How to Balance Usability and Data Protection in the BYOD Era (1779110)

0 Likes
over 2 years ago


Priority one for corporate IT: protect company data across devices and networks. Unfortunately, this conflicts with your users’ top priority: completing tasks and using those resources as needed. Today, the “bring your own device” (BYOD) movement has increased the number of devices and locations.

Current mobile device management (MDM) solutions offer control at the expense of usability. They feel intrusive and conflict with the nature of BYOD.

With ZENworks Mobile Workspace, administrators can balance usability and data protection without the frustration. Here’s a rundown of how it works.

Mobile Application Management with ZENworks


ZENworks acts as a unique and independent security mechanism for accessing sensitive corporate data from a user’s device. It’s a policy-based approach with restrictions that could include:

  • Passcodes (which can expire after a time limit has passed)

  • Remote data wipe

  • Disabling voice commands

  • Restricting camera use

  • Blocking access to sites like YouTube and social media

  • Preventing copy/paste actions (such as email contacts or sensitive data)


With ZENworks, the user’s work is done inside an encrypted container, fortifying access to corporate email, contacts, applications, calendars, documents, and other forms of media. It’s compatible with Office 365, Exchange, GroupWiseRegistered, and Lotus Note. ZENworks is designed for usability first. Task management and push notifications keep the user focused, while work is done through a secure browser with data protection as its primary mission. Should the user need resources, ZENworks ensures secure access using SharePoint, CMIS, or CIFS.

Use Cases


Here are a few common use cases that demonstrate how ZENworks navigates the conflict between security and usability.

Scenario: Using a Personal Device with Corporate Access in the Car


During a drive, the user decides to switch songs she is listening to, but her current MDM policies have disabled voice commands and she must enter her passcode. This simple task has become annoying and potentially dangerous since she must take her eyes off the road to find the song.

She decides to stop (either at a light or designated area) and enter her passcode, but this presents another problem. Her MDM policies dictate she uses a more complex 6-8 character password for security purposes.

ZENworks bypasses these frustrations with a containerized approach. Users only need to work with these security features when accessing the corporate network.

Scenario: Losing Pictures Due to Security Policies


On a trip through Europe, an employee uses his phone to document his experiences. But he can’t log into the device after a few days. Rain damage has made fingerprinting impossible for the time, and he has failed his passcode check multiple times.

It’s on his final attempt that he recalls his device has an MDM policy enforcing an 8-digit passcode, as well as a remote wipe of the device after a number of failed login attempts. The user has just lost the entire trip in a failed passcode attempt.

ZENworks allows administrators to remotely wipe only the contents of a secure container. In this scenario, a failed attempt would trigger only the data within ZENworks to wipe and the user would continue to attempt access to the device under normal security policies he or she may have set.

Scenario: Controlling VPN Chaos


A common scenario we’ve all faced is getting a work email off-hours. We might be watching a movie or browsing social media, but we have to stop and access corporate data to respond. A simple task, but first the user must remember the VPN exists and is required to access this data. The user also has to close the VPN connection at the end of the session.

If he or she fails to do so, whatever off-hours traffic the user is generating is routed through the corporate VPN. This traffic is potentially violating local regulations on monitoring and could increase costs and strain on the network.

With ZENworks Mobile Workspace, a secure browser with its own gateway allows for fine-grain policies that begin and end with the user’s current session.

Scenario: Secure Photo Storage


Corporate meetings commonly conclude with a snapshot of the whiteboard. Employees use these pictures to remember tasks and stay focused later. They may also help recall “minutes” or the core agenda for the next meeting. What if this information is confidential?

ZENworks secure camera creates a photo storage environment for this sensitive media that is separate from the user’s personal device. On theft or loss, the container creates an added layer of security that can be remotely wiped.

Simplify and Strengthen Your Approach to Mobile Security


IT administration shouldn’t conflict with usability. It’s essential in the BYOD era to close these security loopholes without impacting the user experience. With ZENworks, that dream becomes reality. Read about these scenarios and the benefits of ZENworks here.

Thanks for reading!

Labels:

How To-Best Practice
Comment List
Anonymous
Related Discussions
Recommended