Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

5 things you no longer need to do for mobile security

Subbu Iyer, Director of Product Management, Bluebox Security | July 8, 2014
A couple of years ago companies were dismissive of BYOD, but as they've realized that the horse left the stable, they are adopting policies and next generation technologies to help manage BYOD. They also recognize that successful mobile security requires a cooperative partnership with employees, so are working with them to determine what policy works best for both parties, allowing BYOD to become part of the enterprise mobile security framework.

* Infringe on privacy — The No.1 concern of employees embracing BYOD is privacy. Employees fear their personal activities are being watched and that once they are locked into an MDM solution, their personal data — contacts, family photos and more — can be wiped at any time. In order to achieve compliance you need to win the trust of employees, and paying attention to their privacy concerns is key.

Privacy dashboards and dual personas allow companies to not only provide users with visibility into what IT is and is not tracking, but also ensure that only business data (not personal) will be wiped if a security situation arises. Some solutions even grant employees the freedom to un-enroll temporarily and reclaim their phone as a personal device. Whether on vacation, a date night, or just hanging out with friends for an hour, an employee can temporarily opt from accessing work related apps and data, without compromising security.

* Manage devices and apps using multiple dashboards — With the new era of mobility, IT no longer needs to use multiple dashboards to manage different devices - they can be viewed through a single pane of glass. Web based consoles now support centralized administration of both managed and unmanaged devices for IT convenience. It is now possible to integrate the device, application and user data management in one place instead of entering different portals to manage each one. By providing all three tenants of mobility management in a single pane, IT can make more informed decisions much quicker.

BYOD raises many issues for IT and the enterprise in general. However, there are ways to enable users to bring their own device, enhancing productivity without sacrificing security. Adopting a BYOD policy that is user-friendly and that secures corporate data will ensure that the goals of the enterprise and IT remain intact while ensuring user buy in - a necessary component of any security policy or program.

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.