Dubai PR Network, Online Press Release from Dubai and Middle East
Mobile Device & Consumer Electronic(Technology)
Filter PR by
AccessData Advises ‘Keeping Eyes on the Enterprise' for Mitigating BYOD Risk in the Middle East

DUBAI, United Arab Emirates, 19th May, 2013: The prevailing movement that is becoming popular in the Middle East, labelled ‘Consumerization of IT' or Bring Your Own Device (BYOD), will continue to shift the way employees interact with enterprise applications and information, which raises considerable security challenges to any organization. These devices may include an array of tablets, including Apple® and Android™ smartphones, “Wintel” laptops, and devices we have yet to see. For some organizations, such as universities, the array of user devices may be unlimited, and therefore their grasp on securing data may be tenuous for quite some time. Other organizations will be in a better position to leverage policy to control the acceptable devices allowed and to ensure they have the ability to investigate these devices as needed.

Paul Wright, manager of professional services and investigation team, Middle East, India and Africa at AccessData says that employee productivity and flexibility, reduced operational costs, ease of employee provisioning, and organizational agility ensure that BYOD is here to stay. However, to make BYOD viable, organizations rely on two key ingredients: authentication and policy. Authentication ensures that the right individuals and devices are allowed access to the appropriate resources. Policy ideally defines what is allowed from a usage perspective, establishes the organization's right to investigate employee-owned work devices, and outlines any security applications that are required to be installed on the employee devices.

Much of the industry conversation revolves around an organization's ability to monitor and examine employee-owned devices. Due to legal questions and privacy requirements, many organizations still do not have BYOD policies, as described above. However, whether an organization has successfully implemented a concrete policy or not, the fact is the most critical elements in securing your enterprise against BYOD threats is enterprise visibility and remote remediation capabilities. If you can't see what's happening on the computers, servers and shares across your enterprise, as well as within network communications, you can't effectively defend yourself against any threat, let alone those originating from employee-owned devices.

BYOD programs increase risk and compound the challenges organizations struggle with every day. Unfortunately, many of the threats that increase with the introduction of a BYOD program are often not preventable.

Theft or Loss of Sensitive Data
How do you prevent personally identifiable information from being copied onto uncontrolled devices? What stops a user from utilizing their phone camera to snap an image of sensitive content?

Breaches of Acceptable Use Policy
Can users of BYOD devices access internet sites that violate acceptable use policies designed to limit risk? For example, BYOD users may be more likely than corporate users to fall victim to a phishing attack, resulting from a visit to a malicious website.

Introducing employee-owned devices to the enterprise exponentially increases the opportunities for malware exploits. Many of these exploits are new and undefined, which means they are not caught by traditional, signature-based tools. So how do we increase our ability to detect?

Malware, in particular, is a growing concern, as the exploits targeting BYOD are increasing in frequency. It was discovered that “Find and Call” was actually a dangerous address book harvester, freely available on the protected Apple App Store. Then there's the Android “Marketplace,” based on the Google open source operating system, which more or less invites malware development. Furthermore, BYOD includes windows-based computers not owned and controlled by the enterprise but used by the employee primarily for work. Can we rely on users to update their anti-virus, anti-malware and patch levels? Hardly.

While the ability to forensically examine, monitor and remotely secure BYOD devices is critical, the most effective approach to addressing the increased risk presented by the BYOD trend is to keep eyes on the enterprise. Proactive host and network monitoring, and integrated analysis of that data allows organizations to detect and remediate data leakage and malware, even when its missed by IDS, DLP and other traditional preventative tools.

Inside the enterprise, proactive steps that look for policy violations, vulnerabilities and irregularities should include:

•Regularly scheduled audits of servers and computers across the enterprise to identify confidential or classified data.

•Enterprise scans to identify malicious code that antivirus and IDS may have missed.

•Network traffic capture and forensic analysis.

Depending on the BYOD model, organizations may implement a mobility management solution that focuses on applications, information, policy, devices, and so on. However, despite the approach to handling BYOD devices, there remains a real need to ensure that employees are complying with BYOD policies, that there is protection against data leakage, that inappropriate or inadvertent network access is not happening, and that corporate assets remain free of malware. This is not possible without complete and proactive enterprise visibility.

Posted by : Dubai PR Network Editorial Team
Viewed 6521 times
PR Category : Technology
Posted on : Sunday, May 19, 2013  5:56:00 PM UAE local time (GMT+4)
Replication or redistribution in whole or in part is expressly prohibited without the prior written consent of
Next Story : Givori Luxury Phones Teams Up With Damas Jewellery and Launc...
Email this article Print this article

Share this article with your friends and followers
Back to Section Home

Related Stories

Most Viewed Press Release posted in the last 7 days
Versus Versace Republique - VSP1V0519 [4293-Views]
Make Up for Ever is Breaking Through With a Lipstick Revolution With Rouge Artist [3587-Views]
Huawei is Set to Dramatically Alter the Entry Level Smartphone Segment with the Launch of ... [2919-Views]
How to Work the Hottest Fall Makeup Trends on a Budget [2821-Views]
Dubai Chamber Whitepaper Examines Growth Potential of UAE Space Economy [2800-Views]
Prevention is Better than Cure, Especially with Lice! [2579-Views]
Euronews Investigates How the UAE is Using Artificial Intelligence in Healthcare and Educa... [2571-Views]
That Hair Tho – THT Offers Complimentary Haircuts for Those Who Have Lost Jobs, Have Job I... [2546-Views]
Medcare Partners with InterSystems to Implement World-Class Healthcare Information System [2526-Views]
ADNOC Distribution Joins Key UAE Suppliers Qualified to Provide Nuclear Quality Products f... [2501-Views]
Free Me – The First Naturally Kind Mosquito Repellent Made in the UAE [2480-Views]
Dabur Herb'l Launches Natural Gel Toothpaste With the Freshness of Aloe Vera [2440-Views]
Unlocking the Potential of eSIM for Consumers [2431-Views]
Ulissi to Lead UAE Team Emirates at the Tour of Luxembourg [2349-Views]
Parmigiani Fleurier Launches New Tonda Reine De Mai [2312-Views]
A Springfield Dress a Day, Keeps Your Style A-Okay [2222-Views]
#TishTashThru - Welcome to the Future, in the Form of a Gloriously Retro Drive Thru Event ... [2218-Views]
Autumn/Winter 20' Beauty Picks from Missha Cosmetics [2194-Views]
Majid Al Futtaim Inaugurates its First Culinary Experience Destination in the UAE — Food C... [2189-Views]
Aquae Jewels Shares the Top Jewellery Trends for Fall [2112-Views]
HyperX Releases First Arabic Layout Keyboard, Alloy Origins Core Tenkeyless RGB Mechanical... [2107-Views]
Costa Coffee UAE Thanks its Customers with One Dirham Pastries [2009-Views]
NYU Abu Dhabi Alumnus Awarded Prestigious Chevening Scholarship [1906-Views]
OPPO Set to Launch Its All-New Groundbreaking Reno4 Series in the Middle East this Month [1890-Views]
WCU: Saudis Talk Up Oil; Strong Grain Momentum Continues [1890-Views]
RSS Facebook Twitter LinkedDin
Top Sections
Top Stories