siliconindia logo
CIO City >>  Expert  >>  

Saurabh Kaushik

"Design and develop BYOD policies customized to one’s organization and make sure users adhere to them"

 

Mobile Devices To Minimize Threat, Loss And Risk Considering the need of the Businesses enterprise data is fast moving outside the corporate perimeter/ assets to the Smartphones and tablets, making mobility a risky blind spot for organizations. Thus, the trend of BYOD (Bring Your Own Device) is making significant in-roads in the business world. In most cases, businesses simply can't block this trend and most believe that BYOD may help employees to be more productive through ease of use, convenience, cost saving etc. but this rapid adoption also has thrown some serious challenges and open up new avenue of threats and risks to enterprise security.

The typical challenges and risks are:
• Managing the mobile devices running on heterogeneous platforms like iOS, BB, Symbian, Windows, Android
• Tracking and controlling access of mobile devices to corporate network and data.
• To ensure authorized users access the right corporate resources.
• To prevent data loss from the mobile devices.
• To maintain the compliance standards amongst many others.
• End user privacy concerns ( Data Segregation)
• Seamless end user experience ( Transparent to end user)

Proposed Solution
It’s imperative for the Enterprises to recognize this risk and put in a framework to manage the same. The proposed framework must provide visibility into a smart device and how it is being used, letting both IT and users bolster data security and control costs without compromising users privacy. It should be able to create a central view of mobile devices, content, activity, and applications to enable real-time intelligence and control across the enterprise. And of course since the whole mobility industry is driven by and for users, maintaining the end user experience should always be the priority. Broadly, Enterprises shall follow the below steps to ensure a successful implementation of Mobile Device Lifecycle Management / BYOD solution
• Design and develop BYOD policies customized to one’s organization and make sure users adhere to them
• Devices should be password-protected and data stored on them should be encrypted
• User agreements should authorize the organization to remotely wipe data if a device is lost or stolen.
• Rolling out specific controls in phased manner
• Training and awareness to employees and system admins
• Central monitoring & review of the risk posture