BYOD 2.0 – A New Era in Mobile Security
Anyone who has worked in security over the last couple of years knows that the BYOD conversation is unavoidable. A quick survey of roundtable participants shows that 100% of the organizations at the table allow some form of BYOD. One-half have deployed basic BYOD controls for asset management, configuration management and policy management. One-fifth employed an enhanced version of MDM that combines white listing with network segregation and a company app store. One-tenth deployed advance controls such as containerization sandbox technology and one-tenth had no controls in place.
Overwhelmingly, security professionals are less than happy with their state of BYOD security. The general consensus is that no security solution exists that would please everyone because every solution has some type of compromise, such as a poor user experience and difficult manageability.
Recognizing the drawbacks of trying to secure the device, security professionals are looking to secure the application and the data. It is believed that securing the device is lost cause because there is too much variety and the pace at which new devices are introduced is too rapid. Because the application will remain the same across Android and iOS operating systems, security professionals believe that this is the more viable route.
The jury is still out on BYOD cost savings. While cost savings has been a driving factor behind many companies moving to BYOD, no dramatic cost savings have emerged. Security professionals are seeing the expenditure shift from one pocket to the next. For example, instead of one department spending $200 for a phone, the IT department is spending money for a mobile device management solution. Companies are, however, seeing incidental cost savings, especially related to the help desk and less spend on laptops.
For some, BYOD is the here and now. Others, however, see BYOD as a pathway to the Post-PC Era where people will be using alternative technologies rather than relying on Windows and laptops as we do today. |