byodemployee

Did you know that with Moka5, IT can configure over 130 access and security policies for the container, including full encryption and a “kill switch,” to revoke access? As an end-user you might be asking, “why does that matter to me?”

Consider this, rather than restricting where you can use your device, using Moka5 IT can enforce proper security measures without impacting how you configure and personalize your devices. Just consider these risky scenarios – situations that are business as usual for most enterprises - and how they could be simply avoided using Moka5:

Risk Scenario #1: The Contract Worker

You’re the IT liason on a critical path project and the business unit responsible for it has brought in another agency to assist. You want the contract worker to have the same workspace as the rest of the team, not to mention the correct security configurations and software versions, so you give him a corporate owned computer and hope he won’t send any sensitive material elsewhere or visit sketchy websites while he’s using it.

Or you could…

Instead of just handing over a company corporate owned machine, you could quickly create and provision a custom, fully encrypted container for the contractor to download on to their own computers that provides limited, secure access to corporate data. You can limit access based on a set time period. For example, Moka5 can enforce policies such as remotely wiping the container if for example the Contractor doesn’t connect to internet in 2 days, or limiting copy/paste to only within the container. You can even enforce locking down USB peripherals so no data can be leaked.

 

Risk Scenario #2: A Hotel Nightmare…

You’re out of town for business and are forced to stay at a less-than-ideal hotel for a couple of days. After a long day of client meetings, an energizing workout and a dip in the pool sounds like a good idea. Feeling refreshed, you head back to your room only to discover your laptop has been stolen. Freak out? Only for a moment, as you remember all of your important corporate files are sitting in the Moka5 container, offering full disk encryption protecting from prying eyes. A quick call to your IT admin will initiate a remote wipe command, which will completely destroy any trace of enterprise goodness.

Yes, it will be unfortunate that you lost a perfectly good (and potentially personally owned) machine, but that can be replaced – the data: priceless.

 

Risk Scenario #3: The Unsecure Starbucks Wi-Fi Connection

Forget about working at your office until your 2:00 p.m. meeting. The power is out, the backup generator blew and now you’re “stranded” at a Starbucks. Work from the public, insecure Wi-Fi or just hang tight and make friends with the barista for the next hour?

Even if the Wi-Fi is public, M5’s integrated VPN allows you to make the public network secure. In other words, you remain productive even without a secure Internet connection. Even if the bandwidth is low, you’ll be humming along (since all of your work is locally executed) while workers using legacy VDI will simply be out of gas,

 

What data risk scenarios are you experiencing? Tweet at us and let us know or contact us to learn more about Moka5’s 130+ robust security policies that can help you turn a risky situation into a productive one.

Comments are closed.