Mobile Devices Reach For The Company Cloud

Mobile Devices Reach For The Company Cloud

When corporate professionals are asked how they conduct business/technology communication—connected by wire or connected by the cloud—most professionals indicate the company cloud and mobile devices are centric to their work efforts. This trend will grow geometrically in the coming years:

A new report from Juniper Research indicates the number of employee-owned smartphones and tablets used for business work will more than double in 2014 (reaching 350 million devices, compared to approximately 150 million this year).

From there, a core challenge in the cloud computing environment emerges: how can the IT department safely offer employees access to the enterprise-wide cloud by way of mobile devices? Smart phones, tablets, netbooks, and laptops enable convenient access cloud platforms—but unguarded connection to the enterprise cloud is a request for security issues in triplicate.

OUR ANALYSIS OF THE ISSUES

The IT department must address several Mobile Device Management (MDM) issues to securely offer company cloud access to end users. Examples of these issues include:

  • Users want the option of choosing and owning their own mobile devices.
  • They want to access apps for both personal and company-work use.
  • They want open access to company email, data systems, and collaborative portals.
  • All of this must be accomplished within the safe and guarded confines of firm security.

Best practices for secure, enterprise-wide cloud access have been identified:

  • DEVICES: Before enabling cloud access: both company-supplied and employee-owned devices should be vetted and registered with the IT department. Device serial numbers, service provider names, and connection identifiers must be recorded and kept up-to-date. (An alternative approach is to define a group of devices approved for enterprise-wide cloud access.)
  • SECURITY PROTOCOLS: Users should utilize mobile device security procedures. Approaches include password management, theft deterrence, lost device responses, and implementation app-management policies. As a specific example of security best practices: employees should be trained to consistently lock their devices with passwords. (This security practice is particularly important if devices are frequently left unused.)
  • APP MANAGEMENT: Apps should be whitelisted or blacklisted, and jail-broken devices (where the operating system has been modified) should not be authorized for company cloud access.
  • CORPORATE CONTROL OF DATA AND DEVICES: Processes and procedures to enable remote wiping of data and applications from cloud-enabled devices must be available. (These capabilities are vital to implement in cases such as employee termination or transfer to a competing organization.) To support end user convenience, procedures for app updates and security modifications should be enabled for automatic implementation.

SOLUTION DISCUSSION

Successful implementation of mobile device cloud computing requires a solution that addresses two axis of concern: the individual’s ease-of-use and the need for corporate-wide mobile device security. The reality is: employees will demand the capability to use their personal devices for access to enterprise-wide data and systems. The CIO has a crucial decision to make—how can the organization effectively address these mobile device security challenges?

Each of these issues will be best handled through implementation of an integrated system of mobile computing management utilities that include options for customization and scalability.

Citrix is a leading source for these technology solutions. Xenmobile and CloudGateway offer a single-source solution that enables end users and IT department leadership to address the challenges of cloud-based security in balanced and effective ways.

By John Benson

This post is brought to you by the Mobile Enterprise 360 Community and Citrix

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

One Response to Mobile Devices Reach For The Company Cloud

  1. All of the best practices that John lists to ensure device and data security are on target. To his list, I’d the importance of some non-technical considerations — i.e. the need to involve line-of-business managers & employees as well as the company’s legal department when mapping out a mobility strategy. If the solutions are too onerous from a usability perspective, or raise liability issues from a legal perspective, the best-laid IT plans can go to waste.
    Sadly, the majority of companies have yet to create mobility strategies of any kind, as discussed in the video at http://bit.ly/XoK9e9. The video interview discusses a recent survey of North American companies that indicated only 21% of the
    companies responding had a mobility strategy in place. The best practices listed in John’s article would be a good place for the other 79% to start.

    – Dwight Davis (http://bit.ly/VeacEJ)


CloudTweaks Sponsors - Find out more!


Popular

Top Viral Impact

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future of Work: What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at…

Big Data Analytics Adoption

Big Data Analytics Adoption

Big Data Analytics Adoption Big Data is an emerging phenomenon. Nowadays, many organizations have adopted information technology (IT) and information systems (IS) in business to handle huge amounts of data and gain better insights into their business. Many scholars believe that Business Intelligence (BI), solutions with Analytics capabilities, offer benefits to companies to achieve competitive…

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends For nearly every business, the concept of business intelligence is nothing new. Ambitious organizations have been searching for any type of data-driven advantage for some time now – perhaps for as long as they’ve existed. However, the historical use of competitive intelligence pales in comparison to the…


Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021
contact@cloudtweaks.com

Join our newsletter