Dell continues to help organisations embrace mobility and BYOD strategies that strike an optimal balance between giving employees anytime, anywhere access to data while empowering IT to adhere to rules governing security and compliance. As a result, Dell customers are unifying security across enterprise networks and mobile platforms, so their users can interact more freely and efficiently with colleagues, customers, suppliers and partners without putting the organisation at risk.
Attaining the proper alignment between security and mobility can be a daunting task as a flood of new access devices on corporate networks creates many paths for exposing data and applications to risks. According to a recent Dell Global Security Survey, IT decision makers highlighted BYOD as a root cause of security breaches. In fact, 57 percent of those polled ranked increased use of mobile devices as a top security concern in the next five years (71 percent in the U.K.).
Employee resistance to corporate security policies is part of the problem as people find workarounds to circumvent corporate security policies that are restrictive or could encroach on their personal data. Enabling access to an ever-increasing array of device types (e.g., smartphones, tablets, laptops) and operating systems (Windows 8, Google Android and Apple iOS) also can introduce new security risks.
To minimize security risks while maximizing mobility benefits, Dell offers five best practices for implementing mobile security that addresses user work preferences, device types, operating systems and enablement strategies:
Best Practice No. 1: Build a Network Infrastructure Optimised for BYOD/Mobility
Creating a distinct BYOD network enables organisations to take into account the increased use of bandwidth-intensive tasks, such as video streaming, on mobile devices while ensuring that all personal devices and mobile apps are validated before allowing them to connect to the network in accordance with corporate security policies. In particular, organisations can create a master security policy that allows access to corporate information and parts of the main network from mobile devices while helping to ensure that no information leaks out through personal devices. Additionally, personal devices can be validated before connecting to the network so that they meet corporate security policies.
Best Practice No. 2: Create a Mobile User/Remote Access Policy
Setting up secure mobile access is essential to safeguarding corporate information from being exposed to mobile threats. First, companies should insist that employees use a PIN or strong password to access a device’s operating environment or apps as a first line of defense against data theft if a device is lost or stolen. Second, companies should seek secure mobile access solutions that use context-aware authentication, network access controls and a virtual private network to allow only authorised users and mobile apps, along with validated devices, to access corporate resources. A secure mobile access solution with these capabilities can reduce the risk of compromised devices or mobile apps that could act as a conduit for malware to infect corporate resources as well as prevent in-flight data theft.
Equally important is educating employees so they’ll avoid some of the basic behaviours that could introduce malware or expose corporate information to undue risk. For example, employees should be instructed to avoid WiFi hotspots for work without a VPN connection. Additionally, IT departments should deploy systems management on all devices so regular OS updates, including security patches, can be installed automatically on smartphones, tablets and laptops to eliminate the possibility of exploiting security flaws in earlier versions.
Best Practice No. 3: Encrypt Data on Devices
The addition of encryption to mobile devices is a highly effective way to protect data from loss and theft. Organisations can set and centrally administer encryption policies based on users, groups and data sensitivity. By encrypting and decrypting files residing on Windows, Android and iOS tablets and smartphones, organisations can dramatically reduce potential security problems across their fleet of devices.
Best Practice No. 4: Use Secure Containers
An ideal way to separate enterprise apps and data from personal ones involves creating a container or walled-off corporate workspace environment on personal devices. Not only does this prevent commingling of personal and corporate applications or data, it helps reduce the threat of corporate information being compromised. By downloading a simple app with the container, employees gain access to the productivity and collaboration tools needed on their preferred devices, which protects their privacy and keeps personal data from being accidentally wiped by IT.
Best Practice No. 5: Implement Identity and Access Management
Identity and Access Management (IAM) solutions elevate security while reducing complexity and alleviating many of the risks typically associated with heterogeneous access needs. A unified approach to accessing corporate data and systems should include an access control policy, separation of duties, and single sign-on. Additionally, a cohesive solution for identity governance and privileged account management that includes mobility and traditional on-premises access can dramatically reduce the likelihood of security issues, even as employees increasingly use personally owned devices. A well-executed IAM strategy also can simplify the arduous task of proving compliance by moving it into the hands of line-of-business managers who know why access should or shouldn’t be granted.
Overcoming Mobility Security Challenges with Dell Mobility Solutions
Dell’s extensive portfolio of mobility solutions includes end-user computing devices, wireless networking, secure mobile and remote access, next-gen firewalls, IAM, enterprise mobility management, and services. Together, mobility solutions from Dell span the device to the data center to drive end-user productivity and improve business processes without sacrificing IT control over risk and complexity.