Enterprise mobility in Asia Pacific: Adaptive Security

Enterprise mobility in Asia Pacific: Adaptive Security

Enterprise mobility in Asia Pacific- Adaptive Security-1

Welcome to the fifth part of our journey towards enabling work-life balance through mobility. My name is Dave, and I’m here to help you on this journey. If you’re just joining us, we have previously discussed connectivity and convergence in Asia Pacific, the concepts Bring Your Own Device andChoose Your Own Device, and how Asia Pacific corporate networks are enabling this move towards mobility. Now, we delve into another dimension of our journey: adaptive security.

Enterprise mobility in Asia Pacific- Adaptive Security-2


While it has gone a long way towards enabling the freedom to choose your work settings and increase productivity, enterprise mobility also adds to the burden on today’s IT security professionals. The erosion of the traditional corporate perimeter, with a sudden flood of devices that are no longer directly managed and controlled by the enterprise holding access to corporate resources. With the business drivers loud and clear, technology and security professionals must now consider the security of information and data, as well as compliance, when mobility is brought into the mix.


Enterprise mobility in Asia Pacific- Adaptive Security-3

New data recently released in the Global Threat Intelligence Report that found the end-user has become the primary target for cybercriminals seeking access to corporate data. Modern workers have become increasingly accustomed to having real-time access to corporate data from their mobile devices, and as a result, they can often become the attacker’s primary point of entry into the organisation.

One of the possible reasons for this trend could be the significant gaps we’ve found in the ‘people, processes and policies’ elements of managing technology. Although some organisations have already introduced some form of governance, it’s not enough to adequately protect the organisation from today’s threats.  The questions around the support and management of these devices represent an IT headache. Fortunately, there are simple things an organisation can do to alleviate this headache:

Secure mobility must-haves

  • Secure remote access
  • Encryption
  • Data leakage protection
  • Remote wipe capability
  • Identity and access management
  • Policy management
  • Compliance reporting

Enterprise mobility in Asia Pacific- Adaptive Security-4

Education is perhaps one of the most vital elements towards achieving secure mobility. Taking the time to educate your users on potential risks pitfalls of this kind of access will go a long way towards circumventing threats. When used in conjunction with the above-mentioned secure mobility must-haves, your organisation can enable work freedom and keep the networks safe from criminals.

Note: This post originally appeared in The Mobile Worker Dimension Data blog.

Dave is one of the many next-generation mobile workers, and is on a journey to help achieve work-life freedom for his other peers.
Recommended Posts
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt