• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Compliance & Regulations   »   Attention to application security in BYOD boosts productivity, safety

Attention to application security in BYOD boosts productivity, safety

  • Posted on:June 28, 2013
  • Posted in:Compliance & Regulations, Cybercrime, Mobility, Privacy & Policy
  • Posted by:
    Trend Micro
0

The incorporation of mobile applications and adoption of a BYOD (Bring your own Device) policy likely means that organizations will see a notable rise in employee productivity levels.  A report from the Australian Mobile Telecommunications Association found that the productivity benefit of BYOD will actually reach $11.8 million Australian dollars, or just under $11 million U.S. dollars per year, by 2025. The report found that mobile technology is becoming the most important method of interaction between businesses and customers as well, showing its potential as a reliable revenue generator. 

One thing that organizations will need to keep in mind for the future, according to Technology Spectator, is that applications and data will be key to secure moving forward. When employees log onto the business network with a device, such as a smartphone it opens the entire organization up to the a chance of a breach, so IT professional Adrian Noblett wrote on the website that this challenge needs to be taken head-on. While what he calls "BYOD 1.0" was the industry's first attempt at solving problems for these personally owned devices, "BYOD 2.0 can help make the shift into securing these applications instead of keeping focus purely on the device.

"BYOD 2.0 seeks to ensure that the enterprise footprint on a personally owned device is limited to enterprise data and applications and nothing more," he said. "This means that mobile device management is supplanted by mobile application management (MAM), and device-level VPNs are replaced by application-specific VPNs. Employees prefer this approach, because the IT department manages and sees only the enterprise subset of the overall data and applications on the device, leaving the management of the device itself, and of personal data and applications, to the device owner."

IT staff also seem to prefer this approach, as it put more of a focus on apps and data that needs to be secured and managed instead of everything. Application wrapping will also give more flexibility to CIOs and other IT professionals in applying a specific policy to a set of apps instead of regulating everything under one umbrella.

Additional security features can be added to certain apps and data while others may deem that less attention is necessary. This is changing the way BYOD is done across businesses, Noblett said, as combining the functionality with security into a single offering can offer more of a converged way of management instead of having to worry about multiple moving pieces.

Steps to making sure BYOD runs smoothly
Of course, there is more to running a smooth BYOD strategy than simply managing applications. Small Business Trends founder Anita Campbell wrote that there are a few key pieces of information that organizations should keep in mind when looking to form their policy, including:

• Requiring notification from employees who want to use their devices, as there must be a list of or knowledge base of who will be using devices, which they will be using and how they work
• A list of best practices should be adopted to ensure that employees are taking all the proper steps to secure their device and work safely. Issues such as password protection and what to do if a device is stolen can be imperative 
• Policies must be written reasonably and enforced so employees know what is and is not acceptable on the organization's mobile network
• Education can be a key, as this will show workers why certain rules are necessary and may help them avoid a trap when working on their devices

"Bottom line: There is a lot you can do to allow employees the freedom and flexibility to use devices they prefer," Campbell wrote. "You don't have to sacrifice protection of your business assets or create an unwieldy logistical situation in doing it."

Consumerization News from SimplySecurity.com by Trend Micro

Related posts:

  1. Report: ‘BYOD’ is changing workplaces
  2. Holiday season fuels BYOD activity
  3. The Financial Impact of Consumerization – It’s official: BYOD boosts productivity
  4. HR could play leading part in BYOD success

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.