Mobility is transforming the way enterprises conduct their business, it's up to IT to create a good mobile security strategy. With so many solutions and technology available, how does IT make sure it covers all scenarios business require, how does IT ensure it implements a non-intrusive solution on private devices, how does IT ensure compliance, and most importantly how does IT protect confidential information under all these constraints… How does IT lead?
"Many organisations struggle to find suitable solutions in their mobile security strategy for remote PCs and Laptops used by both staff and external contractors/consultants who require access to information hosted in the corporate network, but is IT being forced to use technology that is not entirely best suited and causing conflict with users," says
Let's look at some of the technologies available:
Containerisation – secure application/container holding only company information (e-mail and PIM, File Shares, Intranet and HTML5 applications such as SharePoint and SAP) and completely separate from private applications and data. True containerisation does not require any
VPNs – virtual private networks allow users access to the company network and users work with the same abilities as if they were on the network.
Multi-session – solutions that allow users to run a remote session off a back-end system.
Data collaboration – send and collaborate information to both staff and external users such as consultants, customers and business partners. These solutions come in various forms and are mostly public cloud based.
"Many companies are implementing
Containerisation is a far better offering as this keeps all business data in the container and prevents any data leakage as the data cannot be moved, copied or saved outside of the container. True containerisations solutions also only allow users to edit and view documents inside the container, offer separate e-mail and PIM applications and do not use any of the devices' native applications. Companies can also allow users access to secure Intranets, file shares and HTML5 applications such as SharePoint and SAP, all in one container and without the need for additional VPN solutions. Also very important is if a device needs to be wiped, then only the container is wiped and not the whole device thereby not destroying private information.
Companies using native custom built business applications would need
"So it makes sense for companies to implement a solution that offers true containerisation for privately owned devices and
What about BYOPC (bring your own PC)?
This is the next big hurdle, most people working today use a company provided computer which is configured to provide easy access to all required business systems. Traditionally this has been the only way for employees to work as the desktop or laptop needs to be "trusted" in terms of security.
But what happens if you don't have a company laptop and need to work from an "untrusted" device such as a home PC, Internet cafÉ etc. Or if you require contractors and partners to access certain IT resources from their own PC?
IT does not feel comfortable offering VPN access to unmanaged and privately owned PCs and laptops for staff and external consultants as this creates significant risk of data leakage and network compromise.
While multi session based solutions such as
What if one could conduct "Remote Application Management"? This is where a remote access client runs from within Windows/Mac or USB on an employee's or contractor's personal PC and presents the user with a menu of applications they are allowed to access.
Providing an end-to-end secure connection users can only work remotely on the application, document(s) in a file share, remote desktop or browser based applications such as SharePoint without data leakage. All data stays within the company network and is not downloaded to the user's local PC or USB drive, and in high security requirements one can use a bootable USB stick and force the local hard drive to stop working.
Solutions offered by a company called Excitor give customers a platform to secure information on private or company owned mobile phones and PCs or laptops.
Lastly what happens when you want to distribute files to staff or external parties who do not require data that is available the container and
"It goes without saying that if corporates could put a mobile information security plan in place that focusses more on the information and not the device then this will help IT formulate a good security strategy but also get buy in from users," concludes Glansbeek.
Most Popular Stories
- Criminal Investigation Opened Into James Foley's Death
- The Hip New Career? Farming
- McDonald's Names Another U.S. President
- Student Startup Develops Date-rape Detector
- Is Diversity in the Eye of the Beholder?
- Sahara Casino Rises Anew as SLS Las Vegas
- Chinese Coal Gas Boom Poses Climate Risks
- Job Market Shifts Complicate Yellen's Rate Decision
- U.S. Supporters of Islamic State Get Close Scrutiny
- Investors Betting on ECB Stimulus Measures