Page 34 - CDM-Cyber-Warnings-March-2014
P. 34
2$"41(38 "' ++$-&$2 1.3$"3(-& 8.41 $-3$1/1(2$ # 3 By Hormazd Romer, Sr. Director of Product Marketing, Accellion The rise of BYOD created exponentially fast growth for the number of mobile devices operating in the global workplace, which in turn created a new industry of mobile device management (MDM) solutions. These solutions were designed to protect corporate devices and the information that had begun living on them. However, for a few reasons, I think this line of corporate thinking and purchasing is only the first step. Yes, there are a number of security issues that deal directly with the device, such as a lost phone, but an employee could access information from any number of devices, will companies secure each and everyone? Businesses should be concerned with protecting their proprietary data, regardless of the device it’s accessed from. This is where mobile content management (MCM) solutions play a key role. The security question that many businesses are grappling with is do we protect the device, or the data? From my perspective, you should be considering both. These questions and concerns came to the forefront of enterprises’ thinking when the consumerization of IT established mobile devices as the new computing form factor in the enterprise, spawning the BYOD trend. What came next was IT teams searching frantically for ways to protect the intellectual property that was leaving their networks on a multitude of devices, and security vendors scrambling to provide the solutions enterprises desperately needed. BYOD poses a number of security concerns, because if left unmanaged, it can impact your network availability and cause data loss. According to Gartner, more that half of all global employees participated in a BYOD program in 2013; those companies that have opened up their doors to allow corporate data access on any device will need the right network access strategies and data policies in place to secure their environment and proprietary content. The key to a secure BYOD-enabled enterprise is having well-managed content repositories that are accessible via any mobile device but secure, and there are obviously a number of ways to go about this. There are three key security concerns that companies should consider as they navigate BYOD territory: Data Sync and Storage: When data is in motion it’s at a higher risk of being hacked, no matter how strong the encryption levels are. Many public cloud solutions constantly sync content between all devices, putting sensitive corporate information at a higher risk for a breach. Also at higher risk for data leakage is public cloud storage, which many companies choose to utilize for mobile access. However, public clouds co-mingle data, which means that your proprietary product information is mixing with a consumer’s vacation photos. Before choosing a solution to support a BYOD program, companies should consider looking at private cloud architecture, so that data is only synced when an employee chooses to sync, and when data is at rest it remains inside of the corporate network. In this manner businesses can get the flexibility and productivity benefits of a BYOD program, without compromising security or losing control of data. " # % " $ " # ! !