Sunday, 5 August 2012

Mitigating BYOD Risks on Network



Bring-Your-Own-Device (BYOD) trend has resulted in a growing number of employee-owned devices on the network. Unauthorized use of the corporate network leads to security issues, as well as potential disruption of the network. In order to mitigate some of the risks on corporate networks, Blue Coat has introduced mobile application controls.

As employees increasingly bring their own mobile devices to work, the mobile app security gap has widened. The vendor says its new solution gives IT the ability to manage the use of unsanctioned applications and enforce policies across all devices on the network. The growth in BYOD initiatives has driven an increase in mobile devices and unmanaged applications on the corporate network.  

According to Forester Research, 57 percent of employees chose and purchased their own Smartphone without any direction or guidance from their company. According to mobile application measurement company Flurry, each Smartphone has, on average, 65 mobile apps installed. With 350 million employees expected to use Smartphone’s at work by 2016, the number of mobile applications using the corporate network will continue to skyrocket.

The increase in mobile devices on the corporate network creates two distinct risks that lead to undesired or unpredictable network impacts. First, it contributes to the growing problem of unsanctioned applications on the corporate network.  Second, corporate policies cannot be consistently enforced across all devices.

Like web-based applications, the use of mobile applications is eroding IT control of the network. Unlike browser-based web applications, however, mobile applications and their corresponding operations are typically self-contained and fall outside the control of traditional web security solutions. Blue Coat says with these operational controls, businesses can set policies around specific functions within both web-based and mobile applications.
 This enables businesses to enforce policy across all devices and allows them to regain control over the applications on their network. For example, a business that wants to mitigate unintentional leaks of confidential or secure location information could set a policy for Twitter that prevents employees from sending tweets but allows full reading or monitoring access.

“The growth of BYOD initiatives has created a situation where IT security managers are facing a deluge of entrusted, unmanaged devices and applications on the corporate network,” says Dave Ewart, director of product marketing, EMEA at Blue Coat Systems

 Article By
 A. Nivethitha
 Final Year  IT