English   Deutsch   Русский   中文    

BYOD puts new pressure on IT pros

There is no way to control the business use of private mobile devices – information security is the only answer

Duesseldorf July 13th, 2011
- The growing trend towards use of privately owned mobile devices such as iPhones, iPads, tablet PCs and laptops for business purposes is causing IT departments to lose control of the security and integrity of their systems. Instead of trying to stop the trend toward BYOD (“Bring Your Own Device”), IT pros should focus on securing the information itself.

In their latest Advisory Report, Martin Kuppinger and Tim Cole of the analyst group KuppingerCole argue that the BYOD trend is unstoppable. For one thing, top management will not allow IT departments to take away their bright new toys like iPhones and iPads, no matter how hotly the IT pros argue that allowing uncontrolled access to sensitive systems and business processes compromises overall IT security.

“People have been using private devices professionally for years, ever since laptops started to replace corporate desktops”, says Martin Kuppinger, co-founder and Lead Analyst at KuppingerCole. As a rule, many enterprises neither sanction such devices, nor do they often even know which ones are currently used. But used they are, for everything from business emails to mobile access to corporate applications, he maintains. The alternative of blocking everything or massively limiting access to remote desktop connections is the IT equivalent of “mission impossible”.

IT should bow to the inevitable and officially allowing their people to carry privately owned devices around, Kuppinger believes. Instead they should focus on protecting sensitive information and making sure it isn't leaked. The main tools for achieving this, he says, involve authentication, encryption, and virtualization.
Context, Kuppinger believes, is king in today's Information Security world, and there are more and more solutions available for controlling and monitoring that context during the process of authentication and authorization.

There is a bright side, too, Kuppinger maintains, since adopting a good BYOD strategy usually frees IT from having to invest in costly stand-alone point solutions for device security that usually turn out to be dead-end streets, anyway.
“Keeping information secure, no matter where or how users choose to gain access, is the true answer to the BYOD dilemma”, he says. 

Media Contact:
Bettina Buthmann
Arnheimer Str. 46
40489 Duesseldorf
Phone: +49 (0)211-237077-23
Fax: +49 (0)211-237077-11
E-Mail: bb@kuppingercole.com

KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
RTSI asnd Future SOC
Statistics show that most data breaches are detected by agents outside of the organization rather than internal security tools. Real Time Security Intelligence (RTSI) seeks to remedy this.
KuppingerCole CLASS
Trusted Independent Advice in CLoud ASSurance including a detailed analysis of the Cloud Assurance management tasks in your company.
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole