The Lighter Side Of The Cloud – Education
The Lighter Side Of The Cloud – The Weatherman
The Lighter Side Of The Cloud –  Size Matters

Managing Mobile Devices Connecting To The Cloud

Managing Mobile Devices Connecting to the Cloud

As new innovations continue to fill the technology marketplace, a shift in how business and the IT consumer alike utilize technology is shaping the face of a more connected. We are becoming more streamlined in our day to day processes, thanks largely in part to the power of mobile computing. Computing technology available off the shelf is pound-for-pound, far more powerful and as such more sustainable, than ever before. Take into consideration the power of virtual computing and it would seem that the journey is just beginning.

Like a Lightning Bolt

Mobile devices are quite powerful. Take into consideration that most large enterprises haven’t done much in the way to overhaul the average workstation, many mobile gadgets rival and often surpass the power of these nearly legacy devices. This makes the beauty of the cloud all the more appealing. Existing workstations can use these services without breaking a sweat as can mobile devices with the appropriate applications, creating a dynamic working environment.

Of course, the most prevailing question that arises is, “What about security?” Across the board, this is always the biggest concern when new technology becomes adopted by a business.

Cloud computing, from a network infrastructure standpoint, can be a very secure solution to maintaining company information. When a workstation is accessing a cloud, whether a datacenter, application hosting service or a hybrid cloud, it should be done through a secured connection. Most companies should be using some form of connection based around TLS for these connections for the sake of security.

Doing it in the Office

Mobile applications will utilize the same techniques when accessing a cloud. However, there are addition concerns that arise with such implementation. A large majority of companies are in favor of allowing personal mobile devices in the workplace, which draw additional concerns. While these concerns are justified, there are techniques and practices that need to be observed when implementing these tools in the workplace.

As long as the cloud service is verifiably secure, the data and connection to the network will be secure. The device itself and the data flow between it and its destination are items that can still be compromised.

As such, there are procedures that should be followed by any business using mobile devices that connect to a cloud (or any network infrastructure):

  • Bluetooth is a great technology allowing wireless connections to devices for added functionality. While Bluetooth is helping to keep travelers safer, it can open expose potential security risks. Bluetooth can be like an opened window on an otherwise secure network. Turn Bluetooth off whenever stationary, just in case.
  • For companies that are adopting BYOD (Bring Your Own Device) an assessment of employees’ devices should be performed before connecting it to the network. This can circumvent heartbreak in the event the user is unaware device is on its last limb. Making sure that Androids are not rooted, iPhones and iPads are not jailbroken etc., are crucial to maintain security as hacked device can leave loopholes for information to potentially be siphoned from the device.
  • A data management program should be implemented. Sensitive company information can end up in unintended places when stored on an employee’s personal device. Just as an unattended phone can ruin a relationship after she reviews your text threads, attendants at a social gathering can accomplish the same feat in a similar situation. Ways to avoid such tragedies would be:
    • Always create the most secure password possible for the device.
    • Do not save sensitive information directly to the device – save this information on the company network.
    • Manage conversation logs. When having a business based SMS conversation, bits of information contained in texts could be a concern. Delete or archive these messages in a safe place on a regular basis.
    • Audit devices to make sure they meet compliance. Apps can be installed on the fly. Surprise inspections can help to ensure that an employee does not have an unapproved application that could compromise company data.

Cloud computing is going to continue to grow as more and more lend their success stories to public ears. Make sure there is a solid foundation for security practices and these technologies can take a business to new heights. A mobile workforce is a highly beneficial feature to any business so long as the foundation is well developed. Stay ahead of the curve by keeping an open mind to new solutions.

By Deney Dentel

Deney serves as CEO for Nordisk Systems, Inc. Nordisk Systems specializes in IBM Cloud computing services provider supplies the data center, computing infrastructure, and management of these assets. Nordisk Systems makes cloud computing easy. They can also offer their customers storage, server, desktop, and even network virtualization solutions. Nordisk has expertise in VMware, KVM, Xen, Hyper-V and especially PowerVM.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

3 Responses to Managing Mobile Devices Connecting To The Cloud

  1. Another important aspect of making sure sensitive company data doesn’t leak out from an employee’s mobile device via a cloud-based storage service is mobile DLP, such as that made by Symantec, the company I work for. In essence, Symantec Data Loss Prevention for Mobile allows IT departments to monitor and control the transmission of confidential data from mobile devices without restricting users’ access to applications.
     
    Spencer Parkinson
    Symantec

  2. At the enterprise level, more and more employees are using mobile devices to read email, access calendars, and access databases. Apps running on mobile devices can access back-end corporate software and data residing on the cloud. Security, Mobile application development and Mobile device management are important aspect for creating a mobile cloud environment. Identity management also needs to be extended to mobile devices.

  3.  @sarojkar  DLP is one good way to control such issues as pointed out by Spencer. However, having a solid information security policy eradicate most of the concerns for these remote devices. Another policy I saw at a firm was that mobile devices were only allowed to “READ” access to any cloud data and also doesn’t supported saving login credentials on mobile browsers with user session terminated if their is no activity after 60 seconds. 

Popular Archives

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

15 Emerging Technologies To Watch Before 2020 The cloud, big data, the internet of things, and wearable technology have all featured heavily in Forrester’s latest list of fifteen technologies to watch before 2020. It is becoming a reality for businesses that they need to adapt and change to an increasingly technologically-minded customer base. Traditional marketing…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

Five Reasons SMBs Fear The Cloud

Five Reasons SMBs Fear The Cloud

Five Reasons SMBs Fear the Cloud Fear of the cloud has been around since the Cloud began. SMBs were traditionally afraid of security issues, while large companies fretted about increasing the complexity of their IT infrastructure. What many budding start-up companies don’t realise is Cloud Computing helps place them on a level playing field with…

How The Cloud Is Changing Disaster Recovery

How The Cloud Is Changing Disaster Recovery

How the Cloud is Changing Disaster Recovery Anyone who is a regular reader of this site will know about the cloud’s numerous benefits. Using the cloud can provide businesses with cost-effective resource usage, rapid provisioning, easy scalability and flexible elasticity – benefits that simply don’t exist when using local on-site servers and services. One of…

Recent

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue The integral integration of cyber security and cloud technology seemed to be the hottest issue at the busy RSA 2015 Conference in San Francisco. Interested parties packed security and cloud service booths for the duration of the conference. Several prominent publications covered the increased importance of securing their private information that’s…

Imperfect Security: The RSA Conference And The Illusion Of Safety

Imperfect Security: The RSA Conference And The Illusion Of Safety

The RSA Conference And The Illusion Of Safety This year’s 2015 RSA Conference is taking place from April 20th to 24th, in San Francisco, California. Here, security leaders from across the vast expanse of tech, politics, and more will gather to discuss the past, present, and future of security. From application security to technology infrastructure,…

The Lighter Side Of The Cloud – Day 5

The Lighter Side Of The Cloud – Day 5

By David Fletcher Are you looking to supercharge your Newsletter, Powerpoint presentation, Social media campaign or Website? Our universally recognized tech related comics can help you. Contact us for information on our commercial licensing rates. About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information.…

Contact Us

Sending

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising