A brief on what BYOD is all about


A brief on what BYOD is all about: 

For all multi national companies, improving productivity and employee work life balance is a choice between - either spend  a lot of money , provide them mobility or implement secure IT practices and adopt the BYOD policy. So, understanding the end point threats from various edge devices and preventing man in the middle attacks, phishing, device take over, data loss due to missing personal devices; enabling IP protection etc becomes paramount. It is not uncommon for many employees to use BOX, Google Docs, DROPBOX etc., to store company presentations, spread sheets, critical documents for their own ready reference when they need outside of their corporate network and this can be mitigated with enterprise cloud storage solutions that are integrated with single sing-on methodology. This would work both in side and outside the corporate  network and when employee leaves the company, it also enables to securely remove the data access to the ex-employee using proper identity management solutions. 

(Read more:  BYOD Security: From Defining the Requirements to Choosing a Vendor)

While doing so, it is paramount to understand the cloud solution vulnerabilities and its own end point threats. Implementing a security policy to manage these BYOD + Cloud Storage plus edge devices network access coupled with secure access policies is what constitutes our solution.

Any organization that needs to provide remote , always available secure work place environment to its employees and at the same time, wants to protect their IP and credibility needs to have this solution implemented.

Key Drivers for adoption are Ease of use, IT control and ability to integrate the solution into existing web of IT infrastructure are the key drivers. Total cost of ownership is also an important key factor. 

Compliance, regulations and standards that make the solution mandatory:

Many EU and North American compliance laws require the presence of this solution in one from or other.

-by Dr. Murali Krishna Nandigama, Director, Site Lead Engineering Environments, PayPal an eBay Inc company

(More:  Want to be an author? Nominations open for co-authors of CISO Handbook)    

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)