Access your Pro+ Content below.
Mobile security strategy matures with BYOD
This article is part of the Information Security magazine issue of July 2017
As mobility increases workforce productivity, CISOs need to develop a mobile security strategy that strikes a balance between a great user experience and effective information security. The key to scaling the mobile maturity ladder is in how well you know your users and the devices they bring to your organization. Jim Routh, CSO at Aetna, says there are minimum levels of security he requires regardless of device ownership. "Aetna has approximately 6,000 enterprise users who either bring their own mobile device or use a mobile device issued by the company," Routh says. "Each of them uses mandatory protection that provides an encrypted channel to use in compromised Wi-Fi networks and alerts the user and enterprise before any malicious mobile app is being installed on the device. This same capability is provided to all top executives for their personal mobile device." Colin Minihan, director of security and best practices at VMware AirWatch, says understanding users and their needs will help a mobile security strategy progress ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Advanced endpoint protection is arriving from all quarters -- machine learning, crafty sandboxes, behavior analytics. Learn how tech advances are being applied to endpoints.
The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy.
Threats evolve, so your mobile security must too. Learn how an app container, app wrapper and other tactics help keep bad guys away from corporate assets.
Columns in this issue
Some days, 'secure endpoint' feels like an oxymoron, but that soon may change. From smart sandboxes to advanced behavior analytics, learn what's new in endpoint security technologies.