PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
June 2016, Vol. 18, No. 5

Mobile security strategy matures with BYOD

As mobility increases workforce productivity, CISOs need to develop a mobile security strategy that strikes a balance between a great user experience and effective information security. The key to scaling the mobile maturity ladder is in how well you know your users and the devices they bring to your organization. Jim Routh, CSO at Aetna, says there are minimum levels of security he requires regardless of device ownership. "Aetna has approximately 6,000 enterprise users who either bring their own mobile device or use a mobile device issued by the company," Routh says. "Each of them uses mandatory protection that provides an encrypted channel to use in compromised Wi-Fi networks and alerts the user and enterprise before any malicious mobile app is being installed on the device.  This same capability is provided to all top executives for their personal mobile device." Colin Minihan, director of security and best practices at VMware AirWatch, says understanding users and their needs will help a mobile security strategy progress ...

Features in this issue

Columns in this issue