BrandPost: Mobile Access: Get on the Right Road to Security

Mobility is a disruptive technology. It’s disrupting the old order (users accessing resources from one place, through one point of access) and replacing it with convenient anytime-anywhere access.

Yes, anywhere-anytime makes employees more productive and your business more agile. But there’s a dark side to disruption: the changing traditional perimeter around the organization, which creates risks ranging from infected apps to lost devices that fall into the wrong hands.

But there’s good news. You can take command of your mobile security by rethinking your mobile security strategy, particularly around identity. With the answers to just 5 questions, you’ll be better prepared to reap the benefits of mobility without compromising security.

1.      Do You Know Who Your Mobile Users Are?

Mobile users want convenient access anywhere, anytime, from any device. How do you know, though, that the person on a smartphone is the authorized user? After all, many organizations utilize only native password protection as a mobile security measure. And only about one-third proactively remove corporate data from mobile devices when users leave. Reduce your risk of compromised credentials with an authentication solution that uses anomaly detection, machine learning, and other capabilities to ensure users are who they say they are.

2.      Are You Making It Easy for Users to Work Securely?

The growth of consumer applications on mobile devices is resetting the bar for user expectations around convenient access. This creates pressure for organizations to implement consumer-based authentication methods such as push notifications and biometrics. After all, once you get used to Touch ID, the last thing you want to do is go back to memorizing a complex 30-digit password that changes every week.

Continue reading…