In the bring your own device (BYOD) workplace, application security is a significant concern. How do you guarantee sensitive business data is secure on your employees' mobile devices? Business apps built with a security framework may not be enough to ensure your information is secure. Stephen Skidmore, Director of Product Marketing at Apperian, recently wrote about security in the mobile workplace. His post outlines security concerns in the workplace and offers some tips for beefing up data security in your enterprise. Republished with permission from Apperian blog Written by Stephen Skidmore, Director of Product Marketing at Apperian 95. That’s the percentage of IT executives and security professionals who are concerned about BYOD security according to a recent survey conducted by Check Point. Perhaps more alarming is the fact that the same survey revealed that nearly half of participants admitted to suffering a BYOD security incident costing in excess of $250,000.
In addition to the legal ramifications of implementing device-level security measures on a personal device, mobile device management doesn’t have the infrastructure to support today’s modern mobile environment. Both apps and devices are the subject of frequent updates and upgrades, leaving enterprises supporting mobile device management vulnerable to security threats as they are forced to constantly play catch-up to the latest device and OS versions available on the market.
TRADITIONAL SECURITY MODELS AND BYOD DON’T MIX
It’s clear that enterprises are struggling to keep pace with the growth and implications of bring your own device (BYOD). The reason? BYOD is more than just the latest IT trend. It’s altered the business landscape completely, affecting the role of IT and enterprises, as well reshaping business workflows, how we work, and where we work. To put it simply, the impact of BYOD is far greater than previous IT advances and applying the old security model to this new technology does not work. Before BYOD, Blackberries and other corporate-issued devices were at the forefront of the enterprise mobility movement. At that time, enterprises imposed centralized control over the devices themselves. This made it possible to perform updates, apply patches, and shutdown devices remotely in the event of a security concern. While mobile device management was a valid method for securing corporate property, this approach fails to adapt to and address the needs of the modern BYOD user.
Comment