Define A Compelling Strategy To Secure And Protect Mobile

For: Security &
Risk Professionals
Define A Compelling Strategy To Secure
And Protect Mobile Moments
by Laura Koetzle, Stephanie Balaouras, and Michele Pelino, February 24, 2015
| Updated: February 25, 2015
KEY TAKEAWAYS
A Strategic Plan Outlines S&R’s Critical Role In Securing Mobile Moments
Every technology management group says that supporting mobile moments is a top
priority. If S&R pros want the business to see them as more than plumbers and paranoid
custodians, they must use the strategic plan to reinforce the strategic, not supporting,
role that they plan in mobility.
A Compelling Mobile Security Strategic Plan Must Include Five Core Elements
Forrester recommends that you develop a three- to five-year mobile security plan
that includes the following elements: 1) a mission statement; 2) a security mapping
to the mobile moment IDEA cycle; 3) a SWOT analysis to assess current and future
opportunities and challenges; 4) a list of prioritized actions; and 5) an action-focused
road map.
Follow Forrester’s Seven Steps To Develop A Mobile Security Plan
The process includes seven steps: 1) Interview mobility stakeholders; 2) assess the
current state of mobile maturity; 3) identify and prioritize mobility initiatives; 4)
evaluate mobile security requirements; 5) determine success criteria and metrics; 6)
define a future state road map; and 7) establish a communication plan.
Forrester Research, Inc., 60 Acorn Park Drive, Cambridge, MA 02140 USA
Tel: +1 617.613.6000 | Fax: +1 617.613.5000 | www.forrester.com
FOR SECURITY & RISK PROFESSIONALS
FEBRUARY 24, 2015
UPDATED: FEBRUARY 25, 2015
Define A Compelling Strategy To Secure And Protect Mobile
Moments
Strategic Plan: The Mobile Security Playbook
by Laura Koetzle, Stephanie Balaouras, and Michele Pelino
with Tyler Shields, Christopher Voce, Chenxi Wang, Eric Chi, and Jennie Duong
WHY READ THIS REPORT
Forrester designed this report to help security and risk (S&R) leaders develop comprehensive strategic
mobile security plans to secure and protect both employees’ and customers’ mobile moments — without
degrading the quality of those mobile experiences. Developing a comprehensive mobility strategy requires
S&R professionals to: 1) collaborate with executives and business decision-makers across the organization;
2) communicate the need for a comprehensive mobile strategy to all critical stakeholders; 3) understand
current and future mobility requirements; and 4) develop and document a road map to clearly define the
timeline. This is an update of a previously published report; Forrester reviews and updates it periodically
for continued relevance and accuracy. We revised this edition to factor in S&R pros’ role in customerfacing mobile initiatives.
Table Of Contents
Notes & Resources
2 S&R Pros Must Deliver A Strategy To Secure
Mobile Moments
Forrester incorporated feedback from
numerous end user and vendor interactions
as well as various other client engagements.
3 Key Elements Of A Strategic Plan For Mobile
Security
5 Seven Steps To Mobile Security Strategy
Development
Related Research Documents
The Future Of Mobile Security: Securing The
Mobile Moment
February 17, 2015
Assess Your Mobile Security Strategy And
Operations Program
January 22, 2015
Enable Mobile Engagement Through A
Cross-Functional Mobile Security Team
March 14, 2014
© 2015, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available
resources. Opinions reflect judgment at the time and are subject to change. Forrester®, Technographics®, Forrester Wave, RoleView, TechRadar,
and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. To
purchase reprints of this document, please email [email protected]. For additional information, go to www.forrester.com.
