APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Security
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Security
    Editor's Pick (1 - 4 of 8)
    left
    The Organization's Responsibility for its Own Protection

    Michael Wallmannsberger, Chief Information Security Officer, Wynyard Group

    Don't Rush to Hire an Anti-DDoS Expert!

    Barry Greene, Co-founder and Chief, Technical Officer, GETIT

    Attaining the Needs of Infrastructure Investment

    Yong Chiang Neo, CIO

    Constructing a Marketing IT Collaboration

    Jenny Williams,

    The Organic Adaptability of IT

    Pedro Sttau,

    The Weakest Link Is Your Strongest Security Asset

    Christian Anschuetz, CIO & Security Practitioner, UL

    Achieving Greater Business Value with Innovation

    Denise A. Saiki, CIO& VP Enterprise Business Services, Lockheed Martin

    Using Data Analytics for Loss Prevention

    Jonathan Lowsley, CIO, ADrive

    right

    Transforming Your Business through Secure Mobile Strategies

    Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung

    Tweet
    content-image

    Todd Inskeep, Global Security Assessments VP- Global Security Services, Samsung

    All too often, I see organi­zations that are looking to improve their mo­bile strategies fall into the same patterns and quicksand in these efforts. CIOs and their teams regularly get caught up in enabling BYOD and creating teams to build applications as they try to keep up with their peers, partners and cus­tomers, as well as address requests from internal management. These two seemingly obvious, and necessary ac­tivities, regularly consume resources with little measurable business benefit. Often, trying to make these investments produce results can tie an organization in knotted lines of responsibility and analysis as they try to find the “best” solutions to solve specific IT problems. These problems are caused because teams focus on solving problems and anticipating needs with mobile technol­ogy—instead of focusing on how to se­curely leverage mobility to improve the business of their organization.

    Let me be specific. Talking with a large oil and gas company not long ago, I was told they were building out their mobile application development team. “Great,” I said. “What kinds of apps are you going to build?” Their mobile executive admitted they weren’t sure, but wanted to be ready when the busi­ness asked to build applications. This approach is common—thinking about mobile as a technology problem, versus as a business opportunity that can drive real value.

    Business value comes from mobil­ity in four overlapping levels, ranging from simple and incremental increases in efficiency to transformation of the business. In level one, a typical enter­prise first enables smartphone access to email, contacts and calendars–pro­viding employees with the same access they’ve long had from their computers on their mobile devices. Sure, there’s a value: I can be productive on the go without dealing with remote access ac­tivities. But the true business value of this enablement is on the order of 1-2 percent. People are in touch with the office a bit more frequently and expec­tations for reaction changes.

    Next up, companies start connect­ing additional capabilities to mobile devices—maybe checking for confer­ence rooms, enabling travel expenses or perhaps even access to file stores like SharePoint™. Again, this provides some incremental efficiency, but prob­ably less than 3 percent improvement.

    Financial services took the third step—which finally adds significant business value—just a few years ago when the most innovative among them started accepting check deposits by let­ting customers take photos of a check with their phone. While seemingly small, this innovation held significant business value for the bank and tre­mendous customer experience value as well. Trips to the bank branch to deposit checks were gone. Collecting paper checks from ATMs and branches were gone. T he t ime-consuming and costly processes of transporting, scanning, and destroying paper checks were gone. Almost overnight, these banks saw reductions in costs that only grow as people adopt this innovation.

    This represents the third level of using mobile strategies to create value—de­veloping something that evolves the way your organization does business, the way customers interact with your organization, or both.

    Our highest level of business value comes from transformation. There are few examples from inside companies, but Uber provides a transformational business example that’s very visible. Using key features of every smart­phone—location, mapping, touch, and simple user interactions—Uber upend­ed the taxi business, reducing the num­ber of cabs cruising wastefully looking for fares and creating a mutual benefit by reducing the demand/ supply friction that existed in trying to find a cab when you actually want one. Further, it reduced the friction of paying for the ride, and built in customer and driver ratings to address sat­isfaction of both parties. The Uber transformation didn’t stop there. In major cities, Uber is picking up and delivering kids and packages, further improving the customer value for busy people. While there are questions around some specific prac­tices, there’s a real transformation in value from the way things used to be done.

    These four steps in increasing business value are shown in the attached diagram, along with some other key points for mobile security. As business value increases, the value of the information being accessed also increases, requiring more integration, more work and more security. CIOs need to look beyond training application developers and instead focus on finding tools and processes that will enable secure access to resources that will create greater business value. That drives the similarly increasing value and need for effective identity management, APIs and other services that will support secure mobile applications. The third and largest arrow highlights the potential business value increase through productivity and transformation.

    So, what steps can businesses take be successful in this are­na? There are three mobile security strategies critical for help­ing drive real increases in mobile business value. First, CIOs need to work with and engage their business partners in crea­tivity and innovation exercises to create a portfolio of mobile application activities that include both small incremental bets and one or two big transformational ideas. “Design Thinking” methodologies have moved from art toward science as a way of engaging business teams to think creatively about a company’s current and future opportunities. These processes are used over and over by some of the most innovative companies to generate ideas and refine them into products, services and applications that can be quickly built, tested and refined. Great new ideas can come from many places, but deliberate approaches to gen­erating and nurturing those ideas are necessary to ensure that applications will create value for the business.

    “As business value increases, the value of the information being accessed also increases, requiring more integration, more work and more security”

    Second, CIOs need to empower a mobile application de­velopment team to gain the skills and tools needed to quickly design, build and test mobile applications. These aren’t the ap­plications we built in the 90’s and early 2000’s. Mobile applica­tions need to be built based on use cases and customer experi­ences that are easy to adopt, quick to delight, and demonstrate value. A recent Gartner survey found that “users will try new apps, but they need to be convinced of an app's value before they adopt them and change use patterns over the long term.” Application development teams need the tools that let them build and manage code throughout the development lifecycle. They also need the skills to make sure use cases, interfaces and visuals make for easy adoption with great user experiences so that the applications provide demonstrable value to the employ­ees, partners and customers.

    Third, CIOs need to ensure security is an integral part of the application process. Your company’s reputation rides on the security and privacy addressed by each application you deliver. One insecure application can ruin a business reputation built over decades. Privacy concerns can reduce adoption or cause a mass exodus from one application to another. With all the head­lines about security hacks and data breaches, a recent IBM/ Ponemon survey of 400 large companies showed “a full 50 percent were found to devote zero budget whatsoever—nada— towards mobile security.” Organizations should have security included as use cases, gating functions and release criteria, to ensure that mobile applications are protected from at least the most common mobile security problems before release.

    Companies need to develop deeper mobility risk manage­ment strategies that enable the creation of measurable and sig­nificant business value. When developing mobile strategies, companies should shift more attention to how mobility can re­define their business and create new opportunities, as well as look for ways to re-engineer processes using mobile data and capabilities, all while keeping an eye on security as it relates to both the mobile solutions and organization overall.

    Check out: Top Enterprise Security Startups in APAC
    tag

    Startups

    Financial

    SharePoint

    Customer Experience

    Weekly Brief

    loading
    25 Most Promising Enterprise Security Solutions Providers
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://security.apacciooutlook.com/cxoinsights/transforming-your-business-through-secure-mobile-strategies-nwid-285.html