Mobility has become a significant part of both local and global businesses. The use of mobile devices within the working environment or using mobile devices to connect to the business environment has become a norm for many employees who are working remotely. This means that employees, partners and customers are no longer tied to their desks and thus, need access to resources at anytime, anywhere, and from any device. The use of mobile devices in the enterprise comes with both great advantages and significant challenges, and this can be one of the more convoluted issues the organization must face as it is likely to be one that is difficult to deal with.
Mobility is one more step towards the erosion of the secure perimeter. Users access business resources from the outside world, and data – possibly sensitive and proprietary data that resides or at least travels outside the enterprise network. Ensuring that this does not erode the security requires effective management of the business’s mobile environment otherwise this can be a burden for the organization already managing its own IT systems and networks. Multiplied by the hundreds or thousands of different mobile devices on the network and failure to properly manage that risk can be a waiting disaster.
This obstacle can be pared by using products and services which assist businesses to manage mobility well. This means detailed planning of the company requirements and how Bring Your Own Device (BYOD) will be used. Who will use this remote facility and how will security, safety and data be managed on a day to day basis, and most importantly, to understand what the employees might already be adapted to do on their mobile devices without having a formal policy in place.
If the business does not yet integrate a mobility policy and employees are already using personally-owned devices or in other words, Bring Your Own Device (BYOD) to access the network, the first decision the business will have to make is whether to permit BYOD in the enterprise. BYOD has its own advantages, for example the employees can use the devices which they are already adept with and this can save finance for the organization in provisioning company devices for the workers. However, the disadvantage of this is how adequately the business can manage secure disparate devices running a variety of operating systems and applications, to ensure the confidentiality and reliability of company resources, data and overall information without compromising employee privacy.
Nevertheless, similar issues of security, privacy and user expectations can also be addressed if the business decided to issue its own devices to the employees, as inevitably the users will expect to be able to use an issued device personally. This is not necessarily unreasonable, but appropriate controls and policies will have to be in place. Fortunately, management should be easier on a more or less dedicated device, as the organization should have the right and ability to configure, monitor, and update a device that it owns and has issued.
When determining needed controls and policies, consider what regulations or industry standards the business must be in compliance with. The Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry (PCI) standards, the Children’s Internet Protection Act and many others will dictate what controls must be in place, depending on the sector which you operate.
Hypersocket Access Manager supports mobility and thus provides unlimited self-service password management and supports Active Directory demands of identity management and access control. This means users do not have to change their work routine or spend excessive time contacting the IT department to change or reset their passwords while being out of office. Access Manager also integrates password self-service with all forms of technological devices specially catering for the remote workforce.
For more information on BYOD and security, download our free eBook in collaboration with the Tech Writers Bureau here