BYOD Strategy: Bring Your Own Data in motion without risks


Published on

GARL, in collaboration with the German security distributor Intellicomp, presents a compact guide on how to face the mobility challenge and adopt a mobile strategy that users can easily embrace.

Giuseppe Paterno', IT Security Architect and Director at GARL, shows how all companies can securely manage their distributed workforce on any device, with particular focus on tablets and smartphones. The objective is to help customers selecting their own secure yet affordable mobile strategy: the content itself focus on practical aspects rather than a theoretical model.

The consolidated adoption of personal mobile devices for business use, known as Bring Your Own Device (BYOD), has raised concerns over the security of both company's network and privacy policies. The use of unmanaged devices started with smartphones and now is moving to tablets as well as privately owned laptops and netbooks. As the number of mobile applications increases, companies are now facing the significative amount of risks that comes from the mixed use of the devices.

Through the adoption of BYOD, users' comfort has increasingly improved, but it's important to embrace the proper tools to protect the users' credentials and company's on-line data. This the reason why a combined solution let appliances and services work together to guarantee the highest level of protection on the weakest points of the network, the ones that the Sysadmins can't control directly.

To be successful, every strategy must rely on the cooperation of the users and this means that they should receive some advantages: the proposed strategy significantly boost their everyday work and avoiding losing time. Affordable solutions like SSL VPN or the adoption of Single Sign-On system let employees enjoy the benefit of working from everywhere, as well as having a centralized identity managed system that can grant the access only to the authorized users.

To find out more about the suggested mobility strategy, have a look to presentation

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

BYOD Strategy: Bring Your Own Data in motion without risks

  1. 1. Bring Your Own Datain motion without risksAdopt a mobile access strategy that users can easily embraceGiuseppe PaternòIT Security Architect -
  2. 2. EVERY USER IS AN ADMIN ... of his devices (BYOD) ... of his apps, softwares, . ... of his credential to virus installed with company’saccess to company’s data management tools
  3. 3. THE BYOD OPPORTUNITIESLet your users choose their Lower costs and less timedevices dedicated to test and developmentImprove agility with Less time spent in the ITteleworking helpdesk
  4. 4. THE BYOD RISKSAccess to company’s networkUnable to enforce company’s policies on thedeviceRespect privacy regulations (ex. customers’data stored within address book accessible bysocial networks)Users install mobile apps that accessing andcollecting data like bank and shopping accountsStolen or lost devices with credential to accessto company’ system
  5. 5. THE STRATEGYThe BYOD access strategy should be focusedon securing the users’ access, not the devices
  6. 6. STRONG SECURITY POLICY A secure access gateway + A virtual desktop infrastructure +A secure centralized identity management system
  7. 7. ACCESS GATEWAYEasy web access fromanywhere with SSLFull HTML compatibilityPer-user customized portalAccess to applications basedon users’ role
  8. 8. VIRTUAL DESKTOP INFRASTRUCTUREDesktop experience from No need to rewriteanywhere and any device existing desktop applicationsEasy to use for everybody
  9. 9. IDENTITY MANAGEMENTCentralized identitymanagement across all on-lineapplicationsGrant users’ access with OneTime PasswordsEasy integration with all yourweb based applicationsFew minutes to secureexisting partner portals,virtual desktops and VPN
  10. 10. AND DON’T FORGET BEST PRACTICES!Configure an SSL VPN Adopt a firewall and check policies periodically