Enterprise mobility in Asia Pacific: Adaptive Security
Welcome to the fifth part of our journey towards enabling work-life balance through mobility. My name is Dave, and I’m here to help you on this journey. If you’re just joining us, we have previously discussed connectivity and convergence in Asia Pacific, the concepts Bring Your Own Device and Choose Your Own Device, and how Asia Pacific corporate networks are enabling this move towards mobility. Now, we delve into another dimension of our journey: adaptive security.
While it has gone a long way towards enabling the freedom to choose your work settings and increase productivity, enterprise mobility also adds to the burden on today’s IT security professionals. The erosion of the traditional corporate perimeter, with a sudden flood of devices that are no longer directly managed and controlled by the enterprise holding access to corporate resources. With the business drivers loud and clear, technology and security professionals must now consider the security of information and data, as well as compliance, when mobility is brought into the mix.
New data recently released in the Global Threat Intelligence Report that found the end-user has become the primary target for cybercriminals seeking access to corporate data. Modern workers have become increasingly accustomed to having real-time access to corporate data from their mobile devices, and as a result, they can often become the attacker’s primary point of entry into the organisation.
One of the possible reasons for this trend could be the significant gaps we’ve found in the ‘people, processes and policies’ elements of managing technology. Although some organisations have already introduced some form of governance, it’s not enough to adequately protect the organisation from today’s threats. The questions around the support and management of these devices represent an IT headache. Fortunately, there are simple things an organisation can do to alleviate this headache:
Secure mobility must-haves
- Secure remote access
- Data leakage protection
- Remote wipe capability
- Identity and access management
- Policy management
- Compliance reporting
Education is perhaps one of the most vital elements towards achieving secure mobility. Taking the time to educate your users on potential risks pitfalls of this kind of access will go a long way towards circumventing threats. When used in conjunction with the above-mentioned secure mobility must-haves, your organisation can enable work freedom and keep the networks safe from criminals.