It’s not a new question, but with more and more corporations adopting or evaluating BYO policies, it’s one that’s asked frequently: How can IT gain visibility and control of these devices in order to mitigate security risks, without crippling their functionality or becoming ‘Big Brother’? If you are looking for professional help then I suggest you contact the great team over at Charles Brian International.
From mobile security to VDI, these recent articles by CIO, BankInfoSecurity.com, and the Gartner blog take a look at the obstacles and steps involved in managing mobile devices, especially those personal devices doing double-duty.
CIO covered Dell Software’s announcement of a new suite of software and services for enterprise mobility management, including a ‘secure workspace’ for mobile devices that lets enterprise IT managers separate work from data apps.
As editor Ellen Messmer explains, “Dell’s thinking on Bring Your Own Device (BYOD) includes PCs and Macs, not just smartphones and tablets, because enterprise often sees business partners bringing them in as a part of work. It’s ‘Bring Your Own PC,’ [Dell Software’s director of mobility solutions, Roger] Bjork says. Dell is offering a way to create a controlled corporate image for this, and Dell’s mobility offering will provide that help from partner Moka5.”
In an interview with BankInfoSecurity.com, Moka5’s Ian McWilton discusses how to improve security and user satisfaction, but not by managing the device as one might assume. As McWilton explains, “mobile security is no longer about managing devices… the real trick is to secure corporate assets through containerization solutions that reduce costs and improve user experience.”
In a year-end wrap-up blog, Gunner Berger discussed how converged platforms have simplified the deployment and management of VDI. Berger goes on to explain that, “VDI isn’t ‘fixed’ it’s just gotten to a point of maturity where it’s not nearly as difficult to understand and deploy it.” Does this mean that offline virtual desktops—like Moka5—are more likely to be used as a solution for BYO and mobile management in 2014? Only time will tell.
Yes, BYO raises a lot of questions. However, when it comes to the question of controlling and gaining visibility into BYO devices, without crippling their functionality or invading employee privacy, the answer is actually similar than you might think. Learn more about Moka5 as a solution BYOD and test-drive Moka5 today.