A more elegant approach is therefore required. Rather than securing the device, businesses should secure the data, applications and information that the employee accesses through it. There are threeenabling technologies for this approach: mobile application management (MAM), mobile information management (MIM)and identity management.
Rather than locking down the entire device, MAM extends a secure 'container' for application security and control to separate, protect, and wipe corporate applications and data. Importantly it does so in a way that does not interfere with usability.
While ideal for COPE deployments, MAM is particularly compelling for BYOD as it securely extends all the identity services and policies of the enterprise user to their personal mobile device. For the employer thissolution is ideal. Employees can lose their phones without putting corporate data at risk. Meanwhile, MAM reassures employees that employers can't see any of their personal information.
Of course, while lost mobile devices represent a key security threat, it isnot the only one. For example, data might be intercepted wirelessly through data leakages or breaches, regardless of whether the employee has physical possession of the device or not.
In these cases Mobile Information Management (MIM) will play an important role. MIM secures data at the document level. The user accesses the document through the application in the usual way but requires access permission to actually view the document, allowing businesses to secure crucial data at a granular level.
A final consideration for device and data security is identity fraud, as this is an easy way for criminals to access a victim's professional services. Identity management is therefore a vital component of a mobile strategy and integrating step-up, multi factor authentication and authorization with mobile security policies is critical.
Mobile devices will get lost; they will get broken; and they will get stolen. But this is no reason for businesses not to embrace their use -- the benefits of mobility can easily be enjoyedsecurely.
Sign up for Computerworld eNewsletters.