Security and Management

Bring Your Own Device (BYOD) initiatives are designed to allow end users to bring multiple devices from home; recognizing that the average college graduate has 5 different devices between laptops and cell phones that at any time can be connected to the network.  Each of these devices represent different use cases and are optimized for different situations and configurations.  The more that businesses can incorporate these computing devices, the more efficient and happy their employees will be.  The challenge with any heterogeneous end-user-driven architecture is always the data security and security management of those devices and the critical data that they will hold. 

 ID has a range of solutions that provide a unified configuration and security compliance policy across multiple different devices within the organization.  The solutions can be broken down into two camps;

  1. Manage the heterogeneous devices using tools like a Mobile Device Manager (MDM) to normalize all of the device configuration capabilities into a single enterprise policy that can be enforced to the maximum extent possible per device. 
  2. Avoid the limitations of certain devices and mitigate the security risk (rather than try to manage it), by using a virtual desktop that maintains all of the information server-side and does not store any corporate information on the device.  There are also Suite B levels of encryption that can be applied to this model for certain levels of Classified (CLASS) data.

 These two approaches to securing BYOD, managing and mitigating, are additive and can be used together for increased security, or individually, or alternatively (e.g. different rules for different devices based on ownership, employee role, or device configuration capability).