Mobile Devices Reach For The Company Cloud

Mobile Devices Reach For The Company Cloud

When corporate professionals are asked how they conduct business/technology communication—connected by wire or connected by the cloud—most professionals indicate the company cloud and mobile devices are centric to their work efforts. This trend will grow geometrically in the coming years:

A new report from Juniper Research indicates the number of employee-owned smartphones and tablets used for business work will more than double in 2014 (reaching 350 million devices, compared to approximately 150 million this year).

From there, a core challenge in the cloud computing environment emerges: how can the IT department safely offer employees access to the enterprise-wide cloud by way of mobile devices? Smart phones, tablets, netbooks, and laptops enable convenient access cloud platforms—but unguarded connection to the enterprise cloud is a request for security issues in triplicate.

OUR ANALYSIS OF THE ISSUES

The IT department must address several Mobile Device Management (MDM) issues to securely offer company cloud access to end users. Examples of these issues include:

  • Users want the option of choosing and owning their own mobile devices.
  • They want to access apps for both personal and company-work use.
  • They want open access to company email, data systems, and collaborative portals.
  • All of this must be accomplished within the safe and guarded confines of firm security.

Best practices for secure, enterprise-wide cloud access have been identified:

  • DEVICES: Before enabling cloud access: both company-supplied and employee-owned devices should be vetted and registered with the IT department. Device serial numbers, service provider names, and connection identifiers must be recorded and kept up-to-date. (An alternative approach is to define a group of devices approved for enterprise-wide cloud access.)
  • SECURITY PROTOCOLS: Users should utilize mobile device security procedures. Approaches include password management, theft deterrence, lost device responses, and implementation app-management policies. As a specific example of security best practices: employees should be trained to consistently lock their devices with passwords. (This security practice is particularly important if devices are frequently left unused.)
  • APP MANAGEMENT: Apps should be whitelisted or blacklisted, and jail-broken devices (where the operating system has been modified) should not be authorized for company cloud access.
  • CORPORATE CONTROL OF DATA AND DEVICES: Processes and procedures to enable remote wiping of data and applications from cloud-enabled devices must be available. (These capabilities are vital to implement in cases such as employee termination or transfer to a competing organization.) To support end user convenience, procedures for app updates and security modifications should be enabled for automatic implementation.

SOLUTION DISCUSSION

Successful implementation of mobile device cloud computing requires a solution that addresses two axis of concern: the individual’s ease-of-use and the need for corporate-wide mobile device security. The reality is: employees will demand the capability to use their personal devices for access to enterprise-wide data and systems. The CIO has a crucial decision to make—how can the organization effectively address these mobile device security challenges?

Each of these issues will be best handled through implementation of an integrated system of mobile computing management utilities that include options for customization and scalability.

Citrix is a leading source for these technology solutions. Xenmobile and CloudGateway offer a single-source solution that enables end users and IT department leadership to address the challenges of cloud-based security in balanced and effective ways.

By John Benson

This post is brought to you by the Mobile Enterprise 360 Community and Citrix

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

One Response to Mobile Devices Reach For The Company Cloud

  1. All of the best practices that John lists to ensure device and data security are on target. To his list, I’d the importance of some non-technical considerations — i.e. the need to involve line-of-business managers & employees as well as the company’s legal department when mapping out a mobility strategy. If the solutions are too onerous from a usability perspective, or raise liability issues from a legal perspective, the best-laid IT plans can go to waste.
    Sadly, the majority of companies have yet to create mobility strategies of any kind, as discussed in the video at http://bit.ly/XoK9e9. The video interview discusses a recent survey of North American companies that indicated only 21% of the
    companies responding had a mobility strategy in place. The best practices listed in John’s article would be a good place for the other 79% to start.

    – Dwight Davis (http://bit.ly/VeacEJ)