English   Deutsch

BYOD puts new pressure on IT pros

There is no way to control the business use of private mobile devices – information security is the only answer

Duesseldorf July 13th, 2011
- The growing trend towards use of privately owned mobile devices such as iPhones, iPads, tablet PCs and laptops for business purposes is causing IT departments to lose control of the security and integrity of their systems. Instead of trying to stop the trend toward BYOD (“Bring Your Own Device”), IT pros should focus on securing the information itself.

In their latest Advisory Report, Martin Kuppinger and Tim Cole of the analyst group KuppingerCole argue that the BYOD trend is unstoppable. For one thing, top management will not allow IT departments to take away their bright new toys like iPhones and iPads, no matter how hotly the IT pros argue that allowing uncontrolled access to sensitive systems and business processes compromises overall IT security.

“People have been using private devices professionally for years, ever since laptops started to replace corporate desktops”, says Martin Kuppinger, co-founder and Lead Analyst at KuppingerCole. As a rule, many enterprises neither sanction such devices, nor do they often even know which ones are currently used. But used they are, for everything from business emails to mobile access to corporate applications, he maintains. The alternative of blocking everything or massively limiting access to remote desktop connections is the IT equivalent of “mission impossible”.

IT should bow to the inevitable and officially allowing their people to carry privately owned devices around, Kuppinger believes. Instead they should focus on protecting sensitive information and making sure it isn't leaked. The main tools for achieving this, he says, involve authentication, encryption, and virtualization.
Context, Kuppinger believes, is king in today's Information Security world, and there are more and more solutions available for controlling and monitoring that context during the process of authentication and authorization.

There is a bright side, too, Kuppinger maintains, since adopting a good BYOD strategy usually frees IT from having to invest in costly stand-alone point solutions for device security that usually turn out to be dead-end streets, anyway.
“Keeping information secure, no matter where or how users choose to gain access, is the true answer to the BYOD dilemma”, he says. 

Media Contact:
Bettina Buthmann
Arnheimer Str. 46
40489 Duesseldorf
Phone: +49 (0)211-237077-23
Fax: +49 (0)211-237077-11
E-Mail: bb@kuppingercole.com

KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
KuppingerCole Analyst Services
In the networked economy of the 21st century, digital identities play a key role in establishing trust, achieving security, lowering costs and making business processes more efficient. Things like Identity and Access Management (IAM) or...
KuppingerCole Vendor Services
The market for Identity and Access Management (IAM), governance, risk management, and compliance (GRC) and cloud computing is expanding by leaps and bounds. In fact, no other segment of the IT market can boast such dynamic growth rates. At the...
KuppingerCole Briefings
KuppingerCole welcomes the opportunity to hear from IT companies when they launch a new product or service or have other interesting progress to announce. Please fill in the request form , and we will contact you shortly. 
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole