Looking across the enterprise landscape, it'd be easy to find 10 employees all using different devices.
Study: Many organizations going mobile
Looking across the enterprise landscape, it'd be easy to find 10 employees within the same company all using different devices. Some employees are perfectly happy using company-issued devices, others prefer their own iPhones so they can store personal and professional calendar data all in one place, and others naturally turn to Android. As a recent Channelnomics article pointed out, many organizations are turning to mobility, despite liability and data security concerns.
Citing data from two recent studies conducted by Trend Micro, the article said 86 percent of survey respondents indicated loss of corporate data on employee-owned devices as a top concern, and 83 percent address those concerns with BYOD policies that require employees to install security software. The key to managing mobile device security concerns is developing policies and implementing technology that offer comprehensive protection for the network.
"Companies that are questioning whether or not to allow workers to bring personal devices into the workplace should just stop asking: It’s clear that you can get a competitive edge when you put the right precautions in place," said Cesare Garlati, Vice President of Mobile Security at Trend Micro. "The BYOD phenomenon gives companies that allow it a competitive advantage as it enhances innovation and creativity in the workplace while reducing overall costs for the entire organization. The key to not being overwhelmed by this trend is that all these devices need to be secured by implementing the proper BYOD policies and procedures."
DoD streamlines mobile device management
Alex Froede, Director of Field Security Operations, who was quoted in the article, said the new process is based on the National Institute of Standards and Technology's special publication 800-53 guidance, and will provide guidance for vendors hoping to work with the DoD.
Mobile device management guidelines
• Accepted mobile operating systems: A list of security requirements for iOS, Windows, Android and BlackBerry
"The results will be the development of STIGs much faster than today," said Froede. "We hope the new STIG process will solve some of the problems found in how long it takes for us to get these out. People are willing to set up their devices to be secure if they are told how to do it. We think once the STIG is available, it will take one or two months to decide whether to approve it."
The DoD's new guidelines provide one example of how an organization with stringent security and compliance requirements can implement effective MDM policies that shorten deployment times without causing headaches.
Recommended Articles for You
More from this Author
Fresh from the Desk