FOR SECURITY & RISK PROFESSIONALS
Define A Compelling Strategy To Secure And Protect Mobile Moments
2
S&R PROS MUST DELIVER A STRATEGY TO SECURE MOBILE MOMENTS
Forward-looking S&R leaders know that their most important responsibility is to earn and retain
the trust of their firms’ customers, because if our firm doesn’t live up to the trust that customers
have placed in us, those customers will take their business elsewhere. For CMOs and eBusiness
pros, today’s explosion of mobile possibilities is a tremendous opportunity for deepening customer
engagement — and it’s up to S&R professionals to add the safeguards necessary to preserve customer
trust while also enabling mobility in the business. To build those protections in from the ground
up, S&R pros must participate in the ideation, design, engineering, and analytics for both customerfacing and employee-focused mobile strategy. This means that S&R pros need a comprehensive
strategic plan for securing mobile moments. Forrester defines a mobile moment as:
A point in time and space when someone pulls out a mobile device to immediately get what he or
she wants, in context.1
The optimal strategic plan for ensuring that customers and employees achieve that mobile moment vision
successfully and securely will preserve confidentiality, availability, and integrity and deliver contextawareness, simplicity, and automation.2 Specifically, S&R pros must design their strategic plans to:
■ Get a seat at the mobile strategy table. If S&R pros can anticipate requirements, devise ways
to reduce risk to acceptable levels, and consistently provide line-of-business stakeholders with
solutions that enhance customer trust, the chief information security officer (CISO) will earn a
seat at the table and stay actively involved in setting mobile business and security strategy.
■ Provide justification for additional resources to protect those mobile moments. Given that
Forrester forecasts that there will be 4.6 billion smartphones in use globally in 2018, customer and
customer-facing mobile moments will drive a significant portion of your firm’s business technology
agenda.3 The new skills and technologies we’ll need to deploy will cost money, and CISOs must lay
out the explicit connection of those expenses to winning, serving, and retaining customers.
■ Serve as a standard document to communicate current and future mobility plans. If S&R
leaders ask for significant investment and resources, they must deliver a commensurate return
on that investment. In your strategic plan, you must provide an assessment of your current state
and a road map for achieving the desired future state. Each year, you must reassess your current
state against your goals and show progress to business and technology management leaders.4
The results of your assessments will prove that you’re using the firm’s investment wisely.
■ Help facilitate mobility discussions with executive and line-of-business decision-makers.
S&R pros still struggle to communicate the contributions that security makes to earning and
retaining customer trust and thus to the firm’s business. Why? Because they often dive into
technical and operational details too quickly and fail to show traceable alignment between
© 2015, Forrester Research, Inc. Reproduction Prohibited
February 24, 2015 | Updated: February 25, 2015
FOR SECURITY & RISK PROFESSIONALS
Define A Compelling Strategy To Secure And Protect Mobile Moments
3
their activities and the firm’s business strategies for winning, serving, and retaining customers.
A strategic plan forces S&R professionals to document the alignment between their mobile
initiatives and the firm’s overall objectives like increasing revenue and entering new markets.
KEY ELEMENTS OF A STRATEGIC PLAN FOR MOBILE SECURITY
Strategic planning is an exercise in defining the resources you need to reach specific objectives.
It starts with defining objectives and describing the methods to accomplish them. The strategic
plan also identifies how these methods map to available resources and paves the way to creating
prioritized and staged operational plans to execute the actions required to achieve the strategic
objectives.5 Forrester recommends that you develop a three- to five-year mobile security plan that
includes (see Figure 1):
■ A mission statement. The mission statement defines the purpose of mobile security and its
relevance to broader enterprise and technology management mission statements. In addition,
it describes the specific role of S&R and the services and functions they deliver to broader
enterprise mobility initiatives and business objectives, such as in the chairperson’s report to
shareholders. The mission statement must be consistent with the vision and values of the
enterprise as a whole.
■ A mapping to the mobile moment IDEA cycle. Forrester has distilled all of our research on
how successful companies tackle many different types of mobile moments — such as customers
receiving mobile marketing messages when entering a store and financial advisors sitting with
customers — into a universal four-step business discipline for approaching any mobile moment.
