Feature Article

September 24, 2012

Cloud Security Alliance Points to 17 Key Elements for Mobile BYOD Security Management

The addition of each new device into your organization’s network is a potential threat that could disable many different functions. As more companies are implementing BYOD policies, security measures have to be in place to guarantee the safety of the organization’s data.

 The Cloud Security Alliance (CSA) report, Mobile Device Management: Key components V 1.0, points out 17 key elements for mobile BYOD security management. The report sites the importance of implementing systems with functionality to secure and manage data applications and the storage and delivery of information.


Image via Shutterstock

The components identified by the study are:

  •  Policy
  • Risk Management
  •  Device Diversity/Degree of Freedom
  •  Configuration Management
  •  Software Distribution
  •  Enterprise AppStore
  • Content Library
  •  Procurement
  •  Provisioning
  •  Device Policy Compliance and Enforcement
  •  Enterprise Activation/Deactivation
  •  Enterprise Asset Disposition
  •  Process Automation
  •  User Activity Logging/Workplace Monitoring
  •  Security Settings
  •  Selective Wipe/Remote Wipe/Lock
  •  Identity Management/Authentication/Encryption

The study is one of a six part report entitled “Security Guidance for Critical Areas of Mobile Computing.” CSA is a not-for-profit organization that promotes cloud computing best practices and security measures led by a coalition of experts and organizations in the field.

 “As mobile devices have become mainstays in the enterprise, an understanding of the full technology, process, and people implications of MDM will be absolutely required to ensure that the introduction of mobile devices will not compromise security. While most companies already have security policies in place, those policies need to be reviewed and possibly updated to account for the many components of mobile technology that we have identified in this report,” said J.R. Santos, Global Research Director of the CSA.

The increasing power and ability of mobile devices means they can be used to perform many functions previously reserved for laptops or desktops. Integrating these devices to an organizations network can make employees more efficient and save a substantial amount of money in hardware acquisitions.

The goal of MDM is to have an identity management process where everyone with the right access will be able to use their device for enterprise applications and content with just a single sign-on. The key elements outlined in this report go a long ways in helping organizations move forward in what most experts feel is the future of work place technology.

As more organizations start adopting cloud computing employees will be able to access their work and related material from the organization using their mobile devices at anytime. The integration of both technologies requires secure protocols with authentication to eliminate threats, protect the privacy of the users and the network of the organization.

Want to learn more about today’s powerful mobile Internet ecosystem? Don't miss the Mobility Tech Conference & Expo, collocated with ITEXPO West 2012 taking place Oct. 2-5 2012, in Austin, TX.  Stay in touch with everything happening at Mobility Tech Conference & Expo. Follow us on Twitter.




Edited by Brooke Neuman


FOLLOW MobilityTechzone

Subscribe to MobilityTechzone eNews

MobilityTechzone eNews delivers the latest news impacting technology in the Wireless industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter