Enterprise Mobility: Bring your Own Balance (BYOB)
The Accommodation Balance
This is where the balance begins.. You stay out of the personal preferences of which device, only focusing on how it’s used. First is setting an understanding of what is allowed and prohibited when using personal devices. With all policies, these are more common-sense type items, but also include some basic security, like requiring a regularly expiring passcode to get into the device. This becomes the ‘price to play’ for the user. The next most important factor is a loss/stolen policy–who and how they report a missing device. Followed lastly by how personal devices can connect to the corporate network and which data is allowed.
We provide a public network with connection to the internet, which can be accessed by all the users with their personal devices
Let’s start with the network. Here at Dillon Gage Metals, we don’t allow non-domain devices to connect to our private network. As a result, we provide a public network with connection to the internet, which can be accessed by all the users with their personal devices. That way, they can continue to be productive with their mobile device without compromising network security.
The Data Loss Balance
Now for the data protocol. At times, devices get broken, lost, left on planes–so we must think about keeping the data secure. There are several approaches to consider, one of that is providing portals where no data is actually stored on the device. These portals require login credentials and serve up business data to the user. If the device is lost or stolen, no data breach occurs. The second approach, is ‘containerizing’ the data on the device. If data is retained, e-mail for example, several of the e-mail clients associate the data with the application, so that it is easily isolated from other data on the device. In this case, if the device is lost or stolen, a remote wipe can be done to remove that data only.
All of these factors were considered as Dillon Gage’s Digital Metals division moved forward with our FizMobile application. This includes how users access their accounts, how they make trades, what type of history they can review, and most importantly, what data is actually stored on the device. All-important architectural elements blended with ease of use and flexibility for our dealers. We didn’t stop there—we scan our applications every week against a constantly updated list of known vulnerabilities to ensure that what was safe yesterday on a device, continues to be safe today. The considerations we have for our own data in the BYOD world extended with the same rigorous thought into the applications we provide to our dealers.