CISO Viewpoint: Key advantages of using BYOD Security


Key advantages of using BYOD Security:

■ Extend corporate security policies to mobile devices

  • Device password policy configuration
  • Lock out after failed attempts
  • Disallow previously used passwords

■ Easily disable lost or stolen devices to protect corporate assets

  • Remote Locking
  • Remote Profile remove
  • Remote Wipe out

■ On-device encryption

  • Encryption of PIM data and administrator specified files/folders
  • Full disk encryption

■ Block rogue or non compliant devices from accessing corporate email

(Read more:   How Should a CISO choose the right Anti-Malware Technology?)

Organizations in the BFSI, Manufacture and any company selling product and having lot of sales staff on field needs such solution.Some of the top technology trends for the above domain are:

  • BYOD – Bring your own device.
  • Company and Personal Container.
  • Risk Assessment of the entire MDM setup and policy.

Key drivers for adoption:

  • Secure communications for external devices.
  • Scalability, Manageability and Integration with existing system.
  • Optimized navigation
  • Mobile Expense Tracking and Management.
  • Self-service portal – where users themselves can manage basic thing like password change, device wipe out etc.

(Read more:  Under the hood of Top 4 BYOD Security Technologies: Pros & Cons)

Compliance, regulations and standards that make the solution mandatory:

There is no such mandatory regulator in INDIA that drives this solution to implement within India but our site India there are. Standard are there and well define to implement this product which include the best Practice of company that deploy BYOD and the product company that implement the Mobile Device Management solution. Essential part is to do Third party Risk Assessment of the solution after 100% implementation  and before going Live.

-by Paresh Makwana, VP - Information Security Officer, DSP BLACKROCK INVESTMENT MANAGERS PVT LTD

More:  Want to share your insights? Click here to write an article at CISO Platform

Views: 238

Join the Discussion ...

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service