Start a Conversation

Unsolved

This post is more than 5 years old

807

January 27th, 2015 08:00

Securely Enabling Mobility and BYOD in Organizations

Bring Your Own Device (BYOD) for work and accessing corporate information on mobile devices is definitely on the rise. While BYOD and Mobility offer flexibility to the workforce and agility in business operations, mobile devices are plagued by a lack of robust security features.

Notwithstanding that very real security concern, organizations that fail to embrace the emerging BYOD trend might force employee users to circumvent established organizational controls. To mitigate security concerns, an Enterprise Mobility Management (EMM) approach provides balance between security and productivity

In this Knowledge Sharing article, Sakthivel Rajendran shares ways to overcome security risks, introducing best practices to secure the five components of BYOD and Mobility.

1. Device

2. Application being used in the device

3. Data handled in the application

4. Network used to connect the device in the organization

5. Users

Sakthivel also discusses Access control matrix, Mobile Device Management (MDM), Mobile Application Management (MAM), Secure Development Lifecycle (SDL), Network Access Control (NAC), Virtual Desktop Infrastructure (VDI), secure containers and App wrapping.

These technical controls can be deployed as an additional layer to administrative controls—such as IT security processes—to offer organizations a level of assurance that its business information will be protected from security risks.

Sakthivel highlights the importance of having a strategy prior to embarking on the BYOD journey. This article will help anyone involved with mobility and BYOD programs in an enterprise including; Network security, Enterprise Architect, Information Security Architect, IT security Manager, Application architects and developers, Audit and compliance, System administrators, program managers, and Security Operations personnel.

Read the full article.

No Responses!
No Events found!

Top