Page 25 - Cyber Defense eMagazine for July 2020
P. 25
Industry giants have chosen to approach this ongoing dilemma in different ways. Particularly as it
pertains to mobile security, Microsoft has tackled this challenge with the implementation of Mobile
Application Management without enrollment (MAM-WE). As work environments become increasingly
remote, organizations face an entirely new security landscape that will require them to adapt to BYOD
scenarios. MAM-WE gives organizations the ability to manage individual apps to protect sensitive
employee data, even from a personal device, in a setting outside the office. Microsoft’s offering is just an
example of ways that companies have broached the issue of security, without sacrificing convenience
and privacy.
There was roughly 24 percent of the full-time U.S. workforce working remotely for at least a portion of
their workweek in pre-pandemic days, but that number is steadily rising as a result of COVID-19. It’s now
critical that security decision-makers not overlook the importance of mobile and cloud security in this
evolving landscape. Our own analysis shows that as of March 30, the number of connections to
collaboration tools like Zoom and Microsoft Teams has increased by 109% since the first week of
February.
As Verizon’s Bryan Sartin put it, “The types of devices, diverse applications and further emergence of
IoT devices further complicate security. Everyone has to be deliberate and diligent about mobile security
to protect themselves and their customers.” Reiterating the sentiment that leaders will have to recognize
the inherent risks of increasingly mobile and cloud-connected environments and take proactive action.
There is a way to strike a balance between providing a convenient user experience that also maintains
the security and privacy of users. One recommendation would be for organizations to put policies in place
that utilize offerings like Wandera Private Access or MAM-WE to ensure that the security of corporate
data is not compromised, even when employees use a personal device. Outlining and adopting formal
acceptable use policies within organizations will also be a step toward finding this balance.
The findings from recent mobile threat research indicate a trend that decision-makers still believe they
have to make a choice between security, convenience, and privacy for their organizations. But with more
privacy-preserving and user-friendly security solutions becoming available, a harmonizing middle ground
can be found. It’s time to leave the notion that organizations can’t have both in the past, and focus on
solutions that allow for the security, convenience and privacy trifecta moving forward.
About the Author
Michael J. Covington, Ph.D., is a seasoned technologist and the Vice
President of Product Strategy for Wandera, a leading provider of mobile
security. Michael is a hands-on innovator with broad experience across the
entire product life cycle, from planning and R&D to executing on company
strategies. He previously held leadership roles at Intel Labs, Cisco Security,
and Juniper Networks. With a diverse background as a published computer
science researcher and as an IT professional, Michael has experienced
technology from all sides and enjoys bringing innovations to the market,
specifically in the areas of mobility and connectivity. He can be reached at
@MJCovington and at https://www.wandera.com/
Cyber Defense eMagazine –July 2020 Edition 25
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.