Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

From lock-down to access: Turning security into an enterprise mobility enabler

Vikram Gill, General Manager, Client Solutions, Dell South Asia and Korea | Jan. 6, 2016
Security is an enabler for many processes relating to mobile computing and should not be viewed as an "add on" that holds back productivity, says Vikram Gill of Dell South Asia and Korea.

This vendor-written piece has been edited by Executive Networks Media to eliminate product promotion, but readers should note it will likely favour the submitter's approach.

When most business people think of IT security, they think of how policies and technology can restrict the ability to get work done. But in the mobility space, enterprises have a real opportunity to adoptgood security practices whichenable greater access to applications and better data management.

In today's mature enterprise client computing environments, most people are familiar with common security practices such as passwords, tokens, antivirus software and content access restrictions. However, in the fast-paced mobile environment, businesses have struggled to keep up with the entrance of new devices in the market alongside the trend of bring your own device (BYOD).

One of the barriers to mobilising business apps and data is concerns around the security of information. With the right security technology and processes in place, organisations are able to confidently deploy applications to every end point device, enabling a more mobile workforce where staff have easy access to the information they need, anywhere and at any time. This is how security becomes an enabler for mobility.

A recent study by forecast the Asia-Pacific mobile security market to reach US$7.5 billion by 2020, showing strong intention to protect information in mobile devices. Gartner too, predicted that by 2017, 75 percent of mobile security breaches will be the result of mobile application misconfiguration -- a good indicator of the need for better mobile management.

Device management includes data security

Like PC clients before them, most smartphones in use today are utilised without any remote management or security policy controls. IT managers are adopting mobile device management (MDM) solutions to bring a level of management and control over smartphone and tablet devices used for enterprise mobility.

However, managing devices is only part of the equation and the focus must turn to the applications and data on the device. App deployment and management, data protection, separation of work and personal environment and mobile Web policies are good practices for securing a fleet of mobile devices.

Enterprises across Asia must focus on mobile app and data management to provide an appropriate level of security amid a sea of handset technology. This approach lays the foundation for security as a mobility enabler. 

Security as a mobility enabler

Today's complex enterprise architectures have many applications which are not available on mobile devices, resulting in missed opportunities with workers unable to access the information they need wherever they need it. But with the appropriate controls in place, enterprise mobility strategies can safely allow more applications to mobile end-points.

These controls can be containerised apps, data backups and Web access controls.


1  2  Next Page 

Sign up for CIO Asia eNewsletters.