We call that business discipline the IDEA cycle, which consists of four steps: 1) Identify the
mobile moments and context; 2) design the mobile engagement; 3) engineer the mobile moments
and process; and 4) analyze results to monitor performance and optimize outcomes (see
Figure 2).6 The IDEA cycle provides a useful common framework for business and technology
management stakeholders to build their strategic plans for supporting all mobile moments.
■ A SWOT analysis to assess current and future opportunities and challenges. S&R leaders
should perform a strengths, weaknesses, opportunities, and threats (SWOT) analysis of their
mobile security program as well as their approach to enabling the mobile lines of business.
Strengths and weaknesses are discovered by assessing your current mobile security efforts.
You can leverage Forrester’s Mobile Security Maturity Assessment to do this.7 Opportunities
and threats focus on the future state, the evolution of IT and mobile technology, and the
consequences of missing this evolution.
■ A list of prioritized actions. Actions are projects and tasks that S&R must perform to: 1) bring
mobile to the required level to remedy today’s weaknesses and 2) acquire new processes, skills,
© 2015, Forrester Research, Inc. Reproduction Prohibited
February 24, 2015 | Updated: February 25, 2015
FOR SECURITY & RISK PROFESSIONALS
Define A Compelling Strategy To Secure And Protect Mobile Moments
4
and tools to prepare and capitalize on opportunities in the future. You must prioritize and
logically sequence each action based on importance to the mission statement and feasibility
with current and future capabilities, resources, and budgets.
■ A road map for prioritized actions — and a “wish list” for everything else. The road map
places actions in a timeline based on the plan’s horizon. Base your road map on the list of
actions and their prioritization, adjusted for the budgets for each period. Create a wish list for
actions that are not included in the road map. These wish list items must include an assessment
of the costs of not implementing them as well as an estimate of the budget and resources you’d
need to implement them.
Figure 1 The Mobile Security And Operations Strategic Plan
Business technology
agenda planning
Mission statement
• Role
• Services
Current mobile
state inputs
• Metrics
• Surveys
SWOT analysis
Strategic plan committee
• Customer experience
• Business stakeholders
• Mobile app developers
• S&R
• CIOs
• Employees
Business planning
expert input
Remedial
actions
Budget
• Today
• Future
Opportunity
actions
Prioritization of
actions
Capabilities
Critical success
factors — KPIs
Strategic plan
road maps
61575
Source: Forrester Research, Inc. Unauthorized reproduction or distribution prohibited.
© 2015, Forrester Research, Inc. Reproduction Prohibited
February 24, 2015 | Updated: February 25, 2015
FOR SECURITY & RISK PROFESSIONALS
5
Define A Compelling Strategy To Secure And Protect Mobile Moments
Figure 2 The Mobile Security Strategic Plan
Identify
the mobile
moments
and context.
Analyze
results to monitor
performance and
optimize outcomes.
Design
Start small
with a platform
to extend.
the mobile
engagement.
Engineer
your platforms,
processes, and
people for mobile.
Source: January 24, 2014, “Re-Engineer Your Business For Mobile Moments” Forrester report
61575
Source: Forrester Research, Inc. Unauthorized reproduction or distribution prohibited.
SEVEN STEPS TO MOBILE SECURITY STRATEGY DEVELOPMENT
S&R professionals must develop a comprehensive mobile security strategic plan. The process
includes seven steps: 1) Interview mobility stakeholders; 2) assess the current state of mobile
maturity; 3) identify and prioritize corporate mobility initiatives; 4) evaluate mobile technology and
security requirements; 5) determine success criteria and metrics; 6) define a future state road map;
and 7) establish a communication plan.
