Wednesday May 22, 2013

BYOD – What’s Your Policy?

Identity Management Product Marketing Team Blog


BYOD (Bring Your Own Device) is the new workplace trend. With the new anytime-anywhere work culture, organizations are fast adopting BYOD to attract fresh talent; professionals that believe that having the same device for business and personal use allows for greater efficiency and agility.

BYOD has proven to be a boon for most units within the organization: HR – they can attract progressive talent, managers – their employees can now work just as effectively when remote and the CFO – the cost of new laptops, et al is significantly cut down. However, the office of the CIO and the IT security team are now dealing with additional security challenges. Risks come from an external device accessing your enterprise data. An unsecured device, unauthorized access on a secure device, network breaches – any combination of these can put your enterprise data at risk. And with that come the compliance challenges. How do you provide assurance that only the right users have access to the data, and only the data they need – no more, no less? And when you look at the different device, operating system, users permutations, you quickly realize that the scale and complexity of the security challenge that BYOD poses is way beyond what we have dealt with in the past.

Appreciating the mobile security challenge and the risk posed to business applications, SANS Institute recently conducted a survey of over 600 organizations to understand the current state of BYOD framework and mobile security policies that organizations have started to put in place. The objective was to hone in on key elements that enterprises should consider to manage their security and compliance program.

Download the SANS survey report, complete with findings and recommendations and hear first hand from SANS legal technology expert, Ben Wright, about the common legal, privacy and ownership issues that arise when considering policy for BYOD and learn how you can offer audit insight to conform to your regulatory and other compliance mandates. Catch the webcast and learn about the latest advances in Oracle Identity Management that enable secure, seamless mobile interoperability.

We hope that the survey results along with the nuggets shared in the webcast will allow you to benchmark your BYOD/mobile security strategy and adopt best practices to meet your legal, consumer and compliance requirements.

Engage with Us

About

Get the latest on all things Middleware. Join Oracle's Middleware Community today.

Find Us on facebook Follow us on twitter Catch Us on YouTube 

Search

Categories
Archives
« May 2013 »
SunMonTueWedThuFriSat
   
3
4
5
7
10
11
12
14
17
18
19
21
24
25
26
28
31
 
       
Today