BYOD requires more time-sensitive Network Security Protection Policies

Source: Internet
Author: User

Comments: As BYOD is gradually brought into the enterprise by employees, IT puts a lot of pressure on Enterprise Security Risk Management. Therefore, the enterprise's IT department tries to pass network and data security to employees, however, this will also result in security misleading BYOD, which means that the IT department should pay more attention to security policy updates than ever before, and be able to cope with hundreds of devices outside the enterprise network. Lawrence Orans, Gartner's US research director, said that to ensure the security of BYOD devices, you can first adopt a three-way approach to security: device, data, and network protection.
From the device perspective
Orans warned that some devices may be more secure than others, and the BYOD policy finally designed also reflects this. He said, "Some companies may require employees to only carry personal devices of certain brands. For example, some companies allow iPhone and iPad devices but not Android devices, because Android is an open development platform, it is more vulnerable to attacks."
Orans added that enterprises should disable network security to ensure that employees comply with the company's network security rules. For example, some companies allow employees to use their iPhone in their networks as long as these personal devices run the mobile device management agents supported by the company. "Installing the MDM proxy means that data can still be deleted remotely if the phone number is lost or stolen. Emails and Web temptations still apply, as well as scanning directed to free gifts, surveys, fake apps and credential collection ." He said.
According to Tucker, the solutions to be installed by IT managers should be integrated with device management, real-time data protection, dynamic Web threats, mobile malware and malicious mobile applications.
  Data security
According to Orans of Gartner, IT managers can use virtualized desktop architecture (VDI) and hosted virtual desktops to protect data security. "You can better protect data because you only see virtual images on devices, according to Tucker of Websense, enterprises should focus on the most important objects-ensuring the ability to protect mobile data-while balancing users' needs.
"IT experts like to provide products with efficient management and low cost, and such products should be based on consolidation and enterprise-level features, such as centralized management, directory integration, and powerful reporting capabilities," he said. In addition, the cloud Security Service ensures that enterprises can provide security services at any time to prevent private data from being leaked through iPad, iPhone, Android, and other mobile devices.
  Network Protection
Orans warned that if a device with incorrect configuration is allowed to access the network, it may affect the network stability.
He said, "the other thing is that IT enterprises are worried about the network being out of control. They want to know something about the network. Four years ago, network control was relatively easy, however, due to the surge in personal devices, the network is open."
A BYOD network security policy should include the following features:
1. Integrated content analysis for Web, mail, and data security to prevent advanced, targeted, and hybrid attacks.
2. enterprise-level data leakage prevention (DLP) for mail services must protect data that enters and exits the network.
3. Flexible dual-Policy Management provides independent policy support for enterprise devices and individual devices.
4. blocking malicious application intrusion helps protect devices and data from mobile application threats.
5. simplified management and detailed reports using the separate console can reduce management costs and complexity, allowing IT staff to focus on their own projects.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.