Security Manager's Journal: Coming through for the business
Our manager finds a way to enable iPhones and Android devices to be used on the corporate network
Computerworld - Sometimes, the security manager doesn't have to be the bad guy.
There are admittedly many occasions when I have to get in the way of a business request, project or software rollout (usually because they started without me), but I try to avoid that scenario. I believe security can help the business be successful. Often, I have to settle for just ushering the technology in a direction that makes sense from a security perspective but doesn't change the overall outcome. But I really try to use security as an enabling tool that helps the business exceed its goals, by opening up technology in a secure way to employees, partners and customers so they can do more than they would have thought possible. When I'm able to do that, it makes me feel good. This month, I'm feeling good.
This time, security is helping the business by enabling a mobile workforce. I've been searching for ways to protect iPhones and Android devices, because I'm starting to see an influx of these popular smartphones. People love these machines, and they want to connect them to the company network. The problem is, these devices are not enterprise-capable, by which I mean they can't be centrally managed, provisioned and wiped without cobbling together a custom approach of some kind using free or commercial software components not provided by the manufacturer. I don't want my company's intellectual property residing on these devices without access control, encryption, passwords and remote-delete capability.
I found a commercial product that does all those things, and more. With this new software, I can segment and compartmentalize our company data on these devices, encrypting and protecting it. Better yet, when I need to delete that data (because an employee leaves the company, for example), I can leave personal data and applications intact. How cool is that?
But here's where the business enabler comes in. Now that I have the capability to fully secure our confidential data, I can fully support (and even encourage) the use of mobile devices in my company. And that includes iPads, a device that I was not even considering but can give our mobile workforce and sales teams far more effectiveness and efficiency than a laptop. Not only that, but I can also sponsor a program to allow employees to start connecting their personal devices to our network, which will save the company millions of dollars a year in data plan costs. Saving a lot of money and improving our workforce effectiveness gives a boost to the reputation of security -- and that provides credit I can spend later when I need to make people unhappy!
More by J.F. Rice
- Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
- Security Manager's Journal: Cyberattacks just got personal
- Security Manager's Journal: Target breach unleashes fresh scams
- Security Manager's Journal: Giving thanks for SIEM
- Security Manager's Journal: Hashing out secure applications
- Security Manager's Journal: Why the shutdown is like the cloud
- Security Manager's Journal: Thinking about passwords
- Security Manager's Journal: Android panic
- Security Manager's Journal: Auto-forwarded emails could be a huge problem
- Security Manager's Journal: Our network infrastructure has fallen far out of date
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- 10 Things Your Next Firewall Must do Next-Generation Firewalls Defined
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts