Key advantages of using BYOD Security:

■ Extend corporate security policies to mobile devices

  • Device password policy configuration
  • Lock out after failed attempts
  • Disallow previously used passwords

■ Easily disable lost or stolen devices to protect corporate assets

  • Remote Locking
  • Remote Profile remove
  • Remote Wipe out

■ On-device encryption

  • Encryption of PIM data and administrator specified files/folders
  • Full disk encryption

■ Block rogue or non compliant devices from accessing corporate email

(Read more:   How Should a CISO choose the right Anti-Malware Technology?)

Organizations in the BFSI, Manufacture and any company selling product and having lot of sales staff on field needs such solution.Some of the top technology trends for the above domain are:

  • BYOD – Bring your own device.
  • Company and Personal Container.
  • Risk Assessment of the entire MDM setup and policy.

Key drivers for adoption:

  • Secure communications for external devices.
  • Scalability, Manageability and Integration with existing system.
  • Optimized navigation
  • Mobile Expense Tracking and Management.
  • Self-service portal – where users themselves can manage basic thing like password change, device wipe out etc.

(Read more:  Under the hood of Top 4 BYOD Security Technologies: Pros & Cons)

Compliance, regulations and standards that make the solution mandatory:

There is no such mandatory regulator in INDIA that drives this solution to implement within India but our site India there are. Standard are there and well define to implement this product which include the best Practice of company that deploy BYOD and the product company that implement the Mobile Device Management solution. Essential part is to do Third party Risk Assessment of the solution after 100% implementation  and before going Live.

-by Paresh Makwana, VP - Information Security Officer, DSP BLACKROCK INVESTMENT MANAGERS PVT LTD

More:  Want to share your insights? Click here to write an article at CISO Platform

Votes: 0
E-mail me when people leave their comments –

Priyanka, Co-Founder and Editor, CISO Platform Breach Intelligence, leads our threat intelligence and incident analysis efforts, providing actionable insights to the global cybersecurity community. With extensive experience in cybersecurity leadership and breach analysis, she specializes in translating complex technical threats into strategic intelligence for security executives.

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership