By Anders Lofgren, VP of Product Management, Acronis Access
The advent of mobility is radically affecting the way organisations conduct business. Financial services, healthcare organisations, pharmaceutical companies, education institutions, publishing houses, government agencies and others, are all embracing enterprise mobility.
But many mobile devices are employee-owned and the trend will only increase with market research company Gartner predicting as many as 50% of employers will require workers to use their own devices for work by 2017. This is bound to present difficulties as demand grows from users and organisations to exploit the increased power of their smartphones and tablets to access and interact with content.
The possibility of secure BYOD
WANT TO BUILD A FINANCIAL EMPIRE?
Subscribe to the Global Banking & Finance Review Newsletter for FREE Get Access to Exclusive Reports to Save Time & Money
By using this form you agree with the storage and handling of your data by this website. We Will Not Spam, Rent, or Sell Your Information.
But while mobility can bring tremendous benefits, it also presents significant challenges for any IT department. Security should remain a top priority especially within financial organisations were consumers data can be at risk. An appropriate strategy that enables access, syncing and sharing of content in a secure and safe fashion will minimise the threat of data leakage.
BYOD is continuing to rise and many financial services have turned towards this new trend in attempts to boost productivity. The use of these mobile devices has become more widespread and there’s no denying the arrival of these devices and the development of a wide variety of corresponding productivity applications could provide substantial to both financial and enterprise organisations.
However as with most technological advancements, once the use of personal devices within workplaces achieves a critical mass, it will be harder for employers to impose their desired level of control upon BYOD without being swept aside. Far better that they take steps now to ensure they have the security, access and management policies and strategies in place to accommodate BYOD when it becomes established and adopted into the mainstream.
Some questions for the IT department
- How can enterprise IT provide a secure method to enable anytime, anywhere access to content on the organisation’s servers, NAS or SharePoint and the individual’s desktop laptop content across all their devices (laptop, desktop, smartphone, and tablet)?
- How do organisations deliver a secure solution that allows users to share content with internal and external constituents across their desktop, laptop, tablet or smartphone?
- Can the IT department offer a viable alternative to users to access, sync and share their corporate content over insecure and unauthorised cloud services such as Dropbox?
- How do organisations ensure IT has visibility into access, sync and share activities for auditing purposes?
- Is IT deploying a Mobile Device Management (MDM) solution that meets the secure content access needs of enterprises?
Giving employees what they want
Enterprise IT has to maintain control over security and compliance but it also has to serve employees seeking to access, sync and share corporate content across any and all of their devices. They want:
To securely access, edit and create content – residing on file servers, NAS or SharePoint – on their mobile devices;
Anytime, anywhere access to their individual content regardless of the device – phone, tablet, desktop/laptop – they choose to use;
To share business content securely with colleagues, customers, partners and other external constituents.
What the IT department needs to give employees what they want
To manage this new environment and maintain control, security and visibility, the IT department needs to set policies, properties, and permissions for individuals, groups and entire organisations. The organisation should also define what resources can be accessed, “who can do what with whom” securely based on their business needs, and ensure it has everything on record for auditing purposes.
To guarantee more effective corporate control, the IT department should look for:
Granular management capabilities to create policies at the user, group, security and device level;
A solution that can be deployed completely on-premise, giving IT total control over security and management, visibility, environment and storage:
- Integration with Active Directory for seamless authentication, provisioning, user management and resource allocation;
- Enterprise class logging and tracking to give IT the visibility to track all activities, in all details, all the time, what documents are accessed, who are they share with;
- Integration with key Mobile Device Management vendors, such as Absolute, Citrix Worx, Good Technology and MobileIron;
- The ability to securely create and edit Office documents and annotate PDFs within the app itself. Documents should never leave the secure sandbox, eliminating the risk of data leakage;
- Seamless integration with Enterprise level Reverse Proxies, including credential and certificate authentication;
- Maximum data protection and confidentiality via secure end-to-end encryption (over-the-air and on-device).
- The challenges presented by mobility should not be allowed to act as a barrier to the many advantages it delivers. IT can take back control and give employees the access they crave by implementing the appropriate access, sync and share solutions that meet their requirements. Organisations that square the circle of providing greater flexibility for employees through a mobile strategy that also delivers more effective control, security and compliance will be well positioned to realise significant productivity gains.
The future of BYOD
Emerging access, sync and share solutions are available that can give organisations the peace of mind to enable BYOD securely and safely for their employees while reassuring customers they will not cause security breaches by using personal mobile devices in their working environment. Organisations and users can rest assured that, just like the smartphones and tablets they increasingly rely on, secure BYOD is within their grasp.