10/04/2013

Webinar Recap: Navigate the BYOD Movement with Expert Insight from InformationWeek and Zix

by Jim Brashear

Posts

Recently we hosted a Webinar with Michael Finneran, author of InformationWeek’s “2013 State of Mobile Security.” Below are five key takeaways form the Webinar. Looking for more? Check out the full Webinar and presentation here.

1.BYOD is Here, and So are the Risks. BYOD acceptance is approaching 90% of organizations, and many appear to allow personal devices without taking the necessary security precautions. According to Finneran’s report, 60% of devices accessing corporate data are company-supplied, and 40% are personally owned, with 100% of companies surveyed reporting experiencing a mobile security incident. Although mobile technology makes employees more accessible and productive, mobile devices bring unique challenges as they are easy to lose and great targets for theft, and there is a general lack of recognition for the value of information that is stored.

2.Balance is Key. IT’s goal is to make BYOD manageable and secure for their company. While end-users want freedom to use the apps they love and complete privacy regarding their personal activities, organizations are looking for effective security, control and support. Without the right balance, organizations won’t be fully protected, and end users won’t abide by the policies.

3.The Challenges. In developing a sound mobility policy, IT must work with other groups (e.g. legal, human resources, labor relations, etc.) to address the full range of management concerns, including:

    •lost or stolen devices
    •company data residing on the device
    •policy enforcement
    •user acceptance and trust
    •employee privacy and associated liability risks
    •Compliance with federal and state regulations
    •transitioning employees that leave the company
    •access and management of contractors.

4.The Misses. Current BYOD solutions jeopardize corporate data by allowing data to reside on the device, or they neglect the user experience. Worse yet, some do both. For example, mobile device management and containerization store data on the device, leaving organizations to manage hundreds, possibly thousands of additional end points. With data on the device, organizations are never fully secure.

5.The Win = ZixOne. ZixOne is a mobile app that simplifies the BYOD challenge by enabling easy access to the most used business application on mobile devices — email. Through a secure, mobile environment, employees interact with their mobile corporate email as usual and enjoy the control and privacy they demand on their devices. If the device is lost or stolen, companies disable access. Because data does not reside on the device, companies do not have to manage or worry about thousands of copies of emails and attachments and avoid of corporate legal liability.

Posted: 10/4/2013 12:00:00 AM by Global Administrator | with 0 comments
Filed under: BYOD, corporate, data, email, Loss, mobile, privacy, protection, security


Recent Posts

02/21/2018

TLS is Present, But Is It Working?

by Dena Bauckman

View Blog Post

02/15/2018

Usability Is What Matters in Email Encryption

by Geoff Bibby

View Blog Post

01/24/2018

What 2017 Taught Us about Cybersecurity — What 2018 Has in Store

View Blog Post