According to Gartner, this year over half of all enterprise employers will require employees to supply their own device for work purposes (BYOD). But BYOD will increase risks and security is the top concern for BYOD.
Infrastructure dependent ……….
Traditionally companies use corporate perimeters bounded by firewalls to secure their environment. With the consumerisation of IT, those borders don’t exist anymore. Apps have to be accessible to anyone at any time using any device. This means where there used to be a defined security perimeter, the border is now defined by the identity and access management process itself.
The move to the cloud is unstoppable, companies are looking to move faster than ever. The issue is that many large corporates and government entities aren’t using a single public cloud instance, often relying on a mix of on-premise, public cloud, hybrid cloud and private cloud scenarios. Companies like Microsoft with its Azure platform, and Amazon, with its AWS platform, are doing a good job with basic identity and access management but the fact is that that although they can control access to their applications, they can’t always control access to the applications a company may have hosted in, or connected to, the cloud.
If you have an on -premise ERP application, for example, a cloud ID service may not provide identity and access management for that application, while third party applications can. For the most part this is costly and only the large organisations, who can afford their own cloud infrastructure are able to adjust.
TOKN supports back-end integration, app management and app build toenable effective manage data transfer.
Effective Data Management
CIOs have less control over mobile devices used in their organisation, which ultimately means they are more vulnerable to attacks. Using their own devices employees are downloading mobile apps and connecting to external Wi-Fi spots without always having the correct security protocols in place. According to a study conducted by HP, 97% of employee’s devices contained privacy issues, and 75% lacked adequate data encryption. This creates serious security concerns that can be exploited by hackers. This, coupled with the fact that your employees might not have anti-virus protection or have an up to date firewall present on their mobile devices, means they are more vulnerable to attacks.
To prevent viruses spreading it is important that there is a gatekeeper. TOKN’s Connect service performs this function by verifying that the data being transferred from the mobile device to your IT network is encrypted and permitted.
Separate work from play
One of the most obvious BYOD security challenges is coping with the storage of work and personal data on the same device. Ultimately there are going to be certain types of corporate data that will be transferred to the organisation and stored locally on the device, so consideration needs to be given to the topic of securing this data.
One of the biggest threats to mobile devices is malware that is installed unknowingly by the user, meaning malware could find its way onto the network.
TOKN's secure client provides a secure delineation between work and play on the device
The biggest risk in this area that IT departments fear is when employee’s devices are lost or stolen, or even who has what device and what app……According to an article in IT business edge, over half of security breaches occur when devices are stolen, it is therefore vital that companies are implementing encryption tactics to ensure that the device is secure against threats. A simple but effective way to ensure that employees secure their device is by prompting them to use even basic security protocols like using a device pin code.
Furthermore Employees who don’t keep their devices up to date are at further risk of being targeted by hackers. This includes mobile operating systems as well as install the apps
TOKN device control service includes the enforcement of IT security protocols like pin codes, and remote wiping capabilities so that IT Managers have the power to wipe the device as soon as possible without having to ask for the user’s permission.
Contact us to hear more about TOKN’s Digital Enterprise Mobility products and services
As Malcom Turnbull declares doubts about the commercially viability of the NBN, many others claim high speed mobile networks to be the answer. And while many call for protection from high speed mobile networks bringing massive downloads speeds, others profess the consistency of fixed line to deliver a superior service over mobile while highlighting the potential health affects of 5G.
But where does this leave your business?
To answer this question, we need to look at this more closely, without all the hype, and we need to make a careful distinction between connectivity and functionality.
To understand the impact high speed mobile networks like 5G may have, all we have to do is look back at 4G. Many of the functions now available on the smart phone would have be unthinkable without 4G speeds and volume. Things like Voice Over the Internet VOIP and interactive map reading have all became mainstream. Looking ahead to 5G, the biggest impact is said to be the reduction in latency, from an estimated 60 milliseconds to 1 millisecond. Think of this in the context of IoT, connected devices and machine learning. What if driver-less cars could anticipate a crash, engaging the collision avoidance mechanism 60 times as fast.
So the world is changing and these high speed mobile networks will deliver new functionality, increasing reactions and responsiveness of just about anything.
