Company-issued mobile devices are quickly becoming a thing of the past. Juniper Research predicts that by 2018 uses of BYOD in the enterprise will exceed one billion. Companies have clearly accepted and implemented the practice, but that doesn’t mean they are clear around policy and security.
Aside from typical security issues that come with BYOD, McAfee reports that Android malware nearly tripled between 2012 and 2013. This is further evidence that companies need to take a hard look at the best practices for managing and securing BYOD in order to protect their data and networks.
For optimal management and security of BYOD in the enterprise, more companies are recognizing the benefits of containerization to lock down devices and ensure that access to enterprise IT systems is protected.
Containerization separates corporate from personal data on smart devices. It secures corporate data and protects against malware, while preventing unauthorized access via security policies that are tailored by employee groups and pushed out to devices over the air.
Some have argued that containerization is akin to taking a sledgehammer to BYOD. Others believe that in order to use native apps for email and scheduling, containerization forces employees to seek “workarounds” that create new vulnerabilities to the enterprise.
The answer to these concerns is to implement an “employee-friendly” BYOD solution that combines secure data leakage prevention policies with the ability for personal and corporate data to coexist on the same device—this comes easily through leveraging containerization.
Plus, containers do not compromise employee privacy or the native user experience. Both sides see benefits, including:
• Creates an encrypted corporate workspace container for enterprise data, communications, and applications on a mobile device (smartphone or tablet) separating corporate data from personal data and applications
• Prevents the download of unauthorized apps as well as data leakage with copy and paste restrictions within the container
• Scales across a company’s fleet of devices (i.e., device agnostic) to provide a consistent user experience through one central portal
• Encrypts corporate data using FIPs certified encryption algorithms
• Deploys apps securely via SSL into the corporate container
• Separates employees’ work and personal lives on a mobile device
• Grants personal freedom of device choice
• Enhances privacy, including locking out the employer’s IT department from seeing apps on the personal persona and how, why or when they are being used
Without a container, the responsibility for security of BYOD liability is up to the individual employee. All devices should be treated as work devices, regardless of their liability model because enterprise intellectual property, including email, will make their way onto the devices.
Corporate and personal data were never meant to be together in the first place. Companies need to facilitate the separation and owe it to their employees to provide security, protection and privacy. IT leaders in enterprise settings should consider these benefits of containerization as they look to improve management of BYOD.