Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

Study: Many organizations going mobile

Looking across the enterprise landscape, it'd be easy to find 10 employees all using different devices.

brianChristiniNEW2

Study: Many organizations going mobile

byod, department of defense, mobile device management


Looking across the enterprise landscape, it'd be easy to find 10 employees within the same company all using different devices. Some employees are perfectly happy using company-issued devices, others prefer their own iPhones so they can store personal and professional calendar data all in one place, and others naturally turn to Android. As a recent Channelnomics article pointed out, many organizations are turning to mobility, despite liability and data security concerns.

Citing data from two recent studies conducted by Trend Micro, the article said 86 percent of survey respondents indicated loss of corporate data on employee-owned devices as a top concern, and 83 percent address those concerns with BYOD policies that require employees to install security software. The key to managing mobile device security concerns is developing policies and implementing technology that offer comprehensive protection for the network.

"Companies that are questioning whether or not to allow workers to bring personal devices into the workplace should just stop asking: It’s clear that you can get a competitive edge when you put the right precautions in place," said Cesare Garlati, Vice President of Mobile Security at Trend Micro. "The BYOD phenomenon gives companies that allow it a competitive advantage as it enhances innovation and creativity in the workplace while reducing overall costs for the entire organization. The key to not being overwhelmed by this trend is that all these devices need to be secured by implementing the proper BYOD policies and procedures."

DoD streamlines mobile device management
A recent announcement from the U.S. Department of Defense highlighted how crafting comprehensive mobile policies can benefit both organizations and mobile device management (MDM) vendors. The DoD plans to streamline the process of accepting MDM solutions, according to a recent Federal News Radio article. The Defense Information Systems Agency explained it plans to change the current security technical implementation guide (STIG) to a more vendor-driven approach. In addition to being available for technology vendors, the guide will be available to other agencies to use for their own MDM strategies.

Alex Froede, Director of Field Security Operations, who was quoted in the article, said the new process is based on the National Institute of Standards and Technology's special publication 800-53 guidance, and will provide guidance for vendors hoping to work with the DoD.

Mobile device management guidelines
Federal News Radio reported there are several areas for which the DoD will issue guidelines, including:

• Accepted mobile operating systems: A list of security requirements for iOS, Windows, Android and BlackBerry
• Mobile device management: A security baseline for mobile app and device management
• Mobile apps: Security requirements for apps used on DoD devices
• Mobile policy: A section to cover the non-technical aspects of MDM, including how product training will be coordinated for end users and network administrators

"The results will be the development of STIGs much faster than today," said Froede. "We hope the new STIG process will solve some of the problems found in how long it takes for us to get these out. People are willing to set up their devices to be secure if they are told how to do it. We think once the STIG is available, it will take one or two months to decide whether to approve it."

The DoD's new guidelines provide one example of how an organization with stringent security and compliance requirements can implement effective MDM policies that shorten deployment times without causing headaches.

Recommended Articles for You

Post a Comment

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments

Industry News
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.