Mobile endpoint security: What enterprise InfoSec pros must know now
A comprehensive collection of articles, videos and more, hand-picked by our editors
As new gizmos and gadgets gain consumer momentum, they will inevitably infiltrate the enterprise and -- of course -- become the bane of IT's existence as they bring with them not only user connectivity wants and needs, but also numerous management issues and security risks that must be addressed.
However, as Domingo Guerra, president and co-founder of Appthority, told SearchSecurity at RSA Conference 2015, when it comes to wearables, many enterprises are fortunate enough to have BYOD in their back pocket to learn from.
"One of the key learnings from the first wave of BYOD is that enterprise IT and security departments can't really stop this," Guerra said. "We're not going to be able to prevent users from bringing [wearables] in."
And, perhaps unfortunately for enterprises, this likely isn't the last wave of BYOD.
"This is just the next wave of BYOX," Guerra said. "It's users bringing a connected device into the enterprise that will access other mobile devices, it can access corporate networks. Or just facilitate the amount of devices receiving sensitive information -- like email, calendar syncs or meeting invites, for example."
So what exactly have enterprises learned from the first influx of BYOD? And how can wearables security be properly addressed?
"A good strategy would be to know what the policy will be in terms of whether or not (wearables) will be able to connect to a corporate network, for example," Guerra said. "Will we require some sort of authentication? What kind of apps will be allowed?"
To round out the discussion, Guerra discussed the devices he and Appthority are most interested in from a security perspective, the security of Apple Watch and what will happen when it separates from iOS, and more.