Securing the Mobile Enterprise

Today’s data-on-demand environment is demanding more and more out of a corporate IT department. The latest trend in this phenomenon has become Bring Your Own Device (BYOD). However, beyond just bringing a personal device to a corporate setting, we are now experience both the consumerization and the incorporation of user devices. The average user is beginning to use 3-4 devices to access information relevant to their jobs or role. This new push for more devices within an organization has IT security and data center professionals a bit nervous.

As more users request the use of their own personal devices administrators are left with some very serious security questions. In Securing the Mobile Enterprise , we begin to understand just some of the security topics that IT professionals are faced with when discussing some type of BYOD initiative:

  • Regulatory compliance controls
  • Access rights, privileges, and controls
  • Data and device protection from theft or loss
  • Malware and on-device security
  • Enforcement of corporate security controls
  • Web and cloud access
  • Control of both corporate and consumer applications

That’s not to say that there aren’t direct benefits from moving towards such a platform. However, the most important part of any BYOD deployment is the control, management and security aspect that a corporation must undertake. Depending on the industry, security professionals must consider the following points to create a robust, user-centric, device infrastructure:

  • The technical deployment aspect
  • Ease of use for the end-user
  • Workload control and delivery
  • User authorization and single sign-on capabilities
  • Protection against mobile device and application-compromising malware

Download Securing the Mobile Enterprise white paper today to learn the important parts of IT and end-user consumerization as well as how to properly approach this type of infrastructure. Beyond the cautions, Securing the Mobile Enterprise, also outlines the many positives in working allowing device versatility for an end-user. Remember, take the time to plan out every aspect of a BYOD deployment. By doing so, corporations can see increases in productivity, agility, and still deliver a powerful end-user experience.

Get Daily Email News from DCK!
Subscribe now and get our special report, "The World's Most Unique Data Centers."

Enter your email to receive messages about offerings by Penton, its brands, affiliates and/or third-party partners, consistent with Penton's Privacy Policy.

About the Author

Bill Kleyman is a veteran, enthusiastic technologist with experience in data center design, management and deployment. His architecture work includes virtualization and cloud deployments as well as business network design and implementation. Currently, Bill works as the Vice President of Strategy and Innovation at MTM Technologies, a Stamford, CT based consulting firm.

Add Your Comments

  • (will not be published)

One Comment

  1. The reality is that it's hard to get employees to comply with security guidelines if it means they have to learn new systems or procedures, "but if it's the same system as they already using on desktop, it makes it easy for them to be in compliance. Thanks for the read Bill