Mobility

The art of making secure mobile choices……

Share this post:

In the consumer driven economy the power of data and its impact on customer engagement is prevalently well known. What is lesser known, is its parallel universe of enterprise data security, where the loss of data plays into the Billions of Dollars, and is a CIO’s biggest obstacle. This could be a mobile device that has a keyboard add on that might be compromising user credentials, and typed in data, or any other forms there of. The most common reasons for such an incident or occurrence can be attributed to the three reasons below:

#1. The Mobile OS is managed and manufactured by company X

#2. The smartphone company Y builds a wrapper on top of the core mobile OS

#3. The wrapper then uses Third Party add-ons to enable new keyboard features

In an Enterprise setting, the process involved in going mobile have the choice of “mobile OS” in front and center of the decision making process. So you may ask, what should I be looking at when I make this choice?

Some easy rule of thumb features a mobile OS should have included are:

System Security that prevents the lowest levels of software from being tampered and enables the OS to running only on validated mobile devices

Encryption and Security of bio-metric data that is enabled by the use of finger print scanners. The algorithms and storage there of on the hardware of the device v/s software, and how that data is used by the apps

The use of Hardware security features that work in tandem with the software built into the DMA [Direct Memory Access] path between the flash storage and the main memory for file encryption

Nifty and encrypted handling of Passwords, along with tools to generate unpredictable passwords.

Runtime process security, that makes sure one app doesn’t compromise data with other apps intentionally or un-intentionally.

And many more…

While the above list is not exhaustive, as an enterprise that would like to go mobile, and transform its important to understand the real “under the hood” implications of the mobile OS to empower your enterprise, and making the right choice can sometimes be simplified using the above criteria, to keep your Intellectual Property safe, and also your employees worry free.

Add Comment
No Comments

Leave a Reply

Your email address will not be published.Required fields are marked *

More Mobility Stories

The art of making secure mobile choices……

In the consumer driven economy the power of data and its impact on customer engagement is prevalently well known. What is lesser known, is its parallel universe of enterprise data security, where the loss of data plays into the Billions of Dollars, and is a CIO’s biggest obstacle. This could be a mobile device that […]

Continue reading

What is the “BEST” way to approach mobile in your enterprise?

Well am happy to report that there is in fact a BEST way to address your enterprise mobility needs. Its critical to understand that Enterprise Mobility can be as empowering and enjoyable as mobile for the end consumers like that of angry birds or even the mint app. The BEST approach basically entails getting back […]

Continue reading

5 reasons to attend a complimentary IBM Mobile Experience Workshop

5 reasons to attend a complimentary IBM Mobile Experience Workshop By Scott Geddes, Mobility Center of Excellence Leader With mobilized SAP apps, individuals can do things once thought impossible, make decisions in real-time at the point of activity with apps that provide that familiar Apple experience—without a time-consuming learning curve. But where should you start? […]

Continue reading