Lack of tablet security shouldn't discourage BYOD initiatives

MENDY NEWMAN on August 04, 2014 | 1538

According to ARN , the security failings of many popular tablet computers, such as the iPad, the Samsung Galaxy and the BlackBerry Playbook, are being brought into the spotlight. While the native security controls on these devices may not seem on par with business needs, the demand and need for tablets and mobile devices in the workplace isn’t likely to vanish because of them.

“It is difficult to ignore the growing presence of tablet computers in the home and workplace offering a blend of productivity, connectivity and physical freedom which has never been achieved before,” Jonathan Roach, an industry expert, told the news source.

Luckily for businesses, the internal protection provided in a device isn’t necessarily the defining security measure for a company’s BYOD solution, nor should it be the first and only level of protection.

With the proper security tools to promote safe and secure BYOD and remote access, a business can eliminate the risks of mobile security. By virtualizing and centrally hosting applications, data and desktops in a data center or cloud, and implementing RDP-based remote access using encryption, authentication and other security measures, a business can ensure that no matter what tablet, computer or smartphone its employees use for work, its data, applications and other digital assets are well protected.

Recently, a study of federal BYOD efforts also found that government agencies in the United States have had their eye on the security concerns of mobile devices, but in a positive light. According to Mobile Enterprise , many technology decision-makers among these agencies have found success with their BYOD strategies, and have been able to ensure security.

“One of the first challenges in developing a BYOD program is developing rules of behavior and the policy guidelines so people understand the difference between the privacy and security features that will be directed for a personal device when at work,” Kimberly Hancher, CIO of the U.S. Equal Employment Opportunity Commission, said at a meeting with other government officials.

Ultimately, developing an answer to the demand for BYOD and mobile device support in the workplace requires a business to assess its own needs for security and infrastructure protection. By doing so, any company or organization can develop a secure, reliable answer that will make both employees and decision-makers happy, and keep data secure.

Industry news brought to you by Ericom Software, leaders in BYOD solutions.

Author | 122 Blog Posts

Mendy Newman

Mendy is the Head of Solution Management at Ericom for all its products. Mendy's team focuses on delivering implementation and architecture solutions to our customers worldwide. | Ericom Software

Recommended Articles