© 2015, Forrester Research, Inc. Reproduction Prohibited
February 24, 2015 | Updated: February 25, 2015
FOR SECURITY & RISK PROFESSIONALS
Define A Compelling Strategy To Secure And Protect Mobile Moments
6
Step 1: Identify And Interview Mobility Stakeholders
Never assume that you know what your customers, employees, and partners need in their mobile
moments (or will need in their future mobile moments). S&R executives should meet with business
stakeholders to gain visibility into current and future mobility requirements for the firm’s entire
dynamic ecosystem of value, including:
■ Customers. S&R pros should shadow customer experience professionals as they observe and
analyze the mobile behavior of your customers. Your customer experience colleague will be
asking questions such as: “Can we immediately solve a customer’s problem?” and “Can we
eliminate friction or annoyance in a customer’s life?”8 As an S&R professional, you can help find
ways to answer “Yes!” to those questions that preserve (and enhance) customer trust.
■ Business stakeholders. S&R pros must understand which customer mobile moments your
line-of-business, marketing, and sales executives consider most critical, and why. Matching that
insight with what you’ve learned about your customers’ needs will equip your team to play the
optimal role in delivering those mobile moments.
■ Employee segments. Employee mobile moments matter, too, because ultimately, your
employees decide what your customers’ experience with your company will be.9 As part of the
IDEA cycle, S&R pros must help to identify the employee mobile moments that matter — the
ones in which they have the opportunity to excel in their jobs if they have the right tools —
and then to ensure that the team designing the application to support that mobile moment
implements the appropriate security controls.
■ CIOs. The challenge for CIOs is to put the fundamentals in place that permit technology
management teams to deliver on the expectations of mobile moments at scale. CIOs are looking to
their teams to build a modern mobile platform with these characteristics: 1) simplified data access;
2) cloud-based delivery; 3) proportional security; and 4) analytics-based feedback.10 No. 3 is where
S&R pros must take the lead — and the mobile security vision of confidentiality, availability, and
integrity delivered with context-awareness, simplicity, and automation fits the bill.
■ Mobile application developers. The real security risk is in the mobile application security layer.
Thus, S&R pros must also climb higher in the stack and look to implement security processes,
policies, and controls that center on mobile applications. A strong mobile application security
program must include the following four components: 1) an operational deployment of an
enterprise mobile management (EMM) solution (EMM is the next step for today’s mobile
device management solutions); 2) clearly defined security-related application acceptance
criteria; 3) consideration for the human elements of mobile moments when applying security
controls; and 4) fully automated programmatic tools that support the high volume of mobile
app turnover.11
© 2015, Forrester Research, Inc. Reproduction Prohibited
February 24, 2015 | Updated: February 25, 2015
FOR SECURITY & RISK PROFESSIONALS
Define A Compelling Strategy To Secure And Protect Mobile Moments
7
Step 2: Assess The Current State Of Mobile Security Maturity
Forrester developed a maturity model to help S&R professionals understand the current state of
their mobile security initiatives: Forrester’s Mobile Security Maturity Model provides a framework
that describes the 51 essential components of a successful mobile security program, which we then
organize into 14 functions and four top-level domains.12 You can use the model to help: 1) articulate
the role of S&R in mobility; 2) identify gaps and develop remediation plans; and 3) show that your
program improves over time.13
Step 3: Identify And Prioritize Mobility Initiatives
Using the stakeholder interviews and the results of the maturity assessment, S&R leaders can identify
and prioritize specific mobility initiatives. For each of the initiatives, here are the questions to ask:
■ What are the security and compliance implications of the proposed mobility initiatives?
During the mobile initiative prioritization process, it’s particularly important to consider device,
application, and data security for mobile solutions. S&R leaders must tackle the legal, privacy,
and security requirements associated with delivering potentially sensitive data to customer
devices over which they have no control, and for employees accessing similarly sensitive data
on devices that they have chosen and control. S&R professionals must work with customer
experience pros to develop a robust mobile policy that balances the security requirements of the
enterprise with the user’s device experience.
■ How will mobile initiatives change skills and staff requirements in S&R? To support
employee and customer mobile moments, S&R leaders will need to invest in new skills,
including mobile device management and security, mobile application management, secure
mobile development practices (in conjunction with application development and delivery pros),
architecting for the extended enterprise (meaning the full dynamic ecosystem of value for your
digital business), and threat modeling.14
Step 4: Evaluate Mobile Security Functional Requirements
To support customer and employee mobile moments, S&R leaders need to plan in these essential
functions:
■ Mobile flaw and malware detection. Look to add code analysis and application hardening
techniques to the malicious code and mobile security flaw-detection arsenal.
