Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile
    • Networking
    • Storage

    The Box Syndrome

    By
    Chris Preimesberger
    -
    April 17, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1The Box Syndrome

      1

      Adopting a BYOD initiative, by definition, leads to corporate data making its way onto a broad range of devices. Unless you provide a secure enterprise alternative that controls the documents themselves, users will often turn to consumer-grade file-sharing services that don’t prevent documents from being forwarded to the wrong people. As recent security issues with Dropbox and legal issues with Megaupload have shown, the consumer cloud is no place for sensitive corporate documents. A recent Palo Alto Networks survey found that organizations on average handle traffic from 13 browser-based file-synchronization services.

      2Compliance With Security Regulations

      2

      BYOD initiatives have to be carefully managed to comply with an alphabet soup of regulations that pertain to how certain sensitive types of data are handled. Whether it’s a spreadsheet full of customer credit card information that makes its way to the Droid of a marketing employee (a payment card industry violation) or the corporate secretary sending confidential, unpublished financial results to a chief financial officer’s iPad in a consumer cloud storage service (a Sarbanes-Oxley Act issue), potential violations abound. If that data is sent or stored unencrypted and one of those devices goes missing, the problem is compounded.

      3Document Leakage

      3

      Supporting BYOD means acknowledging that corporate data will be transmitted to and stored by a device that IT cannot fully trust. If IT does not prescribe an alternative, it’s likely that users will find their own ways to access their documents and other data, often turning to personal email accounts and insecure file synchronization services. Once a document is on an unsecured device, it can easily be leaked to any external party, unless IT protects the documents with digital rights or other permissions to actively prevent leakage.

      4eDiscovery Issues

      4

      From a legal perspective, a variety of information types can be relevant for litigation. This electronically stored information (ESI) increasingly includes emails and documents stored on smartphones and tablets, which presents problems for both discovery and retention processes. If users are putting documents on those devices using consumer-type file-syncing applications, things become even more challenging.

      5Missing Devices

      5

      Large organizations lose dozens—or even hundreds—of mobile devices per year. Those devices may contain regulated information, such as electronic health records or customer information. For most companies that have customers throughout the world, breach notification laws will apply, unless that data is encrypted. For partially managed devices or “sandboxed” applications, organizations may be able to remotely destroy corporate data, unless they run afoul of a different issue: employee privacy.

      6Compliance With Privacy Regulations

      6

      IT departments often try to use traditional approaches like device management to support BYOD. In countries with strict privacy laws, such as the members of the European Union, enterprises are prohibited from remotely wiping smartphones and tablets that contain employees’ personal data along with corporate data.

      7Growing Device Management Burden

      7

      BYOD initiatives often lead to the adoption of mobile device management (MDM) or partial management technologies that establish an enterprise container on an otherwise unmanaged device. This approach means that IT becomes responsible for a large number of devices that it did not previously have to manage, extending already-stretched support teams.

      8Unmanageable Devices

      8

      The other side of the MDM/containerization coin is, of course, unmanageable devices. Not all containerization solutions work on all platforms, leading to issues when adopting “true” BYOD. For instance, many vendors support Android in a limited way or support only certain versions or form factors, which may not be available from all carriers.

      9Support Challenges

      9

      IT help desks are often ill-equipped to support end-user issues with smartphones and tablets, especially when running enterprise applications and handling corporate documents on those devices presents both usability and access issues. For organizations for which bring your own device means “bring your own Apple,” or BYOA, this burden may be eased, but for broader BYOD initiatives with support for Android and other platforms, the challenge is even bigger.

      10Policy Challenges

      10

      BYOD has taken off in a hurry, leaving most IT organizations struggling to find the right technologies to cope with the radical changes to compliance and security models that BYOD entails. In the rush, many organizations have not managed to update their policies to reflect BYOD issues, which may mean advising users of their new responsibilities and support limitations, as well as security and privacy measures.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×