But will your business be able to leverage the benefit of this enhanced platform?
Lets not forget that Ultra-high reliable communication and improved capacity are some of the major requirements of the 5th generation (5G) mobile and wireless networks. Achieving this means avoiding radio link failures and the service interruptions that occurs during the failures and their re-establishment. 5G millimetre waves can transfer heaps of data at very high speeds, but they don't travel as far as the lower-frequency waves used in 4G networks. High-frequency millimetre waves also have difficulty getting around walls, buildings, and other obstacles. When the 5G networks are built, the carriers will have to use more antennas, way more, to get the same coverage as our current networks.
This means carriers have to upgrade and roll out their massive infrastructures fist……… Secondly 5G brings with it new antennas, new devices, and new applications to fully support categories like driverless cars, virtual reality and connected drones.
So where does this leave you……….
Firstly you may for the foreseeable future need to deal with patchy network coverage. Finding a mobility solution that supports uninterrupted working is still a must for most businesses especially those operating in remote regions. This will ensure a smooth transition between areas of coverage and no coverage and will keep your workforce productive during outages. This is easier said than done. An app alone cannot deliver uninterrupted work, and an app alone is not future proof.
Native application build will get you someway there in terms of the app working offline, but for it to be meaningful to your business, its data that you need when you need it, and finding a solution that can manage that is not always straight forward. Secondly whatever solution you invest in needs to be future proof. Having the capability to quickly build and change new applications that will run on new devices, device firmware, operating system versions is a must. By controlling these aspects of mobility, your business will not only have access to the enterprise data it needs when required, but also the flexibility to keep those apps future proof.
Clinton Schroeder October 2017 TOKN
I am still constantly amazed at the number of companies I meet, where the device has lost the battle to software.
In an age where data collection , consolidation and visualisation is happening faster than John Napiers’ exponential equations could have predicted it would, CIO’s are fixed on the software, the software who sells it, what it does, who else uses it ………..rather than does it or will it work for me and my people. Now I’m not saying that these are unimportant questions to have answered, but in a world where we have over 24 000 different smart android devices alone, which is set to explode as we enter an age of digital devices and applications, we need to consider the whole picture, and we cannot be slave to the software anymore.
UI/ UX discussions, wireframes and workshops all rage and buzz words of the day , are becoming an increasingly dominant part of the modern technology /IT function and rightly so . A new career choice and the of the software solutions journey of discovery, we must have a UX/UI design , team and strategy ….. but have we missed something ? Are we simply following the sheep in front, marching to yet another the Software vendors marketing script.
“I invented the term because I thought human interface and usability were too narrow. I wanted to cover all aspects of the person's experience with the system including industrial design graphics, the interface, the physical interaction and the manual. Since then the term has spread widely, so much so that it is starting to lose its meaning” — Donald Norman
To truly critically evaluate and the user experience, we have to ask and answer some difficult questions. Some of those might isolate us from the crowd and make people feel uncomfortable. Some might even make your boss uncomfortable. Lets face it not many of us enjoy doing that , for some else’s user experience ……… But yet if we don’t, we simply can’t create the kind of stepchange and innovation required to make a difference. We need to critically examine and evaluate all element of the experience.
“Ah…. We cant use that device as the software wont run on it……….” Really?
Don’t you love seeing the little icons on the vendors web site PC, Tablet , smart phone , along with the words “ Any device “ next to it .What you find out when you dig a little deeper is that the software will run on a PC, Tablet and smart phone……. as long as its from a particular vendor and runs a specific operating systems and firmware. As we move from an age where the “provisioned device” ceases to exit due to cost, complexity, scalability and plain preference reasons, the demand for agnostic software solutions becomes critical.
The future …. Connected devices wont have time to wait for software vendors to remove barriers. Digital applications will transcend the debate around whether it should be native and web based, and they will just be.
The race between who can connect to what has begun, and will require tools and methods that are unconstrained by vendor/software paradigms. I'm not saying ” build it yourself " , far from it . But what I am saying is that we need to be more aware the problem we are trying to solve and even more critical of the tools we select to help solve them.
Clinton Schroeder August 2017