■ Reputation and content security. Combine content security elements (data wrapping, cloudbased file sync, and share) with reputation-based analytics.
© 2015, Forrester Research, Inc. Reproduction Prohibited
February 24, 2015 | Updated: February 25, 2015
FOR SECURITY & RISK PROFESSIONALS
8
Define A Compelling Strategy To Secure And Protect Mobile Moments
■ Enterprise mobile management (EMM), which subsumes mobile device management.
Ensure that any technology you commit to here provides application wrapping and secure
network gateway functionality.15
■ Strong mobile authentication. Consider strong mobile authentication an essential baseline
service for all other mobile security components.16
■ Risk-based security. Understanding the quantified risk at each layer of the mobile security stack
allows for more-accurate security decisions. Sophisticated risk-based security will allow S&R
pros to ensure that the systems make the right decisions when balancing user experience with
compliance requirements.
■ And the convergence of all these elements into a unified mobile security platform by 2018.
Forrester predicts that by 2018, all of the above elements will merge into a single unified mobile
security platform (see Figure 3).17
Figure 3 The Unified Mobile Security Platform
Secure mobile content sharing
Risk-based mobile management
2013
2018
Application wrapping
Risk-based security
2013
Device management
Mobile authentication
2012
Secure network gateway
Enterprise mobile management
2013
2014
Source: “Mastering The Mobile Security Landscape” Forrester report
61575
Source: Forrester Research, Inc. Unauthorized reproduction or distribution prohibited.
© 2015, Forrester Research, Inc. Reproduction Prohibited
February 24, 2015 | Updated: February 25, 2015
FOR SECURITY & RISK PROFESSIONALS
Define A Compelling Strategy To Secure And Protect Mobile Moments
9
Step 5: Determine Success Criteria And Metrics
Measure the success of each mobile initiative by assigning key performance indicators to each. If
you don’t track how much you spend on each mobility initiative or don’t measure these initiatives’
effects on IT administration efficiency, cost reduction, better access and data security, and internal
end user satisfaction, you won’t be able to defend your investments:
■ Measure mobile security and operational impacts. Typical metrics captured include: 1)
number of employees using specific mobile applications; 2) number of customers using specific
mobile applications, and business results of same; 3) amount of time spent on mobile access
control for customers, employees, partners, and other extended enterprise participants; 4) time
and cost to address compliance and regulatory requirements for both employee and customer
mobile moments; and 5) cost of a security breach per record.
■ Identify methods to measure customer, business stakeholder, and employee satisfaction.
It’s important to determine ways to measure the impact of mobility initiatives on business
stakeholders, employees, and customers. For example, S&R pros can measure the level of business
engagement by monitoring use of specific mobile applications and services or by monitoring
the level of business unit satisfaction with mobility initiatives using direct surveys. S&R pros can
piggyback on customer satisfaction analyses driven by customer experience professionals.
Step 6: Define A Future State Road Map
When planning for the future, S&R professionals must develop a road map to link their mobile
strategy to business needs, shape future capital requirements, and guide product selection. Your
road map for mobility should detail a five-year vision of the fundamental capabilities that you will
develop as well as how you will evolve those capabilities. You can use Forrester’s TechRadar analysis
of enterprise mobile security to confirm that given technologies have (or will have) the level of
maturity that you’ll need to deliver on your road map element on time.18 This includes not only the
technical investments described above but also the investments that you will need to deliver better
end user self-service and global support. Your road map should also show the prioritization of
remediation actions from the maturity assessment.
Step 7: Establish A Communication Plan
Poor marketing kills good products — and the same will be true for your mobile security strategy.
