ecosystem.

    —NIST48

47 Employee Frustration Index, a survey of 285 individuals covering a wide range of age groups and device types across North America, NetMotion, September 2019, https://www.netmotionsoftware.com/blog/connectivity/mobile-frustration-index

48 Mobile Threat Catalogue, NIST, https://www.nccoe.nist.gov/projects/building-blocks/mobile-device-security/mobile-threat-catalogue

 

Services and/or features are not available in all countries/locations, and may be procured from in-country providers in select countries. We continue to expand our service availability around the world. Please consult your Verizon representative for service availability. Contact us.