There’s a new normal now in play for for enterprise mobility, and it’s called bring-your-own-device. Many companies today have given into the demands of employees to allow them to utilize personally owned smartphones and tablets at work, forcing IT departments to adapt or suffer the consequences.
According to a recent InfoWorld report, that was among the main topics of discussion at the recent AppNation conference in San Francisco. Many experts touched on the fact companies now need new approaches to data security and management in order to keep up with BYOD demands.
“Accept that BYOD is happening and build a plan around it – how to manage it, how to secure it, how to get apps to devices,” Maribel Lopez, president of Lopez Research, said at the conference, according to InfoWorld.
Early last year, Andrew Borg, a mobile security analyst with the Aberdeen Group, announced that 75 percent of organizations had policies in place that support BYOD. Of those, 46 percent said they allowed employees to use any device for work purposes, while 26 percent said they had a list of approved smartphones and tablets that could be brought from home.
Compounding the difficulties for companies is the fact that consumerization is moving beyond devices. These days, according to InfoWorld, mobile employees are also taking it upon themselves to download which apps they see fit and use them to access enterprise data and networks.
If they don’t change their approach, this trend may present myriad cost and security implications for companies.
“IT is struggling with how to address this, how to look at this, and what they should do to respond because they can’t simply say yes to everything,” Ken Singer, CEO of mobile device management provider AppCentral, said, according to InfoWorld. “They can’t manage it all.”
Taking a focused, data-centric approach to information security is one new method that companies can now leverage to deal with the spread of employee-owned devices. In October, experts from Trend Micro announced that such practices are now more important than ever in the post-PC era.
By taking data more into account for security, companies will have more visibility over who accesses it, why they are doing so and whether or not anything suspicious has taken place. Furthermore, a data-centric approach ensures that security protections remain with the information regardless of where it travels, inside or outside the enterprise network.
http://www.simplysecurity.com/category/spotlight/it_consumerization/Consumerization News from SimplySecurity.com by Trend Micro