Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

OPINION: BYOD - the new era of mobility

Ganapathy Sirgunavel | March 30, 2012
How do you make Bring Your Own Device work for your enterprise?

Identity management

In order to address the inherent security risks of BYOD, it is also recommended that critical data assets are protected with Identity Management solutions to help overcome the challenge of securing multiple types of devices and applications on the corporate Intranet and beyond. This will help to protect the Web services and applications that these employee-owned devices are accessing while providing centralised control at the application layer, rather than just depending on perimeter security.

A complete end-to-end security solution will provide components that protect applications, data, documents, and cloud-based services on multiple devices through an innovative combination of flexible authentication and single sign-on, identity federation, risk-based authentication, proactive enterprise fraud prevention, information rights management, and fine-grained authorisation.

Device fingerprinting and other related capabilities are suitable for reducing some of the exposure here as well.

Conclusion

The increasing popularity of mobile devices has transformed the way many enterprise users deploy technology, with a growing number of employees now bringing their own devices to work with them. Regardless of your current approach, the reality is that consumerisation of IT is here to stay and will have a massive impact on the management of corporate mobility for years to come. The enterprise, meanwhile, must concentrate on ensuring that quality data is securely and efficiently available to these devices whenever individuals want and wherever they want.

 Ganapathy Sirgunavel is senior director, applications, Oracle.

 

 

Previous Page  1  2  3 

Sign up for Computerworld eNewsletters.