BYOD 2.0 – A New Era in Mobile Security
Survey says: “This is a really, really, really, really hard problem.” The general consensus is that it is difficult to make progress in mobile security. Security executives are wrestling with the expectations of BYOD 2.0, and aren’t even sure if the industry has passed 1.0.
While newer technologies are available, most security teams are still doing most of the same things and are still looking for viable solutions. Two types of technology that are drawing attention are Exchange ActiveSync for Mobile Devices and Mobile Device Management (MDM). Regardless of the technology selected, security teams are challenged with deploying the services so that data can be analyzed as it leaves.
Security teams are also concerned about:
- The ability to perform forensics on mobile devices and eDiscovery on Evernote.
- User awareness beyond training. What are the best practices for ensuring that users understand and acknowledge what they are doing?
- YOD – How do you control the impact of YOD or “Your Own Device” that is in the home? The use of home computers as “work computers” has the potential to introduce security risks that require the time and attention of security teams to mitigate.
The industry as a whole is looking for a solution to these and other issues surrounding mobile security. |