Embracing BYOD: Mobile challenge
Embracing BYOD: Mobile challenge
A multilayered approach
BYOD adoption consists of a multilayered security approach that includes protecting the content on the device, ensuring that the applications running on it are trustworthy, and providing strong authentication services directly through it, says Bret Hartman, CTO of Bedford, Mass.-based provider of security, risk and compliance management solutions provider RSA, the security division of EMC.
“Something that's important to remember is that when we think about securing the mobile devices, there's always two halves to the equation,” Hartman says. “There's the client/device side, and then there's the server side.”
Hartman says a smartphone or tablet could have the proper security attributes in place, but if the right security mechanisms on the server side aren't able to validate those things, then only one part of the equation has been solved.
While not every enterprise may be fit for a BYOD environment, Hartman says that most believe they don't really have a choice. Even government institutions, known for their highly sensitive data and lockdown stance, are in search of security solutions for mobile devices.
Further, when it comes to employee-owned devices, one of the major concerns for the enterprise is the apps in use. With apps constantly being released and employees downloading whatever catches their attention, there's a new obstacle: bring-your-own-software (BYOS), says Domingo Guerra, president and founder of Appthority, a San Francisco-based mobile app risk management company.
“What's driving the consumption of these devices is not how cool the device is, it's how many apps the device can play,” he says.
Thus, the security focus should be geared more toward the apps, rather than the device itself, since the apps host a majority of the vulnerabilities, he says.
“[The apps] are what do the violations of privacy or the mismanagement of username and passwords,” Guerra says. “They present the way to break into the corporate server, not the device itself.”
Although mobile device management (MDM) software and mobile app management (MAM) solutions can block any app an administrator deems is unsafe, Guerra says it's difficult to determine which is benevolent and what is unsafe.
“Companies need the ability to be able to differentiate by job role, then be able to categorize those apps,” he says.
