Access your Pro+ Content below.
Mobile security strategy matures with BYOD
This article is part of the Information Security magazine issue of June 2016, Vol. 18, No. 5
As mobility increases workforce productivity, CISOs need to develop a mobile security strategy that strikes a balance between a great user experience and effective information security. The key to scaling the mobile maturity ladder is in how well you know your users and the devices they bring to your organization. Jim Routh, CSO at Aetna, says there are minimum levels of security he requires regardless of device ownership. "Aetna has approximately 6,000 enterprise users who either bring their own mobile device or use a mobile device issued by the company," Routh says. "Each of them uses mandatory protection that provides an encrypted channel to use in compromised Wi-Fi networks and alerts the user and enterprise before any malicious mobile app is being installed on the device. This same capability is provided to all top executives for their personal mobile device." Colin Minihan, director of security and best practices at VMware AirWatch, says understanding users and their needs will help a mobile security strategy progress ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
The basic level of mobile security is to protect data and access to a network, but understanding the needs of mobile users and their devices is the key to maturing that strategy.
Not sure who's really behind that username and password? Google, Facebook and others may finally give multifactor authentication technology the 'push' it needs.
As the enterprise encryption tools market matures, buyers find many vendors to choose from, but few stand out from the crowd as encryption is absorbed into other security tools.
Columns in this issue
The majority of companies lack mobile policies around access and storage of corporate data, according to one study. Is your organization one of them?
Security professionals need to get acquainted with cloud API security options available to development and operation teams regardless of the services they use.