Share

Enterprise mobility challenges – Identity, access and data security

By David Barclay, National Practice Manager, Data#3

Previous articles in this series have described enterprise mobility – a game-changing, organisation-wide strategy for improved responsiveness, agility and competitive advantage. This article starts looking at some of the bigger mobility challenges to implementation.

Identity, access and data security are a tightly connected trinity of factors needing careful management in today’s mobile enterprise.

Let’s look at identity first – clearly only authorised users should be able to access corporate systems. This is a matter of basic good housekeeping, and is no longer technically challenging, with a range of technologies making it easy for administrators to manage the user base.

Access rights dictate what applications and data users should be able to use, and this is currently problematic for a lot of enterprises. Many corporate IT policies have not kept pace with the rise of cloud-based services and the ‘bring your own device’ (BYOD) movement, and are still based on locking everything down. While 20 years ago administrators could enforce ‘lock down’ policies because they were dealing with devices inside the corporate firewall, and which were owned by the organisation, that is no longer the case.

An increasingly savvy user base, familiar with a range of applications from their personal use of social media and content sharing platforms, seek out the best tools to do their jobs. Trying to restrict access to cloud-based services such as Dropbox, OneDrive, Box and others just drives activity underground, as users ‘go rogue’ in the quest to get their jobs done.

So part of your enterprise mobility management strategy must be to provide users with the tools they need to do their jobs. Recognise the range of work models and tasks that need to be supported, and provide sanctioned tools to achieve those outcomes.

Having addressed the issue of application access, you then need to control access to, and the security of, corporate data. And here we’re back to policies – but a new breed of policy.

Today’s policies must apply based on context. That is, not just what user is trying to access what application and what data, but also the location and device from which they are trying to access it, what they are trying to do with the data, and even the time of day at which they’re doing it.

Sophisticated policies now follow the information they protect. Let’s take an example. Joe is one of your sales force. Today, Joe’s in the office accessing client data from his laptop computer, an ordinary enough task, and one that’s permitted by the policies governing access to client data.

Fast forward to 11pm tomorrow night. Now Joe’s accessing client data from a tablet device over an external connection – no doubt working late, updating CRM system records with the details of today’s calls. But if Joe attempts to download all contact details for his client accounts to Dropbox, the policy governing Joe’s access to client data will block this action, on the assumption that this data is confidential and should not be saved outside the organisation’s systems.

Joe might then attempt to email the data to his personal address, and again a smart policy blocks him from taking corporate data outside corporate control.

This is the power of today’s enterprise mobility management tools – you can provide users with access to the data and functions they need to do their jobs, without compromising security.

If you need help find your way through the full range of solutions available in order to rapidly design and implement a solution that meets your unique requirements, engagement with an independent systems integrator such as Data#3 will save you time and internal investment in conducting first principles research and learning.

We can help you secure your Anywhere Workplace.

 

Tags: Bring Your Own Device (BYOD), Mobility, Enterprise Mobility, The Anywhere Workplace

Featured

Subscribe to our blog

Related

Unboxing the Surface Go 2
Unboxing the Surface Go 2

Primary school students are engaging with technology in the classroom (and from home), more than ever before. Using digital…

Hurdles to clear before adopting modern management
Hurdles to clear before adopting modern management

A vast remote work experiment is currently underway. As organisations seek new ways to effectively support a growing remote…

HP ProBook x360 435: The latest in hybrid learning
HP ProBook x360 435: The latest in hybrid learning

While digital learning initiatives have been in sharp focus for some time now, it’s safe to say that improving the…

Five devices that deliver a great learning experience
Five devices that deliver a great learning experience

If anyone was previously unaware of the ingenuity, passion and dedication that exists in Australia’s schools, 2020 has left no…

Unboxing the HP ProBook x360 435
Unboxing the HP ProBook x360 435

In a recent survey, 61% of schools said they expect to begin the next school year in a hybrid learning…

Do you know the wireless capabilities of your mobile devices? Here’s why you should

You’ve just purchased some shiny new Wireless Access Points from ‘Vendor X’. Vendor X has promised you lightning-fast, wired-like connection…

Data#3 Moves Head Office: Delivers Safe, Modern Digital Collaboration Space

Leading Australian technology services and solutions provider, Data#3, today announced the relocation of its Brisbane headquarters, in a move to…

Customer Story: Victoria University

Modern All-Flash Storage Environment Accelerates Application Delivery for Victoria University Objective Although Victoria University’s old storage systems had reliably operated…