Bring Your Own Data Breach: Solving BYOD Security Issues in the Enterprise
BYOD, or Bring Your Own Device is becoming increasingly popular in the business world, but it might be better labeled Bring Your Own Security Breach. As the use of personal tablets and smartphones in the enterprise increases, businesses are struggling to strike the proper balance between employee freedom of choice and the need to protect data. According to Juniper Research, some 350 million employees worldwide will be using their own devices for work by 2014, more than double the current number.
BYOD advocates believe employees can be more efficient if they use the mobile device they’re most accustomed to, but many IT executives would trade unfettered use of personal devices for the promise of data security. For Adam Stern, founder and CEO of cloud hosting and virtual server provider, Infinitely Virtual, BYOD is a business trend that needs to be addressed from the security aspect. In Stern’s view, businesses can embrace BYOD without fear if they plan ahead. They can make BYOD work for their organizations and their employees, but they must begin by recognizing BYOD as a strategic opportunity – one that places the issue of data security in the cloud front and center, where it needs to be at all times.
Stern has made cloud data security a major focal point of his successful business, using an advanced Intrusion Detection and Protection system that goes far beyond typical security systems to protect his clients' data 24 x 7. He will offer insights into what issues enterprises need to consider before implementing a BYOD policy, what it takes to maintain and protect data in a virtual environment – whether that data sits on a desktop, an iPad or a Droid. Stern embraces the concept of Desktop-As-A-Service (DaaS), which entails hosting the desktop remotely so there is no sensitive corporate information from the data center stored on any of the BYOD devices. Therefore, if an employee loses their laptop or misplaces their smartphone, there is no risk of data theft. There simply is no data on the device to be stolen. DaaS addresses security concerns by bringing all data into a secure, remote location – allowing the flexibility and global accessibility device users want, and providing a platform that multiple devices can access. It can also save enterprises money by eliminating the need to change out the software on every single device. BYOD is here to stay. Stern will provide attendees with valuable – and practical –insights into how the enterprise can integrate the use of BYOD without sacrificing data security.