Enterprise Mobility Risks

ENTERPRISE MOBILITY RISKS: WHERE TO FOCUS?

FINDING A BALANCE BETWEEN INNOVATION AND INFORMATION SECURITYFINDING A BALANCE BETWEEN INNOVATION AND INFORMATION SECURITY

 

This paper discusses a number of topics related to the enterprise mobility management and information assurance. It covers areas of design, implementation, and operation of Bring Your Own Device (BYOD) mobility management strategy. Information Systems Audit and Control Association (ISACA) defines BYOD, in the broadest sense, as a specialized program designed to provide device independence to end users. (Nelson, 2016) BYOD has several advantages but many organizations struggle to find a right balance between business goals and objectives, a need to innovative, and a need to manage information security risks. This whitepaper discusses several frequently overlooked BYOD pitfalls that organizations encounter; for instance: excessive reliance on technology, lack of attention to administrative controls, risk assessment issues, and issues related to BYOD support by senior leadership. In addition, the whitepaper reviews regulations and mobility management best practices, as well as provides recommendations on how to implement a successful BYOD program. 

Keywords: mobile device, bring your own device, security, information assurance 

 

Secure Communication Solutions

Customers must be qualified to use SECROM. Certain products and services are only available to U.S. Persons, as defined in the International Traffic in Arms Regulations. Qualifications are subject to change without notice. Other limitations apply. All product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.

Copyright © 2016 SECROM. All Rights Reserved.

Go to top