The Lighter Side Of The Cloud: Someday
The Lighter Side Of The Cloud – The Crash
The Lighter Side Of The Cloud – Cloud Storage

Mobile Devices Reach For The Company Cloud

Mobile Devices Reach For The Company Cloud

When corporate professionals are asked how they conduct business/technology communication—connected by wire or connected by the cloud—most professionals indicate the company cloud and mobile devices are centric to their work efforts. This trend will grow geometrically in the coming years:

A new report from Juniper Research indicates the number of employee-owned smartphones and tablets used for business work will more than double in 2014 (reaching 350 million devices, compared to approximately 150 million this year).

From there, a core challenge in the cloud computing environment emerges: how can the IT department safely offer employees access to the enterprise-wide cloud by way of mobile devices? Smart phones, tablets, netbooks, and laptops enable convenient access cloud platforms—but unguarded connection to the enterprise cloud is a request for security issues in triplicate.

OUR ANALYSIS OF THE ISSUES

The IT department must address several Mobile Device Management (MDM) issues to securely offer company cloud access to end users. Examples of these issues include:

  • Users want the option of choosing and owning their own mobile devices.
  • They want to access apps for both personal and company-work use.
  • They want open access to company email, data systems, and collaborative portals.
  • All of this must be accomplished within the safe and guarded confines of firm security.

Best practices for secure, enterprise-wide cloud access have been identified:

  • DEVICES: Before enabling cloud access: both company-supplied and employee-owned devices should be vetted and registered with the IT department. Device serial numbers, service provider names, and connection identifiers must be recorded and kept up-to-date. (An alternative approach is to define a group of devices approved for enterprise-wide cloud access.)
  • SECURITY PROTOCOLS: Users should utilize mobile device security procedures. Approaches include password management, theft deterrence, lost device responses, and implementation app-management policies. As a specific example of security best practices: employees should be trained to consistently lock their devices with passwords. (This security practice is particularly important if devices are frequently left unused.)
  • APP MANAGEMENT: Apps should be whitelisted or blacklisted, and jail-broken devices (where the operating system has been modified) should not be authorized for company cloud access.
  • CORPORATE CONTROL OF DATA AND DEVICES: Processes and procedures to enable remote wiping of data and applications from cloud-enabled devices must be available. (These capabilities are vital to implement in cases such as employee termination or transfer to a competing organization.) To support end user convenience, procedures for app updates and security modifications should be enabled for automatic implementation.

SOLUTION DISCUSSION

Successful implementation of mobile device cloud computing requires a solution that addresses two axis of concern: the individual’s ease-of-use and the need for corporate-wide mobile device security. The reality is: employees will demand the capability to use their personal devices for access to enterprise-wide data and systems. The CIO has a crucial decision to make—how can the organization effectively address these mobile device security challenges?

Each of these issues will be best handled through implementation of an integrated system of mobile computing management utilities that include options for customization and scalability.

Citrix is a leading source for these technology solutions. Xenmobile and CloudGateway offer a single-source solution that enables end users and IT department leadership to address the challenges of cloud-based security in balanced and effective ways.

By John Benson

This post is brought to you by the Mobile Enterprise 360 Community and Citrix

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

One Response to Mobile Devices Reach For The Company Cloud

  1. All of the best practices that John lists to ensure device and data security are on target. To his list, I’d the importance of some non-technical considerations — i.e. the need to involve line-of-business managers & employees as well as the company’s legal department when mapping out a mobility strategy. If the solutions are too onerous from a usability perspective, or raise liability issues from a legal perspective, the best-laid IT plans can go to waste.
    Sadly, the majority of companies have yet to create mobility strategies of any kind, as discussed in the video. The video interview discusses a recent survey of North American companies that indicated only 21% of the
    companies responding had a mobility strategy in place. The best practices listed in John’s article would be a good place for the other 79% to start.

    – Dwight Davis

Recent

Beyond Gaming: Three Practical Applications For Oculus Rift

Beyond Gaming: Three Practical Applications For Oculus Rift

Three Practical Applications For Oculus Rift  Since the announcement of the Oculus Rift in 2012 gamers and game developers alike have been frenzied trying to both get their hands on the unit or build their own proprietary VR machine. The VR gold rush has since lead to the announcement of Project Morpheus from Sony and…

The Lighter Side Of The Cloud – Due Diligence

The Lighter Side Of The Cloud – Due Diligence

By David Fletcher Please support our comics by sharing, licensing or visiting our cloud sponsors (Below). Your support goes a long way in allowing us to continue to produce our lighthearted comics each week.   About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information.…

Popular

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Cloud-Based VOIP – 4 Alternatives To Skype

Cloud-Based VOIP – 4 Alternatives To Skype

Cloud-Based VOIP – 4 Alternatives To Skype Skype is the most popular cloud-based VOIP service. Since being bought out by Microsoft for $8.5 billion in 2011 the company has grown to more than 300 million users and now accounts for 34% of all international calls. Some people don’t want to use Skype though. Reports of…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

Forrester Releases Its “15 Emerging Technologies To Watch Before 2020” Report

15 Emerging Technologies To Watch Before 2020 The cloud, big data, the internet of things, and wearable technology have all featured heavily in Forrester’s latest list of fifteen technologies to watch before 2020. It is becoming a reality for businesses that they need to adapt and change to an increasingly technologically-minded customer base. Traditional marketing…

Sponsored Posts

The Value of Hybrid Cloud

The Value of Hybrid Cloud

The Value of Hybrid Cloud As the “cloud” continues to exert its dominance as the IT technology of the day, the question for many companies focuses on what type of cloud to choose: public, private, or a combination of the two, known as hybrid. Each has its advantages. Private cloud – owned and maintained by…

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising