One of my favorite showsto watch is “Deadliest Warrior” on Spike TV. This show pits the world’s greatest warriors against one another in an epic 1 on 1 battle. Match-ups like Samurai vs. Viking, Attila The Hun vs. Alexander The Great and my favorite Spartan vs. Ninja were some of the top battles. Given the awesome concept I figured I could apply the same idea to BYOD security. So here’s the Deadliest Warrior – BYOD Edition.
Who will emerge as the victor?
(Typical TV commercial break)
- 80% of employees are using their own device for work-related activities.
- By 2017, nearly 1/2 of all employers will require employees to buy their own device
- 2 out of every 3 companies will have adopted a BYOD solution by 2017
As companies begin to get more comfortable adopting BYOD environments, they must also begin considering ways to protect their corporate data as well. But there is a bit of a balancing act that they must perform to keep both IT security and their employees smiling.
On one side you have the IT Security team. Their goal is to protect the company’s data from getting into the wrong hands. BYOD can come as a bit of a conundrum if they don’t have a solution in place that gives them both the visibility and control that they need to comply with HIPAA, Safeguard’s Rule and other major data protection regulations. No company wants to end up in the latest headlines reading something like “Bank Encounters Epic Breach Affecting 76 million Households” (Too soon?).
On the other side you have the employees. Employees want the flexibility that comes with BYOD, in being able to work whenever, wherever and however with the added privacy that they deserve. Most employees don’t want their company to have the ability to read all their messages, track where they are at any given moment, and to know that they just recently downloaded Tinder onto their smartphone (just kidding).
So let’s take a look at weapons that MDMs and CASBs have in their arsenals and see who would win this epic battle of BYOD security:
- Monitor data
- Track Data
- Remote wipe of ALL data
- Catch ALL information from employee device – corporate and personal
- Leaves employees feeling violated
- Monitor Data
- Track data via watermarking
- Remote wipe of only corporate data
- Can differentiate between corporate and personal data. Applies security policies only to corporate data
- Leaves employees smiling
Remember, IT security admin or not, you're still an employee at the end of the day. Which one sounds better to you?
Product Marketing Manager @Bitglass