Products & Solutions IoT Security Intelligence Support Partners About Contact
Virtual Mobile Infrastructure: A Better Solution for the BYOD Problem
March 02, 2015
Having their own devices used to their liking gives employees a semblance of freedom within the corporate environment. Their respective organizations, on the other hand, get to reap the fruits of having mobile employees with fewer hardware investments. While both parties enjoy the benefits of resources and costcutting, company data residing in employee-owned devices is still at risk if not handled properly.
Infosec Guide: Dealing with Threats to a Bring Your Own Device (BYOD) Environment National Cyber Security Awareness Month: Security Tips for Enterprises and Employees The Case for Making BYOD Safe
With employee-owned devices at work, the chances of confidential company data mixing with personal employee information are high, and the instances of data leakage and loss are even higher. According to our findings, two in five large data breaches were caused by lost or stolen devices, and nearly half of the companies that permitted BYOD were breached through employee-owned devices. Typical mobile security solutions are not enough to mitigate these kinds of risks. IT administrators need to rethink security in terms of protecting not only the devices but the data stored on them as well.
Implementing BYOD: How Lost or Stolen Devices Endanger Companies Embracing BYOD Safely and Securely
Aside from mobile antivirus solutions, enterprises have also looked into other solutions to safeguard corporate data on employee devices. But are they enough?
Curbing the BEC Problem Using AI and Machine Learning
Mobile Device Management (MDM)
Securing Data Through GDPR’s Privacy by Design Serverless Applications: What They Mean in DevOps
Although MDM solutions allow IT administrators to manage, secure, and monitor employee-owned devices, it still brings certain issues to the fore.
Naming the Unknown: Labeling Unknown Files Through Machine Learning
First of all, it can come across as invasive. Employees are typically turned off by the prospect of their company setting policies on the use of their devices, and knowing that IT has control over their personal phones or tablets does not help alleviate their worries. Second, MDM can only do so much to protect corporate data stored on employee devices. Though administrators can remotely wipe data from lost or stolen employee devices, they also risk erasing their employee’s personal data.
ICANN’s WhoIs a GDPR Compliance Challenge
It should be noted that MDM is not a standalone solution. This means that enterprises will have to invest in other mobile security and management offerings to holistically protect employee devices, as well as corporate data. Secure Containers and App Wrapping The use of secure containers or containerization is a bit more flexible. It gives employees the breathing room they need away from IT. It also helps employees separate personal applications from corporate ones. This allows them to manage a cordoned-off section of the device with the corporate apps stored in it. The problem with secure containers, though, is the same with MDM. Once a device is compromised or goes missing, company data is still at risk. Containerization also requires some form re-engineering for third-party apps. App wrapping is a bit similar. It allows IT administrators to create a layer of protection over a specific app or group of apps by creating policies that apply to them. Administrators, for example, can demand authentication requirements before certain apps can be accessed. While this protection layer is good, it still requires proprietary patching of app binary that affects licensing and updating of the said apps. Device Virtualization Similar to desktop virtualization, device virtualization makes use of a hypervisor to let mobile users simultaneously run different mobile operating systems on a single device. This allows for the clear separation of corporate data from personal data. However, the issue remains the same: corporate data is still stored on the device. In addition, virtualization also eats up a lot of a smartphone or tablet’s computing resources. For an employee with a lot of personal data and computing requirements, this will be an issue. Virtual Desktop Infrastructure (VDI) VDI, perhaps, seems like the best option for mobile data protection. Given how VDI works, data is never stored on employee devices; they’re stored in company servers. This ensures that despite device loss or compromise, enterprise data remains intact. Unfortunately for employees, VDI is rigid in two aspects. First, it lacks support for other third-party apps since it only supports those that run on Windows, and second, it also is not optimized for mobile devices. This means that employees will have to endure working on a desktop environment on a small mobile screen. Virtual Mobile Infrastructure (VMI) VMI, like Trend Micro™ Safe Mobile Workforce™, offers secure access to corporate data and applications without requiring a great deal of infrastructure or complexity. It provides all the benefits of a VDI but is specifically designed with mobile users in mind. Much like VDI, corporate data never gets stored on employee devices. Each employee gets assigned a profile that is centrally managed and stored on secure company servers. Employees only need to install a secure app on their device, log in, and access all their company files and data without fear of mixing personal and company data or IT controlling their gadgets. VMI also saves time, effort, and resources. Through a central management system, IT administrators can modify profiles, check for security, and pushes updates to employees’ VMIs through a single console.
This setup is also advantageous for app developers. Much of app development time and resources go into security considerations. Are apps secure enough? Ensuring an app's security during its development takes up time and effort that could have been spent focusing on app functionality. VMI eliminates this concern. Since apps are placed in a secure mobile platform, they only need to concentrate on developing a functional app for one platform. The BYOD problem is a tricky challenge to overcome, but with the right consumerization strategy and combination of solutions, enterprises can reap the benefits of a happy and secure mobile workforce without compromising any of their critical data. Posted in Mobile Safety, BYOD, Safe Mobile Workforce
2017 ANNUAL SECURITY ROUNDUP
Vulnerabilities & Exploits
Business Email Compromise
Securing Home Routers
Several Zero Day Vulnerabilities Found in ManageEngine Products
Curbing the BEC Problem Using AI and Machine Learning
A Historical Overview of Proactive Incident Response Strategies and What They Mean to Enterprises
A Look Into the Most Noteworthy Home Network Security Threats of 2017
AMD to Roll out Patches for 13 Vulnerabilities Found in its Processors
The Paradox of Cyberthreats
Mobile Adware RottenSys Can Infect Android Devices to Become Part of a Botnet
Compromising Industrial Robots: The Fallacy of Industrial Routers in the Industry 4.0 Ecosystem [blog]
Trend Micro Cloud App Security 2017 Report: Boosting the Security of Office 365 by Blocking 3.4 Million High-Risk Threats
RedisWannaMine Cryptocurrency-Mining Operation Found Targeting Servers with EternalBlue
2017 Mobile Threat Landscape
In our annual security report we examine the major cybersecurity events of the past year and analyze the overarching trends of 2017. View the 2017 Annual Security Roundup
2018 SECURITY PREDICTIONS
Securing Your Routers Against Mirai and Other Home Network Attacks
Today's increasingly interconnected environments pave the way for threats that will bank on systems' weaknesses for different forms of cybercrime. How can you prepare for the year ahead? View the 2018 Security Predictions
Copyright © 2018 Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their respective owners.