Security: Security Defenses: 10 Ways To Circumvent Threats With a Sound BYOD Policy
As much as the bring-your-own-device-to-work trend pleases CIOs because it means they don't have to buy as many BlackBerrys, laptops and smartphones for employees as they used to, the thought of all those foreign devices inside the firewall terrorizes security managers. Does there need to be a custom security solution for every single device, every version of every device and every person in the company? How problematic might that become? Let's face it: A plethora of mobile devices exist and are brought into the workplace by employees who assume the right to use themwith or without IT's approval. There certainly are pros and cons on this topic. Like anything else, it starts with research, creating company policies and then enforcing them. This eWEEK slide show will help you start the whole process. Our resource for the slide show is Citrix Chief Security Strategist Kurt Roemer, who leads security, compliance, risk and privacy strategy efforts for Citrix products.
Design for Your Fears
Embrace, do not fear, rapidly evolving computing realities. The typical IT design for the cloud considers that the exceptions of yesterday's business world have become the assumptions of today's world. Personal productivity devices in the workplace, combined with the security threats and attack tactics associated with them, must be balanced with the business imperatives for agility, compliance and innovation. By designing for your fears, bring your own computing (BYO) and the cloud achieve the synergistic goal of optimizing productivity and security while empowering both workers and IT. One of the first fears to get over is consumerization.