Three steps to ensuring BYOD doesn't lead to BYOT (bring your own threat)

Share this article:
Three steps to ensuring BYOD doesn't lead to BYOT (bring your own threat)
Three steps to ensuring BYOD doesn't lead to BYOT (bring your own threat)

As many organisations rush to adopt technologies that enable their workforce to be more mobile and satiate user demand that IT support mobile devices, security often becomes an afterthought.

In this bring your own device (BYOD) environment, enterprises are struggling to lock down an ever-growing number of endpoints. So how can you give users the flexibility they want while maintaining the utmost security? These are the three basic steps that you need to take into account:

Adopt mobile management solutions that provide tiered functionality Provide yourself with the capability to quickly lock down any and all devices that are assigned to a user. The first level of capability should be immediate blocking of specific devices from corporate data, if they pose a threat.

Additionally, remote wiping capabilities should be a level-one capability for devices that are out-of-policy, non-compliant, include active threats or are lost or stolen.

Emphasise broad platform support and policy configuration Rather than viewing support at a device level (there is no way you can support every gadget out there), focus on supporting far-reaching platforms (i.e. Android encompasses a number of phones and tablets; iOS includes iPod Touch, iPad and iPhone). Also, leverage policy-based functions that allow you to set a precedent for which devices/operating systems are allowed in the network and what they are able to access.

In many instances, these policies can be implemented via technologies you already have in place to manage PCs. This way you don't have to invest in separate consoles, infrastructures and, in some cases, teams.

Adopt mobile management solutions that don't require active alerts by the user community Accept the fact that some users will inappropriately bring new devices into your corporate environment, as well as expose current devices to unsecured networks.

In this case, you will need solutions that employ agentless discovery capabilities. This will enable you to proactively intercept all devices and take defined actions concerning access and control between those devices and the rest of your infrastructure.

Devin Anderson is product line manager for LANDesk security suite

Share this article:
close

Next Article in Security Cats Blog

Sign up to our newsletters