Craft a security policy for a cloud-based BYOD environment

From the developerWorks archives

Judith Myerson

Date archived: November 29, 2016 | First published: May 10, 2013

Back in the day, you could bring your personal Blackberry to work in order to access a Software as a Service (SaaS) application (if you were in a large building with good cellular reception). Now, you have many device choices for accessing the cloud, from iOs-based phones and tablets, Android handhelds, to Research In Motion's (RIM) PlayBook. All come with opportunities for jailbreaking, or gaining root access, by breaking down security to install banned third-party applications. An infected bring your own device (BYOD) connected to the corporate network is another security concern. A war walker could steal corporate data by uploading from your BYOD to a personal device. Learn to protect corporate assets with a security policy for a cloud-based BYOD environment.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Cloud computing, Mobile development
ArticleID=929346
ArticleTitle=Craft a security policy for a cloud-based BYOD environment
publish-date=05102013