MEETING THE CHALLENGE OF PROVIDING SECURE CONTENT ACCESS, SYNC AND SHARE
MEETING THE CHALLENGE OF PROVIDING SECURE CONTENT ACCESS, SYNC AND SHARE
Published by Gbaf News
Posted on October 29, 2014

Published by Gbaf News
Posted on October 29, 2014

By Anders Lofgren, VP of Product Management, Acronis Access
The advent of mobility is radically affecting the way organisations conduct business. Financial services, healthcare organisations, pharmaceutical companies, education institutions, publishing houses, government agencies and others, are all embracing enterprise mobility.
But many mobile devices are employee-owned and the trend will only increase with market research company Gartner predicting as many as 50% of employers will require workers to use their own devices for work by 2017. This is bound to present difficulties as demand grows from users and organisations to exploit the increased power of their smartphones and tablets to access and interact with content.
The possibility of secure BYOD
But while mobility can bring tremendous benefits, it also presents significant challenges for any IT department. Security should remain a top priority especially within financial organisations were consumers data can be at risk. An appropriate strategy that enables access, syncing and sharing of content in a secure and safe fashion will minimise the threat of data leakage.

Meeting The Challenge Of Providing Secure Content Access, Sync And Share
BYOD is continuing to rise and many financial services have turned towards this new trend in attempts to boost productivity. The use of these mobile devices has become more widespread and there’s no denying the arrival of these devices and the development of a wide variety of corresponding productivity applications could provide substantial to both financial and enterprise organisations.
However as with most technological advancements, once the use of personal devices within workplaces achieves a critical mass, it will be harder for employers to impose their desired level of control upon BYOD without being swept aside. Far better that they take steps now to ensure they have the security, access and management policies and strategies in place to accommodate BYOD when it becomes established and adopted into the mainstream.
Some questions for the IT department
Giving employees what they want
Enterprise IT has to maintain control over security and compliance but it also has to serve employees seeking to access, sync and share corporate content across any and all of their devices. They want:
To securely access, edit and create content – residing on file servers, NAS or SharePoint – on their mobile devices;
Anytime, anywhere access to their individual content regardless of the device – phone, tablet, desktop/laptop – they choose to use;
To share business content securely with colleagues, customers, partners and other external constituents.
What the IT department needs to give employees what they want
To manage this new environment and maintain control, security and visibility, the IT department needs to set policies, properties, and permissions for individuals, groups and entire organisations. The organisation should also define what resources can be accessed, “who can do what with whom” securely based on their business needs, and ensure it has everything on record for auditing purposes.
To guarantee more effective corporate control, the IT department should look for:
Granular management capabilities to create policies at the user, group, security and device level;
A solution that can be deployed completely on-premise, giving IT total control over security and management, visibility, environment and storage:
The future of BYOD
Emerging access, sync and share solutions are available that can give organisations the peace of mind to enable BYOD securely and safely for their employees while reassuring customers they will not cause security breaches by using personal mobile devices in their working environment. Organisations and users can rest assured that, just like the smartphones and tablets they increasingly rely on, secure BYOD is within their grasp.