Unsolved
This post is more than 5 years old
2 Intern
•
265 Posts
0
807
January 27th, 2015 08:00
Securely Enabling Mobility and BYOD in Organizations
Bring Your Own Device (BYOD) for work and accessing corporate information on mobile devices is definitely on the rise. While BYOD and Mobility offer flexibility to the workforce and agility in business operations, mobile devices are plagued by a lack of robust security features.
Notwithstanding that very real security concern, organizations that fail to embrace the emerging BYOD trend might force employee users to circumvent established organizational controls. To mitigate security concerns, an Enterprise Mobility Management (EMM) approach provides balance between security and productivity
In this Knowledge Sharing article, Sakthivel Rajendran shares ways to overcome security risks, introducing best practices to secure the five components of BYOD and Mobility.
1. Device
2. Application being used in the device
3. Data handled in the application
4. Network used to connect the device in the organization
5. Users
Sakthivel also discusses Access control matrix, Mobile Device Management (MDM), Mobile Application Management (MAM), Secure Development Lifecycle (SDL), Network Access Control (NAC), Virtual Desktop Infrastructure (VDI), secure containers and App wrapping.
These technical controls can be deployed as an additional layer to administrative controls—such as IT security processes—to offer organizations a level of assurance that its business information will be protected from security risks.
Sakthivel highlights the importance of having a strategy prior to embarking on the BYOD journey. This article will help anyone involved with mobility and BYOD programs in an enterprise including; Network security, Enterprise Architect, Information Security Architect, IT security Manager, Application architects and developers, Audit and compliance, System administrators, program managers, and Security Operations personnel.