Mobile Cloud Security: Next Frontiers
A proactive mobility policy is no longer a choice for business. It’s now a necessity. Just try stopping employees using their mobile devices. There would be insurrection. Mobile devices are the default tool of business – they provide the instantaneous, just-in-time, connected and collaborative starting point for just about all business processes.
Without ‘business approved’ mobile devices, employees will use their own. With business approved devices they’ll use their own and the business device. They’ll text, email, download, entertain, socialise, buy, sell, converse, chat, read, listen – using pervasive, always-on and (mostly) cloud connected devices. And, often, their employers will lose control – a bit or a lot – of what their employees are doing and why they’re doing it.
Welcome to the world of mobility and business in 2013. It’s about cloud, device, connectedness and risk. And in our new study we’ll investigate where mobility and business might be going. We are creating a programme that will take look at mobility and risk, paint a picture of the competing mobile de-risking strategies and draw conclusions about what this means – for those tasked with making sure mobility is successfully implemented, and for those companies providing solutions for them.
You can take part. We’re inviting a small number of sponsoring companies to join us on the journey to create some discussions, debates, and data around the topic of mobility, business and risk. We want to peer into the dark corners of mobile data security (or lack of it). We want to consult CIOs, technologists, analysts and investors – to come up with some ideas about how mobile business tech will evolve and what role security will play. Most of all, we want to provide the content you need to have clear, articulate and informed opinion.
We’ll be creating a special project micro-site with free-to-view access to the public that will feature:
- Video highlights of our discussions with corporate mobility decision-makers
- Interviews with our sponsors
- A series of technology focus articles highlighting emerging mobile security technology
- Articles on alternative mobile security strategies
- A final report and video discussion on new mobile security horizons
Simple sponsorship packages will include a combination of some or all of the following
- Sponsor branding on the programme website
- Sponsor profile page and cross links/social media links on programme micro-site
- Sponsor branding on published report cover
- Sponsor interview video featured on event micro-site
- Co-branded sponsor media release featured on event microsite
- Opt-in registration database (final report downloads)
- Participation in report media launch luncheon event
- Hard copies of the printed report
- Full visibility via our media programme
Just complete the feedback form below to register your interest.
This project will be managed by Jeffrey Peel and Kevin Franklin – both of whom have considerable experience in mobile technology marketing and sectoral analysis. For further information about Jeff and Kevin please click here to visit the Quadriga Consulting team page.
Register Your Interest