Simply investing in mobile security technologies and policies, and working toward the future
unified mobile security platform is not enough — you also need to develop awareness, buy-in, and
advocacy through effective marketing, communications, and training. These activities are essential
to driving and sustaining change in your organization. Forrester recommends a four-step approach
to creating a plan that clearly identifies who in the organization you need to communicate with
© 2015, Forrester Research, Inc. Reproduction Prohibited
February 24, 2015 | Updated: February 25, 2015
FOR SECURITY & RISK PROFESSIONALS
Define A Compelling Strategy To Secure And Protect Mobile Moments
10
and how to communicate with them. The four steps are: 1) Define key stakeholders; 2) define key
messages for each stakeholder group; 3) determine key communications campaigns; and 4) execute
the mobile communications plan.
ENDNOTES
Mobile moments are becoming a battleground for customers’ attention. If you serve the needs of a customer
or an employee in that moment, you can win their business and their loyalty. If you fail, an entrepreneurial
company will step in and fill the need for you, disrupting your business in the process. For more
information, see the January 24, 2014, “Re-Engineer Your Business For Mobile Moments” report.
1
2
S&R pros must extend the classical CIA (confidentiality, integrity, availability) model to embrace CSA:
context-awareness (context awareness, such as location, can itself provide a security safeguard), simplicity
(make it fast and easy), and automation (less interactivity). See the February, 17, 2015, “Future Of Mobile
Security: Securing The Mobile Moment” report.
Source: Forrester Research World Mobile And Smartphone Adoption Forecast, 2014 To 2019 (Global).
3
It’s Forrester’s view that every CIO’s organization must pursue a dual agenda consisting of business
technology (BT) — the technology, systems, and processes to win, serve, and retain customers — and
information technology (IT) — the technology, systems, and processes to support and transform an
organization’s internal operations. Forrester calls this dual agenda (and the organization that supports it)
“technology management.” See the June 4, 2014, “Develop Broad Tech Management Capabilities In Order To
Accelerate Your BT Agenda” report.
4
Source: Steve Cohen, William Eimicke, and Tanya Heikkila, The Effective Public Manager: Achieving Success
in a Changing Government, Jossey-Bass, 2008.
5
Forrester has also assembled a planning guide we call a mobile moment audit to help you consider the
universe of possible mobile moments and then sketch out what it will take to move through the IDEA cycle.
Then use a mobile moment worksheet to capture the essential elements for each step of the IDEA cycle,
including the impact on your core operations. See the January 24, 2014, “Re-Engineer Your Business For
Mobile Moments” report.
6
For more information, see the January 22, 2015, “Assess The Maturity Of Your Mobile Security Strategy” report.
7
In the first step of the IDEA cycle, customer experience pros will catalog and analyze target customers’
mobile moments, identify the context, and determine their motivations. This typically starts by conducting
ethnographic research — observing customers as they try to accomplish their goals — and translating
those observations into customer journey maps. See the January 24, 2014, “Mobile Moments Transform
Customer Experience” report.
8
Just as customers now expect information, service, or products on any device in their mobile moments, so
do today’s workers. Keep customer experience principles at the forefront of workforce technology planning.
Customer obsession demands employee obsession because employees decide what your customers’
9
© 2015, Forrester Research, Inc. Reproduction Prohibited
February 24, 2015 | Updated: February 25, 2015
FOR SECURITY & RISK PROFESSIONALS
Define A Compelling Strategy To Secure And Protect Mobile Moments
11
experience with your company will be. Look to the software and systems of engagement that can effectively
translate worker technological freedom to customer satisfaction. See the August 1, 2014, “Build Your
Workforce Computing Strategic Plan” report.
The modern mobile platform, built for today’s mobile strategy with an eye to tomorrow’s connected device
strategy, will be built on those four technology elements. See the October 20, 2014, “Mobile Moments
Require A New Technology Strategy” report.
10
Forrester developed its mobile application security maturity model to help S&R pros better evaluate their
current level of mobile security maturity and identify the processes required to “level up” their strategy to
support their employees’ current and future mobile moments. See the August 26, 2014, “It’s Time To Level
Up Your Mobile Application Security Program” report.
