Enterprise Mobility: Analysis and Threat Identification

David Byrd : Raven Call
David Byrd
David Byrd is the Founder and Chief Creative Officer for Raven Guru Marketing. Previously, he was the CMO and EVP of Sales for CloudRoute. Prior to CloudRoute, He was CMO at ANPI, CMO & EVP of Sales at Broadvox, VP of channels and Alliances for Telcordia and Director of eBusiness development with i2 Technologies.He has also held executive positions with Planet Hollywood Online, Hewlett-Packard, Tandem Computers, Sprint and Ericsson.
| Raven Guru Marketing http://www.ravenguru.com/

Enterprise Mobility: Analysis and Threat Identification

The need for the enterprise mobility suite for Microsoft continues to grow every year. While many small business owners or SMBs do not believe that they are the target of hackers because most media reports concern large enterprises, it is important to note that 36% of SMBs are targeted every year by hackers. It's not because the individual business are worth a lot but because there are many more of them and the security is a lot weaker than that of large enterprises. And while the cost to a small business for being hacked is relatively low at $9,000 per incident, the damage to the brand and customer loyalty is much greater. As a result, 60% of SMBs that are hacked fail within 6 months. Yet, according to the National Cyber Security Alliance 77% of SMB owners and decision makers do not feel it necessary or important to protect their businesses from hackers. This is indeed a fallacy that needs to be corrected.

The Microsoft Enterprise Mobility Suite (EMS) offers three basic things: employee identity management, device management and information protection and security. However, there is a fourth functional area that is often overlooked. The protection of access to information technology systems when the access cannot/should not be possible. EMS also examines when the login and password are used simultaneously from different devices or from geographically dispersed locations. If for example simultaneous access from different devices is requested using the same login and password, then there's a high probability of fraud. If access is also requested from geographically dispersed locations such as the east coast of the United States and the west Coast or from the U.S. and another country, then again, there's a high probability of fraud. EMS is designed to detect these manners of access and deny or report the access.

We are fairly familiar with this type of behavior analysis and threat detection through the use of a credit cards. Many banks and financial institutions either notify users or block this type of potential card abuse. The software is fairly sophisticated and well understood. Simply put, this type of detection and analysis works and should be applied to information access. But let's get back to the real point, EMS is an integrated solution that works with Windows 10, and as such, it is a much stronger solution than point products that have been developed recently. It may seem that purchasing a point product may be more cost-effective as it may solve a particular aspect of concern, but it is not as comprehensive, efficient or effective as getting the integrated mobility suite from Microsoft.

CloudRoute and some authorized Cloud Solutions Providers (CSPs) understand how to apply this solution to your business and provide the professional services to assist you in implementing EMS. Given the value that it can bring to any sized business forget that it's called enterprise mobility suite. Every business should implement EMS in today's mobile work environment. Mobility is a more than just remote or traveling workers. It includes distributed corporate information, bring your own devices (BYOD) and, of course, the ability of hackers to threaten and attempt to break into your network from anywhere in the world.



Feedback for Enterprise Mobility: Analysis and Threat Identification

Leave a comment

Featured Events