Skip the navigation

Security Manager's Journal: Coming through for the business

Our manager finds a way to enable iPhones and Android devices to be used on the corporate network

By J.F. Rice
December 22, 2010 10:56 AM ET

Computerworld - Sometimes, the security manager doesn't have to be the bad guy.

There are admittedly many occasions when I have to get in the way of a business request, project or software rollout (usually because they started without me), but I try to avoid that scenario. I believe security can help the business be successful. Often, I have to settle for just ushering the technology in a direction that makes sense from a security perspective but doesn't change the overall outcome. But I really try to use security as an enabling tool that helps the business exceed its goals, by opening up technology in a secure way to employees, partners and customers so they can do more than they would have thought possible. When I'm able to do that, it makes me feel good. This month, I'm feeling good.

This time, security is helping the business by enabling a mobile workforce. I've been searching for ways to protect iPhones and Android devices, because I'm starting to see an influx of these popular smartphones. People love these machines, and they want to connect them to the company network. The problem is, these devices are not enterprise-capable, by which I mean they can't be centrally managed, provisioned and wiped without cobbling together a custom approach of some kind using free or commercial software components not provided by the manufacturer. I don't want my company's intellectual property residing on these devices without access control, encryption, passwords and remote-delete capability.

I found a commercial product that does all those things, and more. With this new software, I can segment and compartmentalize our company data on these devices, encrypting and protecting it. Better yet, when I need to delete that data (because an employee leaves the company, for example), I can leave personal data and applications intact. How cool is that?

But here's where the business enabler comes in. Now that I have the capability to fully secure our confidential data, I can fully support (and even encourage) the use of mobile devices in my company. And that includes iPads, a device that I was not even considering but can give our mobile workforce and sales teams far more effectiveness and efficiency than a laptop. Not only that, but I can also sponsor a program to allow employees to start connecting their personal devices to our network, which will save the company millions of dollars a year in data plan costs. Saving a lot of money and improving our workforce effectiveness gives a boost to the reputation of security -- and that provides credit I can spend later when I need to make people unhappy!

Our Commenting Policies
Internet of Things: Get the latest!
Internet of Things

Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!