11
Forrester used over 50 criteria to assess different aspects of the mobile security program. See the January 22,
2015, “Assess The Maturity Of Your Mobile Security Program” report.
12
The model is a comprehensive framework that S&R executives can use to identify the gaps in their mobile
security program, evaluate its maturity, and determine how they can play a much bigger role in their
enterprise’s overall mobile strategy. The model consists of four top-level domains, 14 functions, and 51
components, each with detailed assessment criteria. It provides a consistent and objective method for
evaluating security programs and articulating their value. See the January 22, 2015, “Assess The Maturity Of
Your Mobile Security Program” report.
13
These are the five essential technical skills for a successful mobile security program. See the March 14, 2014,
“Enable Mobile Engagement Through A Cross-Functional Mobile Security Team” report.
14
Mobile device management (MDM) solutions are effective tools to help deliver on this mandate and
provide applications and resources to employee devices without sacrificing employee productivity. For
more information about the EMM and MDM market, see the September 30, 2014, “The Forrester Wave™:
Enterprise Mobile Management, Q3 2014” report.
15
S&R pros need to design security controls that, ideally, improve customer experience, or at a minimum,
don’t detract from it. For more information see the September 17, 2014, “Transform And Protect Your
Customers’ Mobile Moments With Seamless Authentication” report.
16
The 2018 unified mobile security platform will apply security at all the layers of the mobile stack: the
network, operating system, application, and content layers. See the February 6, 2015, “Mastering The
Mobile Security Landscape” report.
17
The current and emerging plethora of technologies span the stack from the network layer to the application
and data layer, leaving security and risk (S&R) professionals with little idea which technology will best meet
their security needs while still supporting an empowered workforce. This updated TechRadar report, the
road map document of the Mobile Security playbook, defines the use cases, business value, and outlook for
the 15 technologies that comprise the core enterprise mobile security technologies. See the November 3,
2014, “TechRadar™: Enterprise Mobile Security, Q4 2014” report.
18
© 2015, Forrester Research, Inc. Reproduction Prohibited
February 24, 2015 | Updated: February 25, 2015
About Forrester
A global research and advisory firm, Forrester inspires leaders,
informs better decisions, and helps the world’s top companies turn
the complexity of change into business advantage. Our researchbased insight and objective advice enable IT professionals to
lead more successfully within IT and extend their impact beyond
the traditional IT organization. Tailored to your individual role, our
resources allow you to focus on important business issues —
margin, speed, growth — first, technology second.
FOR MORE INFORMATION
To find out how Forrester Research can help you be successful every day, please
contact the office nearest you, or visit us at www.forrester.com. For a complete list
of worldwide locations, visit www.forrester.com/about.
CLIENT SUPPORT
For information on hard-copy or electronic reprints, please contact Client Support
at +1 866.367.7378, +1 617.613.5730, or [email protected]. We offer
quantity discounts and special pricing for academic and nonprofit institutions.
Forrester Focuses On
Security & Risk Professionals
To help your firm capitalize on new business opportunities safely,
you must ensure proper governance oversight to manage risk while
optimizing security processes and technologies for future flexibility.
Forrester’s subject-matter expertise and deep understanding of your
role will help you create forward-thinking strategies; weigh opportunity
against risk; justify decisions; and optimize your individual, team, and
corporate performance.
«
SEAN RHODES, client persona representing Security & Risk Professionals
Forrester Research (Nasdaq: FORR) is a global research and advisory firm serving professionals in 13 key roles across three distinct client
segments. Our clients face progressively complex business and technology decisions every day. To help them understand, strategize, and act
upon opportunities brought by change, Forrester provides proprietary research, consumer and business data, custom consulting, events and
online communities, and peer-to-peer executive programs. We guide leaders in business technology, marketing and strategy, and the technology
industry through independent fact-based insight, ensuring their business success today and tomorrow.
61575