How to Ensure the Safe Use of Enterprise Mobile Solutions
October 08, 2013
By Susan J. Campbell
, TMCnet Contributing Editor
Mobility in the enterprise is becoming an increasingly hot topic as new technologies, access to the cloud and the implementation of VoIP has made more professionals accessible and productive on the road. With growing access to apps that support today’s business user, a desk and four walls aren’t nearly as necessary as the right platform to support key business initiatives.
The challenge, however, is in ensuring that these apps are right for the enterprise and that they are secure. The topic of keeping enterprise mobile solutions secure was recently featured in an Information Week article, which emphasized the need of attention to policies to ensure security measures and deliver benefits.
For many organizations, it’s easy to assume that a mobile device management strategy is enough to ensure the safe use of devices in the field. While this is an important step, it’s not the one and only step. MDM provides solid management of the device itself, but it doesn’t protect the data being transmitted, accessed or stored by the device.
IT managers need to know how devices are being used, what enterprise mobile solutions users need and the security of other networks that may serve as the communication point for professionals on the road. For this, IT needs to take a comprehensive approach to mobile app security, viewing the app as an integral part of the security ecosystem.
To ensure the safe use of any device that will access the corporate network and its applications, there are essential enterprise mobility management (EMM) features that must be in place. The first to consider is that of environmental and biometric sensors placed in the devices that must comply with current data capture policies. Likewise, Device Access Control must be used to protect the physical access to the device.
Content management and data loss prevention software relies on encrypted on-device data storage, cut-and-paste controls defined through policy and website access control through URL filtering. These features restrict non-compliant sharing of protected content, whether intentional or not. Encrypted data storage will protect data on the device and application management and security relies on MAM to ensure secure access and deployment of approved enterprise mobile apps.
MDM is used to define and enforce policies related to mobile device control from remote locations. The user’s identity must be confirmed through user authentication, and device authentication confirms the unique identity of the physical device.
The key to the successful deployment of enterprise mobile solutions is a clear strategy in place to protect the network, the user, the device and the application. Without this important piece in place, the whole operation can be at risk.
Edited by Rachel Ramsey