Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

BLOG: Self-service BYOD is a lot easier than it seems

Steve Patterson | May 29, 2013
With just a few apps, enterprises can give employees the tools to stem the risks of BYOD by separating corporate and personal apps, and choosing just trusted apps for each.

MobileSpaces plans to create use cases for the integration of enterprise directories and authentication. Microsoft Active Directory will likely be first, but it will be determined based on customer commitments to scale the use of Mobile Spaces. Cisco, Juniper and Checkpoint VPN customer use cases will also determine timing of these integrations.

Appthority makes an app that could work very well alongside MobileSpaces. For $2.50 to $4 per user per month, Appthority ranks the risk of mobile apps. The ranking is based on a combination of factors, such as static and dynamic analysis or an assessment of which permissions the app uses.

image alt text

According to Appthority, only 0.27% of mobile apps have malware, but 79%of apps can access corporate data on an unsecured smart mobile device. As an example, Appthority cites Angry Birds, because for some unknown reason it can access the corporate phonebook and calendar and shares unencrypted data with six ad networks. This is a huge problem because corporations are subject to privacy regulations, such as HIPAA and Sarbanes Oxley. And while the percentage of malware is small, it could lead to a data breach.

Appthority's app risk rankings could be used to qualify apps for inclusion in the approved list of apps to be deployed securely using MobileSpaces.

Between MobileSpaces and Appthority, a smart mobile device can be secured for enterprise use, and BYOD could actually be valuable. The only other addition might be to add Lookout's mobile security suite, which scans for malware for $3 per device.

A self-service approach to mobile device security fits because smartphone and tablet users are used to self service. This approach bodes well for reduced user adoption friction and a lesser administration burden on IT.


Previous Page  1  2 

Sign up for Computerworld eNewsletters.