Bring Your Own Device – But Don’t Endanger the Network
As smartphones and other mobile computing devices continue to proliferate, IT departments are scrambling to get ahead of the security risks posed by employees connecting into corporate networks through their mobile devices. Martin Kuppinger, at KuppingerCole, argues that you can’t control the devices, but you can secure the information accessed by those devices.
We agree that data security is primary, but also look at the potential security problems when a tablet computer or smartphone with sensitive data stored on it is lost. Also, when users begin to transition completely to mobile devices, through “bring your own device” programs, the delivery of an “out-of-band” passcode for strong authentication is compromised. There are several ways to minimize the risk a lost device or of only having one device. Methods like tracking network or IP awareness, or loading a soft token or PKI certificate onto the device, are simple to implement and use, but don’t always offer enough security.
A multi-pronged approach to security on mobile devices is need to protect the data and ensure that the user with the device is the user you expect. We laid out our thoughts on this in our recent webinar, Secure your mobile channel without affecting usability. Click here to listen to the recording or contact us for more information about the best ways of managing multiple mobile platforms to ensure trusted user identity and strong authentication.
Recommended For You
Online consumers can make their purchase with various payment options, like credit card, Apple Pay or PayPal. As a result, […]
A Two-step Authentication Approach Consumers are always on the go, using digital devices to make purchases, check account balances and […]
As an HR professional, it’s your priority to protect employee data. You may not realize it, but responding to employment […]
Meet Credit Union Members Where They Want to Do Business. It takes more than a “smile and a handshake” to […]