Page 9 - CDM-Cyber-Warnings-March-2014
P. 9
.6 .5$1-,$-3 1& -(9 3(.-2 - 3 8 $"41$ '$- .(-& .!(+$ by Mark Williams, Director of Government Solutions, AirWatch by VMware As mobile devices continue to infiltrate government organizations, the demand for secure mobile solutions is growing rapidly. According to a Mobile Work Exchange report, 41 percent of government employees are putting themselves and their agencies at risk with their existing mobile device habits. With this rise in demand for mobile devices within government organizations, an increasing number of employees are utilizing consumer-grade solutions to secure mobile devices for work purposes. Encouraging employees to use mobile devices at work without the right resources is an intimidating prospect for government groups whose highest priority is protecting sensitive data. However, resources such as mobile device management (MDM), app scanning and the shift to the personal cloud can be deployed to manage the devices within the organization. Once a government organization is armed with the correct tools for MDM, it can empower employees with mobile devices while ensuring that sensitive data and employee information is secure. Increase Data Protection with Multiple Layers of Security As more government processes are extended to mobile, many organizations are finding uses for both MDM and containerization, either for different deployments or on the same device. Government organizations that have highly sensitive or proprietary content may prefer the added security that MDM and containerization on the same device provides. A corporate container deployed on a managed device provides an extra barrier to access government content. Users are required to enter both a device-level passcode and a container-level passcode, and administrators have both device-level controls and application-level controls that enable app-to-app collaboration with other managed and secure applications within the container. This approach creates a sense of segmentation between work and play for end users, bringing a dual-persona feel to managed devices by isolating government content inside a secure container. MDM and containerization are often thought of as mutually exclusive security solutions, but today’s most innovative organizations are taking a layered approach to security by using the two in conjunction. Adopt App Wrapping to Protect Personal Privacy and Information Security In addition to third-party applications, many government organizations are building internal applications for specific business and employee roles. However, IT must ensure the applications are secured and data isn’t compromised, whether applications are installed on corporate-owned or Bring Your Own Device (BYOD) devices. App wrapping gives existing internal applications an extra level of security and management capabilities, without further requiring development or code change. With injected code, developers benefit by not spending time coding for additional features. Possible app wrapping " # % " $ " # ! !
   4   5   6   7   8   9   10   11   12   13   14