Advertorial: TechWeekEurope is launching a new article series: Ask The Experts. In this series, engineers and developers answer questions asked by members of the TechClub, a free community for our readers.
For the first edition, we invited IBM staff to tell us about the challenges of managing mobile devices in business – and in particular, mobile security.
Vendors offer a confusing variety of options for securing mobile data, including remote wipe, lock, and encryption. How do we choose or combine these approaches for best effect?
(Security manager in a financial company)
There is no right or wrong answer here.It depends on the use cases within an organisation, its attitudes to risk and its legal and regulatory responsibilities. In Financial Services there are strict legal obligations around data protection and as a result this industry has a low tolerance to risk, and this will drive the decision making process. As a starting point I would suggest any organisation asks the following questions when designing a mobile security strategy:
Alongside these considerations one must pay careful attention to usability; the benchmark has been set high by the best of the consumer devices and apps on the market today and as a result tolerance for poor design, complex interactions, and overly restrictive management/security is low. Whilst employees may have to use the device and apps as part of their role they will work harder to find ways around restrictions. Organisations will not see the expected productivity improvements if usability is ignored.
So focus on what is actually required to protect your organisation’s data and systems and meet imposed obligations and select an approach that satisfies these whilst also delivering on usability. Look carefully at the app-based approach to security alongside traditional device management, and consider a layered approach. Above all though, remember that this is an area where it’s about new working practices as well as technology so involve end users, educate them on their responsibilities and on the restrictions and ‘sanctions’retained by the organisation and perhaps engage with a supplier/partner who has done this before. I know IBM would be pleased to help…
Answer provided by Simon Gale, CTO workplace services UKI IBM. Look out for the second part of our advertorial series ‘Ask the Experts’ next Monday!
What do you know about enterprise mobility? Visit the IBM MobileFirst resource page!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…