Online KMWorld CRM Media Streaming Media Faulkner Speech Technology Unisphere/DBTA ITIResearch.com
Other ITI Websites

e-Newsletters > NewsBreaks
Back Index Forward
NEW! RSS Feed
 




Five Enterprise Options for BYOD
by
Posted On January 7, 2014


As the BYOD (bring your own device) trend grows in popularity, companies need to be more vigilant about protecting sensitive information. Since mobile devices don’t always have the same security protection as corporate-owned desktop computers, the use of personal smartphones, laptops, and tablets expose businesses to security risks if the proper safeguards aren’t taken.

These companies provide solutions to help keep sensitive data safe when employees access company information from their mobile devices.

Citrix’s suite of BYOD solutions promotes productivity on personal devices without losing security features. Citrix Receiver, its software client, offers secure access to companies’ applications, desktops, and data from any device or network. A company’s information technology (IT) department can use Citrix’s NetScaler Gateway unified management framework to control employees’ access to information by quarantining devices that do not meet BYOD criteria. IT departments can also use XenMobile to manage employees’ access to Citrix Receiver, deliver approved apps such as email clients and browsers, and secure the company’s apps with a single line of code. The desktop management version, XenDesktop, helps employees access Windows apps and complete desktops that IT protects in its data center. Citrix also has a secure file-sharing service and collaborative workspaces.

Enterasys Networks provides a comprehensive BYOD solution, Mobile IAM, for control over individual users, devices, and applications in multivendor infrastructures. Mobile IAM delivers real-time tracking and other open architectural measures designed to give IT departments visibility into all network activity. Other Enterasys Networks BYOD tools include the OneFabric system, which offers data center management, a Wi-Fi product suite, and network management and security. Physical data centers can be deployed using Enterasys Networks’ terabit-class modular switch routers, stackable switching platforms, and stand-alone switching platforms with 12–96 ports. IdentiFi Wireless boasts wired-like performance, reliability, and security. Its access points, controllers, and management tool protect a company’s wireless network. The ISAAC (Intelligent Socially Aware Automated Communications) interface integrates a company’s IT infrastructure with employees’ social networks for protected communications while on mobile devices.

harmon.ie adds additional BYOD functionality to Microsoft SharePoint, a document-sharing tool that allows users to save documents in the cloud instead of on individual mobile devices, and Microsoft Office 365, which provides a secure platform for collaborative productivity. Documents saved to SharePoint are accessible via links sent among colleagues. Email attachments can even be saved to SharePoint instead of on a user’s device. harmon.ie offers Office 365 and SharePoint via embedded web apps on a range of mobile devices, including iOS, Android, and BlackBerry, with full document metadata support. Both tools sync across the cloud, mobile devices, and company desktops.

Precise Biometrics produces smart card readers and fingerprint scanners to authenticate employees before they can access secure information. Its main product is Tactivo, a case for a mobile device that reads an employee’s smart card. The case is slim and contains the smart card reader and a place for employees to swipe their fingerprints, as well as a storage pocket for a smart card when not in use. Precise Biometrics also produces Tactivo mini authentication dongles for Android and iOS devices, which are about the size of flash drives and can be inserted into mobile devices when needed. These are designed for employees who use their mobile devices for occasional work; they can carry the dongles and plug them into their mobile devices to use as portable, removable smart card readers.

Symantec supports BYOD practices with its app center and security platform. The Symantec App Center offers mobile app management and protection on a per-app basis by using a unified platform to manage a company’s mobility needs. It gives IT departments control over app distribution, with the ability to add corporate security and to revoke apps when employees leave a company. Symantec O3 is a cloud security platform that helps companies securely migrate to SaaS applications. It has single sign-on across web applications and enforces access controls so that IT departments can manage security for multiple cloud applications for in-office and mobile users. It is programmed with mobile-aware architecture that prevents unauthorized access or downloads on mobile devices.


Brandi Scardilli is managing editor at Information Today, Inc., where she works on NewsBreaks and Information Today.

Email Brandi Scardilli
Related Articles

2/4/2013A Cyber War Is Brewing
9/19/2013Precise Biometrics Builds Ecosystem for Mobile Device Security
11/7/2013U.S. Government Releases Proposed Cybersecurity Framework
2/20/2014Identity Security and Authentication Companies Join Forces
4/8/2014The Pitfalls of Standardized BYOD


Comments Add A Comment

              Back to top