|By Gerry Grealish||
|January 27, 2014 10:00 AM EST||
Employees using mobile devices to access popular and often times essential cloud applications continue to increase in the workplace, both via private devices and those owned by the enterprise. This increase in use brings with it important data security issues for the enterprise. Some enterprises find themselves scrambling to implement mobile device management (MDM) technologies to address the data security concerns that go along with employees using mobile devices in everyday business. The end goal of these MDM solutions is to allow for the enterprise to securely capitalize on the benefits of mobile devices while not stifling the widely accepted bring your own device (BYOD) policy.
BYOD is clearly here to stay in the workplace, as the evidence of the efficiencies, convenience and cost-effectiveness experienced by both employees and the enterprise is undisputable. Utilizing BYOD devices offer the advantages of simplicity and asset control, but enterprises remain concerned about data being compromised as employees use their own devices over public networks to access sensitive information on enterprise networks. The issue of data residency also arises when employees travel from country to country and try to access regulated information that is not permitted to cross geographical borders. Employees may also need to use a personal device that contain offline storage and connecting to sensitive data such as protected health information (PHI) brings the possibility of putting that data in a less secure environment than the enterprise requires.
Just last week though, in a release about mobility trends, Gartner predicted that 20% of MDM technologies will be so strict that BYOD will fail. Where does this leave IT and security professionals responsible for balancing the security of the enterprise and mobility needs of employees?
Using Tokenization or Encryption with MDM
Encryption and tokenization are two data security methods that can protect sensitive information being processed and stored in cloud applications. While both methods can be used to safeguard sensitive information in public networks, the Internet and in mobile devices, tokenization has some specific benefits for enterprises primarily concerned with data sovereignty. Both techniques can be deployed within Cloud Data Control Gateways to provide employees with access to enterprise cloud apps while giving the enterprise ultimate control over where data can flow and be stored. Combining these technologies with a thoughtful, yet not draconian, MDM approach can lead to BYOD policies that will get the job done and prove successful. These powerful and interoperable solutions are being used by leading organizations to ensure compliance with sector specific requirements such as HIPAA, PCI DSS, GLBA and CJIS.
PerspecSys Inc. is a leading provider of cloud protection and cloud encryption solutions that enable mission-critical cloud applications to be adopted throughout the enterprise. Cloud security companies like PerspecSys remove the technical, legal and financial risks of placing sensitive company data in the cloud. PerspecSys accomplishes this for many large, heavily regulated companies across the world by never allowing sensitive data to leave a customer's network, while maintaining the functionality of cloud applications. For more information please visit www.perspecsys.com or follow on Twitter @perspecsys.
“This win means a great deal to us because it is decided by the readers – the people who understand how use of our technology enables new insights that drive the business,” said Matt Davies, senior director, EMEA marketing, Splunk. “Splunk Enterprise enables organizations to improve service levels, reduce operations costs, mitigate security risks, enhance DevOps collaboration, create new product and service offerings and obtain deeper insight into customer behavior. Being named Best Business App...
Jan. 25, 2015 10:30 PM EST Reads: 1,738
Jan. 25, 2015 07:45 PM EST Reads: 2,293
Jan. 25, 2015 07:00 PM EST Reads: 2,324
Jan. 25, 2015 07:00 PM EST Reads: 1,193
Jan. 25, 2015 06:30 PM EST Reads: 1,558
Jan. 25, 2015 06:15 PM EST Reads: 3,778
Jan. 25, 2015 06:00 PM EST Reads: 2,697
Jan. 25, 2015 06:00 PM EST Reads: 1,394
Jan. 25, 2015 06:00 PM EST Reads: 2,966
Jan. 25, 2015 04:30 PM EST Reads: 3,005
Jan. 25, 2015 04:00 PM EST Reads: 2,416
Jan. 25, 2015 04:00 PM EST Reads: 1,536
Jan. 25, 2015 04:00 PM EST Reads: 1,334
Jan. 25, 2015 03:00 PM EST Reads: 1,196
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile ...
Jan. 25, 2015 03:00 PM EST Reads: 2,424