Subscribe
About

Securing BYOD

'Bring your own device' policies need to be transparent, says Simon Campbell-Young, CEO of Phoenix Distribution.

As the bring your own device (BYOD) trend continues to grow, the smarter, mobile, integrated workforce of the future is being shaped right now. In the process, it's reshaping the companies it works for and the digital landscape we inhabit.

The common arguments in favour of BYOD focus on productivity and accounting. But, putting business data and intelligence in the hands of employee-owned (and often mobile) devices is not without risk. "Imagine the scene: A plethora of devices, all of them private, each with its own configuration, accessing a corporate network with potentially sensitive data. Without controls, you get a massive security nightmare," says Simon Campbell-Young, CEO of Phoenix Distribution.

One solution to the problem is for IT departments to do what they know best: use management tools to block dangerous apps, control users' network access levels, and remotely erase information from lost or stolen devices. In other words, manage access on employee-owned devices in the same way they manage corporate IT assets. However, this only skirts the issue; it's a far from satisfactory solution. For a start, excessive control can undermine the usefulness of employee-owned devices, decreasing satisfaction and productivity.

Campbell-Young points out that security holes and data leaks can also occur in traditional ways: employees can talk loudly in public, they can photograph sensitive data, or just lose it in an airline seat pocket. The answer to security lies in another direction altogether. It's one that truly showcases the disruptive power of BYOD in the workplace. It is trust.

"BYOD policies need to be transparent. Having parts hidden from employees can cause the policies to backfire. Such openness requires a rethinking of corporate communications with its traditional need-to-know basis. The trust that this change can foster will in turn fuel the productivity increases that enterprises are hoping to get from BYOD," he says.

A study by Juniper Research estimates there are 150 million employee-owned devices, and that this figure will more than double by 2014. That volume of personal devices in corporate settings implies a convergence that's never happened before. In the past, the desktop set-up and data storage facilities at work were totally different to those that employees used in their personal lives. This made it possible to have totally separate digital lives at work and in their leisure time.

"For organisations, there are three main sets of ICT issues associated with mobile computing: security, costs, and support requirements. Security is always at the top of the list of ICT issues. Security of the physical devices is an important element. If a device is lost, stolen, or finds its way into the wrong hands, we must consider that any proprietary data on the device is compromised.

Security of data during its transmission between the mobile device and the organisation's data centre is another important element. In addition, the security of remote access to the organisation's information must be ensured," says Campbell-Young.

"Any BYOD strategy has to include the use of device management and security controls to enforce the policy. This means installing device management clients on smartphones and tablets. It also means installing VPN clients. Employee devices can be configured by the organisation over-the-air, and they can be erased remotely if they are lost or stolen. All devices will be monitored for compliance in real-time, to detect out-of-date device operating systems and unapproved apps, and to provide jailbroken and rooted detection."

Share

Phoenix Distribution

Phoenix Distribution is currently the leading value-added software distributor across the African continent, covering software publishing, localisation and distribution across multiple territories in multiple languages. The business is segmented into two divisions, namely 'corporate licensing' and 'retail', and Phoenix Distribution dominates the consumer and SME security sectors through three key brands: Norton/Symantec, AVG and Kaspersky.

The corporate licensing division sells volume licensing into the enterprise and SME reseller environments, as well as covering architecture and implementation. The ESD division delivers download content into all channels, including B2B and B2C.

The retail division delivers physical product into the retail environment, covering all mainstream ICT and CES outlets, independents and online stores. This division also distributes mobile accessories, wireless networking products, headsets and specialist high-end video and audio cables. Tier One brands in this arena include Beats by Dre, Monster, Carbon Audio, Trendnet Wireless, and Odoyo.

Phoenix Distribution is growing at 65% per annum, with additional acceleration coming from development within the greater African marketplace, as well as the acquisition of significant high-end product lines within the enterprise arena. In addition, the company's UK business, PX Security, is firmly entrenched within the UK retail and SME reseller environments, shipping products through trusted distribution partners into mainstream retail outlets and direct engagement with B2B resellers. The UK operation publishes and distributes Bitdefender and Avira.

Additional bespoke services offered to partners include Electronic Software Distribution within the B2B and B2C environments, category management, training and end-to-end merchandising.

Phoenix Distribution, including the UK subsidiary PX Security, was recently acquired by First Technology Holdings.

For more information, visit www.phoenixsoftware.co.za, Www.pxsecurity.co.uk and www.pxsoftware.co.za.

For purchasing information in Africa, visit www.kasperskyafrica.com, www.kasperskyangola.com, www.kasperskybotswana.com, www.kasperskymozambique.com, www.kasperskynamibia.com, www.kasperskysouthafrica.com, www.kasperskydrcongo.com,
www.kasperskyzimbabwe.com, www.kasperskyzambia.com, www.antivirusangola.com, www.antivirusbotswana.com, www.antivirusmozambique.com, www.antivirusnamibia.com, www.antivirussouthafrica.com, www.antivirusdrcongo.com, www.antiviruszimbabwe.com, and www.antiviruszambia.com.

Editorial contacts

Mia Andric
Exposure
Simon Campbell-Young
Phoenix Distribution
(+27) 21 487 4640
simon@phoenixsoftware.co.za