Today’s data-on-demand environment is demanding more and more out of a corporate IT department. The latest trend in this phenomenon has become Bring Your Own Device (BYOD). However, beyond just bringing a personal device to a corporate setting, we are now experience both the consumerization and the incorporation of user devices. The average user is beginning to use 3-4 devices to access information relevant to their jobs or role. This new push for more devices within an organization has IT security and data center professionals a bit nervous.
As more users request the use of their own personal devices administrators are left with some very serious security questions. In Securing the Mobile Enterprise 
, we begin to understand just some of the security topics that IT professionals are faced with when discussing some type of BYOD initiative:
- Regulatory compliance controls
- Access rights, privileges, and controls
- Data and device protection from theft or loss
- Malware and on-device security
- Enforcement of corporate security controls
- Web and cloud access
- Control of both corporate and consumer applications
That’s not to say that there aren’t direct benefits from moving towards such a platform. However, the most important part of any BYOD deployment is the control, management and security aspect that a corporation must undertake. Depending on the industry, security professionals must consider the following points to create a robust, user-centric, device infrastructure:
Download Securing the Mobile Enterprise white paper 
- The technical deployment aspect
- Ease of use for the end-user
- Workload control and delivery
- User authorization and single sign-on capabilities
- Protection against mobile device and application-compromising malware
today to learn the important parts of IT and end-user consumerization as well as how to properly approach this type of infrastructure. Beyond the cautions, Securing the Mobile Enterprise, also outlines the many positives in working allowing device versatility for an end-user. Remember, take the time to plan out every aspect of a BYOD deployment. By doing so, corporations can see increases in productivity, agility, and still deliver a powerful end-user experience.
Article printed from Data Center Knowledge: http://www.datacenterknowledge.com
URL to article: http://www.datacenterknowledge.com/archives/2013/01/08/securing-the-mobile-enterprise/
URLs in this post:
 Securing the Mobile Enterprise : http://ads.madisonlogic.com/clk?pub=81&pgr=68&src=4712&ctg=1&tstamp=20130103T141618&ast=23997&cmp=7294&crv=0&frm=293&yld=0
 Bill Kleyman: http://www.datacenterknowledge.com/archives/author/bkleyman/
Click here to print.