How does your company secure its mobile devices?

Mobile Man / Thursday, April 30, 2015

Mobile Device Security

Even ten years ago, the idea that employees would be bringing their own personal IT devices to work then accessing and editing company information from them would have seemed incredible. Of course, technology has moved on rapidly in the last few years and BYOD (Bring Your Own Device) is a growing trend. In fact, research by Gartner suggests that by 2017 half of employers will require employees to supply their own device for at least some work activities.

BYOD is a fascinating proposition. On one hand, it’s purported to bring an array of benefits to the workplace - everything from more satisfied employees and reduced IT costs to increased out of work engagement and lessened stress on information systems. However, it also comes under fire for placing too much responsibility on workers to supply their own high quality devices (although BYOD programs normally include some payment to workers), the risk of intrusion in employees’ personal lives and, of course, perceived security issues.

A worldwide phenomenon, BYOD is catching on everywhere as companies come to realize that a well-managed BYOD policy is probably no less risky than supplying employees with the company’s own devices and desktops. Nonetheless, the risks are real and many IT managers will feel torn between taking the leap into BYOD and sticking with what they know and trust. Whether your company has already initiated a BYOD plan and you’re working out how to keep data safe on devices, or if you supply colleagues with company-owned hardware for when they leave the office, SharePlus from Infragistics helps overcome this dilemma.

Plan, train and test

When taking a big step such as moving to a BYOD model, it’s essential to prepare your IT department and the organization in general for the change. This includes:

  • Planning: develop a roadmap for how the BYOD policy will be deployed. Decide when, how and where it will be done, prepare for obstacles and do your research into the most appropriate solutions for your organization.
  • Training: For employees to really understand how the new policy will work, they’ll need significant training. By giving them the necessary information about how to access and use the new apps on their phones and devices you can be more sure that security risks be avoided.
  • Test: To ensure the roll out into your organization goes smoothly, begin by testing on a small number of ‘Guinea Pigs’. You’ll then be able to spot and smooth out any hitches before global deployment.

 

Mobile access to your portal

By far the most popular and powerful Enterprise IT platform, workers around the world are familiar with SharePoint and its many impressive features. However, despite enormous file storage space and social, collaborative and communication capabilities, the platform continues to be problematic for viewing from mobile devices.

Given the opportunities that mobile technology offers for on-the-go working, a tool such as SharePlus is therefore of real benefit to modern organizations. It allows real time collaboration from most major devices and offline document editing from anywhere. With an intuitive and easy to use interface, it really stands out thanks to its comprehensive security features. Whether it’s for BYOD or simply protecting your company’s own devices when they leave the office, SharePlus has security covered.

  • Data storage: the greatest fear of any IT manager is that their company’s private data is jeopardized and valuable information accessed by malicious individuals outside the business. SharePlus responds to this concern by guaranteeing Data Storage security by allowing a secure data wipe of any company data which is held on a lost or stolen device.
  • Channel communication security: The risk of allowing colleagues to access your data through an external device is that they may (intentionally or otherwise) also be connected to another external network while connected to your company’s systems. SharePlus however, protects the connection between devices and your firm’s SharePoint solution however by employing a Virtual Private Network (VPN) and using a Secure Sockets Layer (SSL).
  • Authentication and authorization services: The first step in protecting company data is of course to set passwords. SharePlus includes numerous additional levels of security to ensure company data is well protected however, including authentication mechanisms which check the identity of visitors and client side certificates. With these additional layers of security, IT managers can feel confident that only the right people can see company data.
  • Enforcing business security: The beauty of SharePoint is that, through the use of views, administrators can decide who has access to private data. With SharePlus, this capability is extended and it’s possible to decide centrally what files and information can be seen from devices.

BYOD in security

BYOD is an increasingly common trend in modern businesses and offers great opportunities to engage employees and increase their workplace satisfaction. Nonetheless, there are considerable and understandable security concerns for IT Managers who fear information leaks or the threat of malware from employee devices for instance. SharePlus offers the possibility of tapping into this modern trend whilst also providing the peace of mind that business systems are protected.

Looking for a comprehensive and secure mobile SharePoint solution, which you can customize to your preferences? Look no further. Download our SharePlus free trial now and see the wonders it can do for your team's productivity!

SharePlus for SharePoint - Download for Android