Enterprise mobility challenges – Identity, access and data security

By David Barclay, National Practice Manager, Data#3

Previous articles in this series have described enterprise mobility – a game-changing, organisation-wide strategy for improved responsiveness, agility and competitive advantage. This article starts looking at some of the bigger mobility challenges to implementation.

Identity, access and data security are a tightly connected trinity of factors needing careful management in today’s mobile enterprise.

Let’s look at identity first – clearly only authorised users should be able to access corporate systems. This is a matter of basic good housekeeping, and is no longer technically challenging, with a range of technologies making it easy for administrators to manage the user base.

Access rights dictate what applications and data users should be able to use, and this is currently problematic for a lot of enterprises. Many corporate IT policies have not kept pace with the rise of cloud-based services and the ‘bring your own device’ (BYOD) movement, and are still based on locking everything down. While 20 years ago administrators could enforce ‘lock down’ policies because they were dealing with devices inside the corporate firewall, and which were owned by the organisation, that is no longer the case.

An increasingly savvy user base, familiar with a range of applications from their personal use of social media and content sharing platforms, seek out the best tools to do their jobs. Trying to restrict access to cloud-based services such as Dropbox, OneDrive, Box and others just drives activity underground, as users ‘go rogue’ in the quest to get their jobs done.

So part of your enterprise mobility management strategy must be to provide users with the tools they need to do their jobs. Recognise the range of work models and tasks that need to be supported, and provide sanctioned tools to achieve those outcomes.

Having addressed the issue of application access, you then need to control access to, and the security of, corporate data. And here we’re back to policies – but a new breed of policy.

Today’s policies must apply based on context. That is, not just what user is trying to access what application and what data, but also the location and device from which they are trying to access it, what they are trying to do with the data, and even the time of day at which they’re doing it.

Sophisticated policies now follow the information they protect. Let’s take an example. Joe is one of your sales force. Today, Joe’s in the office accessing client data from his laptop computer, an ordinary enough task, and one that’s permitted by the policies governing access to client data.

Fast forward to 11pm tomorrow night. Now Joe’s accessing client data from a tablet device over an external connection – no doubt working late, updating CRM system records with the details of today’s calls. But if Joe attempts to download all contact details for his client accounts to Dropbox, the policy governing Joe’s access to client data will block this action, on the assumption that this data is confidential and should not be saved outside the organisation’s systems.

Joe might then attempt to email the data to his personal address, and again a smart policy blocks him from taking corporate data outside corporate control.

This is the power of today’s enterprise mobility management tools – you can provide users with access to the data and functions they need to do their jobs, without compromising security.

If you need help find your way through the full range of solutions available in order to rapidly design and implement a solution that meets your unique requirements, engagement with an independent systems integrator such as Data#3 will save you time and internal investment in conducting first principles research and learning.

We can help you secure your Anywhere Workplace.


Tags: Bring Your Own Device (BYOD), Enterprise Mobility, Mobility, The Anywhere Workplace



Managed Services eBook
Your guide to Data#3 Managed Services

Digital disruption is causing significant changes in the workplace, leading to higher expectations for access, security, and support regardless of…

A truly seamless collaboration experience, all under one (hybrid) roof

The world is redefining work. Where we work has changed. How we work has changed. However, the thing that…

Can everyone hear me okay? The secret to better remote collaboration

To say that the way we meet and collaborate has changed is obviously an understatement. Let’s avoid buzzwords (I didn’t…

Data#3 Wins Schneider Electric Elite Partner Award
Data#3 named Schneider Electric Elite IT Solution Provider of the Year

March 17, 2023; Sydney, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has been named…

JuiceIT Guest Blog | How video conferencing protects confidential communication, elevates work flow and improves user experience

The shape of the modern workforce is changing. However, fundamental business principles pertaining to government and council operations remain the…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Top Ten Tips: Microsoft Teams for Education

You would be forgiven for thinking Microsoft Teams has taken over the corporate world with how many organisations use it…

Data#3 wins Aruba as a Service award
Data#3 wins Aruba ‘as a Service award for two consecutive years

February 1, 2023; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has been named…