Virtual Mobile Infrastructure: A Better Solution for the BYOD Problem

Loading...

Business

4

For Home









Products & Solutions IoT Security Intelligence Support Partners About Contact

Virtual Mobile Infrastructure: A Better Solution for the BYOD Problem

March 02, 2015

Having their own devices used to their liking gives employees a semblance of freedom within the corporate environment. Their respective organizations, on the other hand, get to reap the fruits of having mobile employees with fewer hardware investments. While both parties enjoy the benefits of resources and costcutting, company data residing in employee-owned devices is still at risk if not handled properly.







Infosec Guide: Dealing with Threats to a Bring Your Own Device (BYOD) Environment National Cyber Security Awareness Month: Security Tips for Enterprises and Employees The Case for Making BYOD Safe

With employee-owned devices at work, the chances of confidential company data mixing with personal employee information are high, and the instances of data leakage and loss are even higher. According to our findings, two in five large data breaches were caused by lost or stolen devices, and nearly half of the companies that permitted BYOD were breached through employee-owned devices. Typical mobile security solutions are not enough to mitigate these kinds of risks. IT administrators need to rethink security in terms of protecting not only the devices but the data stored on them as well.

Implementing BYOD: How Lost or Stolen Devices Endanger Companies Embracing BYOD Safely and Securely

Aside from mobile antivirus solutions, enterprises have also looked into other solutions to safeguard corporate data on employee devices. But are they enough?

Curbing the BEC Problem Using AI and Machine Learning

Mobile Device Management (MDM)

Securing Data Through GDPR’s Privacy by Design Serverless Applications: What They Mean in DevOps

Although MDM solutions allow IT administrators to manage, secure, and monitor employee-owned devices, it still brings certain issues to the fore.

Naming the Unknown: Labeling Unknown Files Through Machine Learning

First of all, it can come across as invasive. Employees are typically turned off by the prospect of their company setting policies on the use of their devices, and knowing that IT has control over their personal phones or tablets does not help alleviate their worries. Second, MDM can only do so much to protect corporate data stored on employee devices. Though administrators can remotely wipe data from lost or stolen employee devices, they also risk erasing their employee’s personal data.



ICANN’s WhoIs a GDPR Compliance Challenge

It should be noted that MDM is not a standalone solution. This means that enterprises will have to invest in other mobile security and management offerings to holistically protect employee devices, as well as corporate data. Secure Containers and App Wrapping The use of secure containers or containerization is a bit more flexible. It gives employees the breathing room they need away from IT. It also helps employees separate personal applications from corporate ones. This allows them to manage a cordoned-off section of the device with the corporate apps stored in it. The problem with secure containers, though, is the same with MDM. Once a device is compromised or goes missing, company data is still at risk. Containerization also requires some form re-engineering for third-party apps. App wrapping is a bit similar. It allows IT administrators to create a layer of protection over a specific app or group of apps by creating policies that apply to them. Administrators, for example, can demand authentication requirements before certain apps can be accessed. While this protection layer is good, it still requires proprietary patching of app binary that affects licensing and updating of the said apps. Device Virtualization Similar to desktop virtualization, device virtualization makes use of a hypervisor to let mobile users simultaneously run different mobile operating systems on a single device. This allows for the clear separation of corporate data from personal data. However, the issue remains the same: corporate data is still stored on the device. In addition, virtualization also eats up a lot of a smartphone or tablet’s computing resources. For an employee with a lot of personal data and computing requirements, this will be an issue. Virtual Desktop Infrastructure (VDI) VDI, perhaps, seems like the best option for mobile data protection. Given how VDI works, data is never stored on employee devices; they’re stored in company servers. This ensures that despite device loss or compromise, enterprise data remains intact. Unfortunately for employees, VDI is rigid in two aspects. First, it lacks support for other third-party apps since it only supports those that run on Windows, and second, it also is not optimized for mobile devices. This means that employees will have to endure working on a desktop environment on a small mobile screen. Virtual Mobile Infrastructure (VMI) VMI, like Trend Micro™ Safe Mobile Workforce™, offers secure access to corporate data and applications without requiring a great deal of infrastructure or complexity. It provides all the benefits of a VDI but is specifically designed with mobile users in mind. Much like VDI, corporate data never gets stored on employee devices. Each employee gets assigned a profile that is centrally managed and stored on secure company servers. Employees only need to install a secure app on their device, log in, and access all their company files and data without fear of mixing personal and company data or IT controlling their gadgets. VMI also saves time, effort, and resources. Through a central management system, IT administrators can modify profiles, check for security, and pushes updates to employees’ VMIs through a single console.

