The Growing Need for BYOD (Bring Your Own Device) IT Security.

The Growing Need for BYOD (Bring Your Own Device) IT Security.

In this new era of BYOD (bring your own device) usage, 80% of employee BYOD activity goes unmanaged by corporate IT security programs. The reason? Current IT security technologies were not designed to deal with mobile devices in terms of disconnecting from networks or interrupting backup schedules. And those security systems that do are not secure enough to prevent users from disrupting that security by changing schedules or settings. As a result, the solution should combine data protection, productivity enablement and a sound data management program.

Data loss protection should include tracking, geo locating and authorizing endpoints. Part of this protection is remote wipe capabilities which can protect corporate intellectual property from falling into the wrong hands. For example, a corporate employee’s laptop left accidentally on a plane should be easily located and data removed remotely from the device.

In addition to key data protection strategies, user productivity must also be part of a comprehensive IT security plan. 24% of users surveyed report they rely on BYOD as their main work related devices. Employing a best practices approach here should include:

User Transparency: Preventing users from disrupting data backups due to sleeping, or rescheduling activities, there must be complete employee transparency. Allowing users to work without interruption while backup continues in the background requires minimizing bandwidth via resource throttling and CPU issues maintaining system performance.

IT management from a single dashboard is invaluable in handling patches and security updates for all BYOD users. Best management functions include:

  • Centralized IT Management: Use of a single dashboard allows IT security to deploy, backup and manage endpoints globally without user interaction.
  • Selective Data Detection: Gives IT the ability to specify only corporate data backup rather than personal data backup preserving individual privacy and storage.
  • Data Reduction and De-duplication: Making sure that multiple copies of the same asset are not duplicated, saving on bandwidth and additional storage costs.
  • WAN Optimization: Increases data transfer efficiency resulting in quicker backups.

In today’s business environment, the recent onrush of employees using their own devices for company purposes puts these businesses at greater risk for unexpected data breaches. As a result, many companies are now purchasing and deploying tablets to their employees for total control over the device’s life cycle, asset disposition and end-of-life data security.

Sharing is caring!