Subscribe

Samsung Knox Security Solution


Johannesburg, 10 Jul 2017
Samsung Knox Security Solution.
Samsung Knox Security Solution.

BYOD and mobile security

Personal smartphones and mobile devices permit employee access to corporate e-mail and network resources, but add a vulnerable entry point that can be exploited. Additionally, document sharing enables mobile devices to further proliferate corporate resources outside of a potentially compromised network infrastructure.

The evolution of (BYOD) and (COPE) strategies started slowly, and then accelerated with the proliferation of apps for every business and personal need. While enterprise employees enjoyed the freedom and productivity of continuous connectivity, IT admins on the other hand were blind-sided with protecting corporate-owned devices from the massive amounts of insecure personal data employees began keeping on their phones.

Legacy enterprise IT admin security models were designed to protect the integrity of the enterprise network and company-issued PCs, not the personal smartphones and tablets utilised by the enterprise's employees. With both BYOD/COPE and cyber-attacks increasing, the scramble to analyse the facts and figures ensued in hopes of finding a way to manage the escalating problem and complexity of mobile device security.

What are the numbers? What are the risks?

Share