This setup is also advantageous for app developers. Much of app development time and resources go into security considerations. Are apps secure enough? Ensuring an app's security during its development takes up time and effort that could have been spent focusing on app functionality. VMI eliminates this concern. Since apps are placed in a secure mobile platform, they only need to concentrate on developing a functional app for one platform. The BYOD problem is a tricky challenge to overcome, but with the right consumerization strategy and combination of solutions, enterprises can reap the benefits of a happy and secure mobile workforce without compromising any of their critical data. Posted in Mobile Safety, BYOD, Safe Mobile Workforce

2017 ANNUAL SECURITY ROUNDUP

Vulnerabilities & Exploits

Business Email Compromise

Mobile

Securing Home Routers

Several Zero Day Vulnerabilities Found in ManageEngine Products

Curbing the BEC Problem Using AI and Machine Learning

A Historical Overview of Proactive Incident Response Strategies and What They Mean to Enterprises

A Look Into the Most Noteworthy Home Network Security Threats of 2017

AMD to Roll out Patches for 13 Vulnerabilities Found in its Processors

The Paradox of Cyberthreats

Mobile Adware RottenSys Can Infect Android Devices to Become Part of a Botnet

Compromising Industrial Robots: The Fallacy of Industrial Routers in the Industry 4.0 Ecosystem [blog]

Trend Micro Cloud App Security 2017 Report: Boosting the Security of Office 365 by Blocking 3.4 Million High-Risk Threats

RedisWannaMine Cryptocurrency-Mining Operation Found Targeting Servers with EternalBlue

2017 Mobile Threat Landscape

In our annual security report we examine the major cybersecurity events of the past year and analyze the overarching trends of 2017. View the 2017 Annual Security Roundup

2018 SECURITY PREDICTIONS

Securing Your Routers Against Mirai and Other Home Network Attacks



Contact Sales

Privacy

Locations

Support

Careers

Sitemap

Today's increasingly interconnected environments pave the way for threats that will bank on systems' weaknesses for different forms of cybercrime. How can you prepare for the year ahead? View the 2018 Security Predictions

Newsroom









Copyright © 2018 Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their respective owners.

Loading...

Virtual Mobile Infrastructure: A Better Solution for the BYOD Problem

Business 4 For Home Products & Solutions IoT Security Intelligence Support Partners About Contact Virtual Mobile Infrastructure: A ...

2MB Sizes 2 Downloads 7 Views

Recommend Documents

Problem 8.4 Solution: Problem 8.12 Solution: Problem 8.19
25 s−1 ·. √12 cfs. (32.2 ft/s2. ·25 ft). 3. 4. = 0.57. Then from Fig. 8-15, ns < 0.60 so use mixed flow pump. Prob

Mobile mapping for the rapid field assessment of health infrastructure
private hospitals, 298 clinics (puskesmas), and more than 11,000 other local health facilities (pustu, polindes, poskesd

A Better Alternative: An Amino Acid Solution for Renal Protection
May 1, 2016 - Based on the amounts of amino acids weighed, the volumes of the normal saline: water solution and 1N HCl,

Chapter 13 Bankruptcy - A Better Solution?
Chapter 13 bankruptcy involves a repayment plan that lasts for (depending on your financial situation) three or five yea

Virtual Receptionist: A Professional Small Business Solution
The number of small businesses in the U.S. has increased 49 percent since 1982 according to the Small Business Administr

Virtual Reality Triage Training Provides a Viable Solution for Disaster
Jul 29, 2010 - Disasters are inevitable, and when they occur, emergency medicine (EM) personnel must be able to respond

Virtual Router for a Robust Wireless Multihop Highly Mobile
The invention represents a method for forming and maintaining wireless communication routes between a source node and a

What's a Solution Set? | Virtual Nerd
When an equation has two variables, the set of ordered pairs that are the solution to the equation are called the soluti

resources: Problem: Our Solution
What are the most important costs inherent in our business model? Which Key ... For what value are our customers really

NUMERICAL SOLUTION FOR BOUNDARY VALUE PROBLEM USING
In this paper, Numerical Methods for solving ordinary differential equations, beginning with basic techniques of finite