Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • PM Modi in Manipur
  • Charlie Kirk killer
  • Sushila Karki
  • IND vs PAK
  • India-US ties
  • New human organ
  • Downton Abbey: The Grand Finale Movie Review
fp-logo
For BYOD, Data Security Precedes Device Security
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • For BYOD, Data Security Precedes Device Security

For BYOD, Data Security Precedes Device Security

FP Archives • February 3, 2017, 00:04:26 IST
Whatsapp Facebook Twitter

The device needs to be secured not for the sake of the device but for the information that is on the device, says Fran Rosch, VP & GM InfoSec, Symantec.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
For BYOD, Data Security Precedes Device Security

From security challenges on the BYOD front to some of the lesser known facets of online security, Fran Rosch, VP and GM of Information Security, Symantec throws light on the varied security needs. He shares that encrypting the data before it leaves the enterprise is advisable as controlling the data in the cloud might be almost impossible. Read on for more advice suggestions from him.
What is the biggest security challenge for enterprises on the BYOD front?

STORY CONTINUES BELOW THIS AD

One big mistake that enterprises make is that they try and secure the employee-owned devices as they would have when these devices, and subsequently the data on them, was within the enterprise. The challenge is to make these devices secure and yet user-friendly by segregating information. One has to realise that the device needs to be secured not for the sake of the device but for the information that is on the device.

More from Biztech
Future Group - Reliance Retail Deal approved by CCI Future Group - Reliance Retail Deal approved by CCI RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market

Another issue is that a lot of uneasiness is created for the user as he/she doesn’t want all the information they access, URLs, media, etc. to be reported back to the enterprise. That is why application-specific security fits the bill over device-specific security . This is something CIOs and CISOs need to realise immediately so that the BYOD initiative is not looked upon with uneasiness and suspicion, but with trust and acceptance.

What works best for securing devices when applications are running in the cloud?

The point of authenticating identity using a single gateway to access any cloud application is the best bet. At this point, the user has a single authentication and a single gateway which works from a productivity standpoint and allows the CIO to provision and control users from a singular spot. The CIO can then apply a number of controls to that gateway and data rather than have control over the entire device. Subsequently, technologies like data loss prevention can be leveraged. Data needs to be classified according to its importance and controls made effective accordingly. This can be combined with the identity information of the user and a sophisticated system to manage security outside the enterprise will be generated. Encrypting the data before it leaves the enterprise is advisable as we know controlling the data in the cloud might be almost impossible, but encryption can protect it to a large extent even if it falls into the wrong hands.
Considering the growth in e-commerce transactions, can companies really make their customers feel as comfortable as they would in a physical world?

The biggest concern there right now is security. Companies will focus on building an e-commerce trust for their website and brand which will ensure the customers that their information is being properly encrypted and will not be inappropriately accessed. This will be ingrained in the image of the brand and that’s important. When a customer walks into the store all is done to make him/her feel comfortable. The same thing needs to be applied online - how do you make the customer comfortable and feel secure to ensure that they can trust the site? People will give over their credit card in a physical shop but online it’s another matter. SSL certificates need to be sought and acquiring a seal of approval on the site lets the customer know that the e-commerce portal is safe for transactions.

STORY CONTINUES BELOW THIS AD

Besides having this for customers, it’s good for website hygiene to have the site scanned for threats every single day. If this is not done, the companies risk being blacklisted by the search engines that can devastate the trust factor for the brand. Doing a vulnerability scan should be on the agenda to figure out why and from where the website is vulnerable.

Any lesser known facets of online security?

Companies need to be aware of the fact that online advertising can create security concerns. Any website receives major funding from advertisements. These ads are distributed from ad providers and networks. Having malicious ads on the website or e-commerce portal can do serious reputational damage. The consumer goes to many websites within the time frame that he/she visits that particular website, and doesn’t even know how he/she got the malware. This makes detection a long process. This isn’t viewed as a top tier problem today but will gain attention once people realise that advertising has become a means to distribute malware. Not much research and development has been done on this because the problem hasn’t gone bad enough, but we’re tracking this phenomenon and have some products in beta to address it. Regular scans of ad tags (publishers that draw in the ad to the website) are recommended at the moment.

STORY CONTINUES BELOW THIS AD
Tags
mobile security data encryption BYOD InfoSec
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV