more-arw search

The Ins and Outs of BYOD Security

The Ins and Outs of BYOD Security

Over the last decade, the prospect of bring-your-own-device (BYOD) in the office has gone from somewhat of a pipe dream to a demanding and beneficial aspect of operations. Those with executive jobs will likely have to focus their efforts on the deployment of BYOD policies to ensure the integrity and security of corporate data.

The benefits of BYOD are undeniable, including its ability to decrease corporate capital and operational expenditures through employee-provided equipment. Additionally, this new trend is an excellent way of adapting business functions to the rapidly growing number of younger employees.

Still, security is difficult, as executives will have to consider network-, device- and application-oriented management policies.

Network and device security 101
Network World recently moderated a debate between network security expert Kevin Flynn and device security specialist Lawrence Reusing regarding the best way to secure an office with BYOD.

According to the source, Flynn argued that network-oriented security allows a business to focus on the big picture, mitigating accessibility to individual devices through the overall network on a mass scale. This, he explains, helps to quell the issues related to highly varied devices in use by setting a standard for all at once.

However, Reusing contended that failing to focus on device-oriented security leaves employee devices that are used for business functions outside of the office un-checked. Thus, he believes that encryption and authentication practices for all devices is the method of choice to secure corporate data.

App-centric mobile security
The IDG News Service recently explained that mobile application management can be the final step in a mobile device management strategy to ensure security. According to the source, mobile apps are most often used to access the corporate data, so executives should regulate what providers are acceptable.

Further, the problems related to both device- and network-centric mobile management are alleviated because employees will only be able to use software that is regulated and examined by corporate officials.

Building a mobile security fortress
There is no reason that businesses cannot have all three of these strategies in place at the same time, so long as they are created together and coherent with one another. By combining all three security practices, an enterprise can save itself from the headache, costs and lost-face a data breach could cause and gain the benefits BYOD yields to corporate mobility.