Quantcast
Channel: Enline plc » Data Security
Viewing all articles
Browse latest Browse all 6

V3 Security Summit – Questions raised following our Bring your own device (BYOD) debate

$
0
0

Following our very succesful panel debate with Richard Mardling of aurionPro SENA & Andy Bushby from Oracle on the topic of Bring your own device (BYOD) at yesterday’s V3 Security Summit, we would like to share with you some of the questions and answers which were raised after the debate.

The debate was recorded and is accessable for the next 3 months along with all the collateral on our stand, so please log on and watch it if you missed it yesterday.

Here are some of the questions & answers;

1. Is the solution browser based or client or sandboxed combination?
The solution can be browser or app (REST) based, the control is within the infrastructure, solution focussed on security rather than presentation

2. Can you remotely wipe the device?
There are remote wiping options, but this would need to be defined by Acceptable Use policies agreeing on what would be wiped. There are also options for locking access to the Corporate Network from a stolen or lost personal device, so you would not necessarily have to wipe the device. It is also important to control what information/data is allowed to travel to the device in the first place.

3. What factors should be considered when devising a BYOD policy?
The sensitivity and risk profile of the information, the culture of the organisation and its tolerance to loss or misuse of information, legal issues

4. How can an organisation control which devices are used to access corporate information?
A small app can be dropped onto the device which detects whether or not it is jailbroken – if the device is jailbroken the policy within the infrastructure can deny access.

5. Do administrators need to access every device if there is a BYOD policy in place?
No, not necessarily. You could use an enterprise app store to allow BYOD users or company issued devices to download and install your app

6. How can Oracle help an organisation mitigate risk associated with BYOD?
Oracle takes a complete ‘Defence in Depth’ approach with multiple layers of security. The Identity and Access Path can be secured based on a complete view of where/who/when/what users are accessing (using Oracle Adaptive Access Manager).

Our team were on hand all day yesterday and will be happy to answer any questions which you may have, or if you woudl like to arrange to meet to discuss your BYOD requirements please let us know.

Questions can be raised via the V3 Summit or you can send an email to info@aurionprosena.co.uk or please call our office direct on 0844 800 1985.


Viewing all articles
Browse latest Browse all 6

Latest Images

Trending Articles





Latest Images