With mobile access to the workplace, there is no denying their ability to improve and streamline the working procedures. Companies are using enterprise applications that are unique to its staff to take full advantage of the benefits that accompany the mobile business. But with the convenience provided by mobile devices are increasing threats. The greater the number of employees and contractors who are using mobile devices to access the systems and applications, enterprise data, the greater the importance of the protection of such access.

Hisham Al sarkhi, General Manager of Gemalto Middle East remarks on a number of important questions in this area

What mobile devices most commonly used in the workplace, and how is it used?
Support the proliferation of mobile devices in the workplace including policy (bring your own), and increased significantly on the experienced staff in the use of technology workforce that includes staff who prefer to communicate through smart phones and tablet computers and their laptops. This phenomenon is more and more mobile devices gives employees virtually unlimited by default access to information and to each other and to applications – anytime, anywhere and from any device-while you reduce costs and enhance employee productivity for employers. Whether a review and edit documents, spreadsheets and presentations in time for the employee, or to access enterprise applications and internal network from home or while traveling; staff uses mobile devices for a variety of reasons, and this trend is increasing. The market is expected to expand global policy (bring your own) from the current total of 72.33 billion dollars to $ 284.71 billion in 2019, according to the report by the year 2014 "Micro Market Monitor". At the same time, the market size is expected to reach the Middle East and Africa policy (bring your own) to SAR 38.03 billion dollars by 2019.

In an interesting shift, some institutions now mobile devices mixed strategies may include the issuance of equipment owned by the company and policies (bring your own) or allow employees to choose from a range of alternatives devices approved in advance.

What institutional applications developers, taking account, in terms of security when creating business applications?
While the mobile hardware solutions for companies enhance workflow, but it requires emphasis on security infrastructure for information technology – the contemporary corporate applications developers should consider when designing business applications: first, comfortable to use, and secondly, security. Should enhance the security of access to enterprise applications through the development of strong measures to verify identity for access only by users with the appropriate administrative privileges. But of course, it is also important to achieve the right balance between security and satisfaction when you use. For example, if security is too complex – no if the user takes 10 minutes to log in, users will either find an alternative to bypass security measures or would stop using the application simply. To ensure that the use of this method extensively and effectively, the balance between security and comfort is the main factor.

What is the best security practices for mobile devices for individuals-regardless of their use or not use their computers for work purposes?
Mobile devices are linked to many security threats: the threats associated with applications such as malware and threats associated with the Internet such as walahatiar and impersonation threats network, in addition to conventional physical threats, the device was stolen or lost. It is noteworthy that the malware is experiencing an unprecedented escalation in the Middle East has witnessed both Saudi Arabia and the U.A.E. State highest discoverer of malware in the area between 2013 and 2014. And may result in malicious attacks on mobile devices by hackers to identity theft or unauthorized access to confidential data or data modification or unwanted phone calls or service interruption.

When it comes to individuals, risk levels fluctuate depending on user behavior, ranging from best practices of identity verification procedures between using password or identification number, to install applications from trusted sources only or even stop services network of Wi-Fi and Bluetooth when not in use. There are also simple solutions: such as to update your system, so that whenever the software is upgraded whenever closed new weaknesses, add this to avoid sending personal information via SMS or e-mail and installing an application for mobile device.

In terms of work, significant security threats appear when users network and policy management instructions. Which leads to a number of security risks from the spread of malware and vulnerabilities that may be present on the device or the network servers to data leaks and security issues the end points. So there are users consolidate practice: network policy compliance and administration instructions. The sudden and significant inflation in the number of mobile devices in the workplace is challenging the traditional approach to actually preserve the ' four walls of security "around the company; it caused certainly break the closure policy outdated infrastructure security, where the individuals to be more vigilant as well.

When you adopt a policy (bring c

0 comments:

Post a Comment

 
Top