Advertisment

Dell provides best practices for implementing mobile security

author-image
Sanghamitra Kar
New Update

TEXAS, USA: Dell helps organizations embrace mobility and BYOD strategies that strike an optimal balance between giving employees anytime, anywhere access to data while empowering IT to adhere to rules governing security and compliance.

Advertisment

According to a recent Dell Global Security Survey, IT decision makers highlighted BYOD as a root cause of security breaches. In fact, 57 percent of those polled ranked increased use of mobile devices as a top security concern in the next five years (71 percent in the U.K.).

Employee resistance to corporate security policies is part of the problem as people find workarounds to circumvent corporate security policies that are restrictive or could encroach on their personal data.

Enabling access to an ever-increasing array of device types and operating systems  also can introduce new security risks.

Advertisment

Dell offers five practices for implementing mobile security that addresses user work preferences, device types, operating systems and enablement strategies:

  • Practice No. 1: Build a Network Infrastructure Optimized for BYOD/Mobility

Creating a distinct BYOD network enables organizations to take into account the increased use of bandwidth-intensive tasks, such as video streaming, on mobile devices while ensuring that all personal devices and mobile apps are validated before allowing them to connect to the network in accordance with corporate security policies.

Advertisment

In particular, organizations can create a master security policy that allows access to corporate information and parts of the main network from mobile devices while helping to ensure that no information leaks out through personal devices. Additionally, personal devices can be validated before connecting to the network so that they meet corporate security policies.

  • Practice No. 2: Create a Mobile User/Remote Access Policy

Setting up secure mobile access is essential to safeguarding corporate information from being exposed to mobile threats. First, companies should insist that employees use a PIN or strong password to access a device's operating environment or apps as a first line of defense against data theft if a device is lost or stolen.

Advertisment

Second, companies should seek secure mobile access solutions that use context-aware authentication, network access controls and a virtual private network to allow only authorized users and mobile apps, along with validated devices, to access corporate resources.

A secure mobile access solution with these capabilities can reduce the risk of compromised devices or mobile apps that could act as a conduit for malware to infect corporate resources as well as prevent in-flight data theft.

Equally important is educating employees so they'll avoid some of the basic behaviors that could introduce malware or expose corporate information to undue risk. For example, employees should be instructed to avoid WiFi hotspots for work without a VPN connection.

Advertisment
  • Practice No. 3: Encrypt Data on Devices

The addition of encryption to mobile devices is a highly effective way to protect data from loss and theft. Organizations can set and centrally administer encryption policies based on users, groups and data sensitivity. By encrypting and decrypting files residing on Windows, Android and iOS tablets and smartphones, organizations can reduce potential security problems across their fleet of devices.

  • Practice No. 4: Use Secure Containers
Advertisment

An ideal way to separate enterprise apps and data from personal ones involves creating a container or walled-off corporate workspace environment on personal devices.

Not only does this prevent commingling of personal and corporate applications or data, it helps reduce the threat of corporate information being compromised. By downloading a simple app with the container, employees gain access to the productivity and collaboration tools needed on their preferred devices, which protects their privacy and keeps personal data from being accidentally wiped by IT.

  • Practice No. 5: Implement Identity and Access Management
Advertisment

Identity and Access Management (IAM) solutions elevate security while reducing complexity and alleviating many of the risks typically associated with heterogeneous access needs.

A unified approach to accessing corporate data and systems should include an access control policy, separation of duties, and single sign-on. Additionally, a cohesive solution for identity governance and privileged account management that includes mobility and traditional on-premises access can dramatically reduce the likelihood of security issues, even as employees increasingly use personally owned devices.

A well-executed IAM strategy also can simplify the arduous task of proving compliance by moving it into the hands of line-of-business managers who know why access should or shouldn't be granted.

 

 

tech-news