Enterprise Networking: Data Security in the BYOD Era: 10 Big Risks Facing Enterprises
The Box Syndrome
Adopting a BYOD initiative, by definition, leads to corporate data making its way onto a broad range of devices. Unless you provide a secure enterprise alternative that controls the documents themselves, users will often turn to consumer-grade file-sharing services that don't prevent documents from being forwarded to the wrong people. As recent security issues with Dropbox and legal issues with Megaupload have shown, the consumer cloud is no place for sensitive corporate documents. A recent Palo Alto Networks survey found that organizations on average handle traffic from 13 browser-based file-synchronization services.
Rogue and shadow IT have been problems for data and network security and compliance officers for a long time, but the rising number of bring-your-own-device (BYOD) proponents is threatening to become a much larger overall issue. Most organizations do not have the tools to ensure security of their data on just any device, especially when those devices will be by definition either partially or totally unmanaged. In addition, organizations are grappling with the challenges these pose for the enterprise network. Traditional security technologies that rely on endpoint security, configuration management, or establishing and controlling a network perimeter are ill-suited for a BYOD-friendly company, prompting CIOs to turn to more innovative, data-centric approaches as they come to terms with losing control of access to sensitive data. And make no mistake: 2012 is all about control of data. Our expert resource for this slideshow is Ryan Kalember, vice president of strategy at WatchDox, which enables organizations to access, share and control their documents on any tablet, smartphone or PCeven those beyond the IT department's control.