Enterprise and Employee Data Need a Divorce

By Troy Fulton, Director, Product Marketing, Tangoe — June 22, 2014

Company-issued mobile devices are quickly becoming a thing of the past. Juniper Research predicts that by 2018 uses of BYOD in the enterprise will exceed one billion. Companies have clearly accepted and implemented the practice, but that doesn’t mean they are clear around policy and security. 

Aside from typical security issues that come with BYOD, McAfee reports that Android malware nearly tripled between 2012 and 2013. This is further evidence that companies need to take a hard look at the best practices for managing and securing BYOD in order to protect their data and networks.

Total Separation
For optimal management and security of BYOD in the enterprise, more companies are recognizing the benefits of containerization to lock down devices and ensure that access to enterprise IT systems is protected.

Containerization separates corporate from personal data on smart devices. It secures corporate data and protects against malware, while preventing unauthorized access via security policies that are tailored by employee groups and pushed out to devices over the air.

Some have argued that containerization is akin to taking a sledgehammer to BYOD. Others believe that in order to use native apps for email and scheduling, containerization forces employees to seek “workarounds” that create new vulnerabilities to the enterprise.

The answer to these concerns is to implement an “employee-friendly” BYOD solution that combines secure data leakage prevention policies with the ability for personal and corporate data to coexist on the same device—this comes easily through leveraging containerization.

Plus, containers do not compromise employee privacy or the native user experience. Both sides see benefits, including:

Employer Benefits
•  Creates an encrypted corporate workspace container for enterprise data, communications, and              applications on a mobile device (smartphone or tablet) separating corporate data from personal data        and applications
•  Prevents the download of unauthorized apps as well as data leakage with copy and paste restrictions      within the container
•  Scales across a company’s fleet of devices (i.e., device agnostic) to provide a consistent user                  experience through one central portal
•  Encrypts corporate data using FIPs certified encryption algorithms
•  Deploys apps securely via SSL into the corporate container

Employee Benefits
•   Separates employees’ work and personal lives on a mobile device
•   Grants personal freedom of device choice
•   Enhances privacy, including locking out the employer’s IT department from seeing apps on the               personal persona and how, why or when they are being used

Without a container, the responsibility for security of BYOD liability is up to the individual employee. All devices should be treated as work devices, regardless of their liability model because enterprise intellectual property, including email, will make their way onto the devices.

Corporate and personal data were never meant to be together in the first place. Companies need to facilitate the separation and owe it to their employees to provide security, protection and privacy. IT leaders in enterprise settings should consider these benefits of containerization as they look to improve management of BYOD. 

POST A COMMENT

comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

12345
Current rating: 0 (0 ratings)

MOST READ STORIES

topics

Must See


FEATURED REPORT

Mobile Productivity in the Enterprise: Moving from Support to Enablement with App Strategy

Enterprises now need to move from just supporting mobile workers to enabling them. The next gen of enterprise mobility management (EMM) tools, mobile app development strategies, collaboration tools and mobile apps will help organizations achieve productivity.