English   Deutsch   Русский   中文    

BYOD puts new pressure on IT pros

There is no way to control the business use of private mobile devices – information security is the only answer

Duesseldorf July 13th, 2011
- The growing trend towards use of privately owned mobile devices such as iPhones, iPads, tablet PCs and laptops for business purposes is causing IT departments to lose control of the security and integrity of their systems. Instead of trying to stop the trend toward BYOD (“Bring Your Own Device”), IT pros should focus on securing the information itself.

In their latest Advisory Report, Martin Kuppinger and Tim Cole of the analyst group KuppingerCole argue that the BYOD trend is unstoppable. For one thing, top management will not allow IT departments to take away their bright new toys like iPhones and iPads, no matter how hotly the IT pros argue that allowing uncontrolled access to sensitive systems and business processes compromises overall IT security.

“People have been using private devices professionally for years, ever since laptops started to replace corporate desktops”, says Martin Kuppinger, co-founder and Lead Analyst at KuppingerCole. As a rule, many enterprises neither sanction such devices, nor do they often even know which ones are currently used. But used they are, for everything from business emails to mobile access to corporate applications, he maintains. The alternative of blocking everything or massively limiting access to remote desktop connections is the IT equivalent of “mission impossible”.

IT should bow to the inevitable and officially allowing their people to carry privately owned devices around, Kuppinger believes. Instead they should focus on protecting sensitive information and making sure it isn't leaked. The main tools for achieving this, he says, involve authentication, encryption, and virtualization.
Context, Kuppinger believes, is king in today's Information Security world, and there are more and more solutions available for controlling and monitoring that context during the process of authentication and authorization.

There is a bright side, too, Kuppinger maintains, since adopting a good BYOD strategy usually frees IT from having to invest in costly stand-alone point solutions for device security that usually turn out to be dead-end streets, anyway.
“Keeping information secure, no matter where or how users choose to gain access, is the true answer to the BYOD dilemma”, he says. 

Media Contact:
Bettina Buthmann
Arnheimer Str. 46
40489 Duesseldorf
Phone: +49 (0)211-237077-23
Fax: +49 (0)211-237077-11
E-Mail: bb@kuppingercole.com

KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Internet of Things
It is its scale and interoperability that fundamentally differentiate the Internet of Things from existing isolated networks of various embedded devices. And this scale is truly massive. Extrapolating the new fashion of making each and every device connected, it is estimated that by 2020, the number of “things” in the world will surpass 200 billion and the IoT market will be worth nearly $9 trillion.
KuppingerCole EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole