Network vs. Device Security

Which is more important in a collaborative environment?

As virtual offices and remote workforces become the norm, so does the need for a secure mobile collaborative environment. Employees want to be able to work and share information whenever and wherever, and enterprises want to reap the productivity benefits that mobile delivers. However, supporting today’s mobile workforce doesn’t come without a few challenges. Businesses need to balance their employees’ desire for bring your own device (BYOD) and bring your own apps (BYOA) with their IT department’s mandate to maintain control and keep sensitive corporate data secure.

Without proper policy and tools in place, employees will ultimately create their own solutions or “workarounds” by default. This unwittingly puts the enterprise at risk for myriad security threats, including data leakage, non-compliance, version conflicts and former employees who depart with sensitive corporate information.

While mobile workforces can potentially be disruptive to the enterprise, they don’t always have to be. By implementing a proper mobile collaboration and BYO policy, both the IT department and mobile workers can be kept happy—while increasing overall productivity and efficiency at the same time. But where should you begin? Do you focus on securing the network itself, or the mobile devices? Or neither?

Network Security

Most organizations provide access to corporate data and applications through virtual private networking (VPN) software and services. Unfortunately, however, road warrior employees often find that VPN services are not available in every location—especially when traveling abroad. And when they are available, connections can often be slow and intermittent. In addition, VPNs can provide access to too much of the corporate network, making it harder for IT to truly enforce security policies.

VPNs pose challenges locally, as well. When used with unprotected mobile and home devices, VPNs can serve as an easy entry point for malware and hackers into the corporate network. SSL VPNs offer ways to restrict mobile data access, but that access has to be Web-enabled. The split tunneling features of today’s VPN solutions separate employee Web surfing from LAN access but also provide a convenient pathway for Internet malware and hackers to enter directly into the corporate LAN. The more sophisticated hackers siphon off corporate data for profits, and the less sophisticated simply wreak havoc on the network and add to unnecessary restoration costs for the organization.

Policy-based network access to certain types of corporate data is another mechanism, but this option would be hard-pressed to provide secure access directly to all native corporate repositories, including those of Microsoft SharePoint. While network security is still a necessary part of a successful, secure enterprise, certain measures can interfere with employees’ mobility, and, thus, productivity, which can make device security seemingly more attractive.

Device Security

Let’s look at devices. Essentially, pass codes and remote wipe capabilities are helpful and can be used as a deterrent when a device is lost or stolen. However, neither is sufficient to completely secure corporate data. Passwords can be figured out, and even the most secure mobile devices can be rooted or hacked, and often by the time an IT administrator is notified of a lost or missing device, the data has been acquired or leaked and it’s too late for a corporate wipe.

Stolen devices can end up costing enterprises a lot more than they might expect, as highlighted earlier this year in an infographic published by the technology accessories company Kensington. The research also pointed out some other frightening facts:

  • 70 million smartphones are lost each year—only 7 percent are recovered
  • 50 percent of all mobile device users keep passwords, personal information and credit card info on their device
  • 36 percent of tablets contain confidential work-related information
  • Devices are most often stolen at the office (52 percent) or at a conference (24 percent)
  • One laptop is stolen every 53 seconds

And then there are apps. According to a recent report from Appthority, 96 percent of iOS apps and 84 percent of Android apps have some ability to access sensitive information on mobile devices. That access is most often supplied to gaming apps, but very often business apps such as those used in healthcare and finance also have visibility into that information.

So, if network security is causing headaches for mobile workers and employees and standard mobile device security measures simply aren’t enough to calm IT’s nerves, what is the most important security aspect in providing efficient, cost-effective and safe collaboration? It is data security.

Data Security

“We’ve always believed that ultimately security and compliance boils down to being able to control the data,” said John Herema III, senior vice president of corporate strategy at Good Technology.

Achieving mobile worker productivity with no compromises to the data is the key—but how? The challenge is to find a way to provide users within the enterprise file sharing tools that provide the mobility, flexibility and easy collaboration they demand, while also providing the enterprise security, governance and controls that any organization requires to protect its sensitive and valuable data. Maintaining data ownership, security and governance is the most important criteria for enterprises in allowing BYO and mobile collaboration.

According to a recent report conducted by the Ponemon Institute, the average cost in 2011 of recovering from a single corporate data breach was $5.5 million. Enterprises simply can’t afford to have their data and, subsequently, their reputation compromised.

Based on my experience working with companies around the country, I think there are three key areas a business needs to review about its data before embarking on a productivity project with a secure enterprise collaboration solution for mobile smartphones and tablets.

  1. Data Ownership: Where is your data? With BYOD and BYOC (consumerbased cloud solutions) for document sharing, your corporate data stays with the account owner. So how do you make a separation of personal and corporate data? Do you want your data copied in the cloud? In the DMZ? Do you want any extra copies?
  2. Data Security: Protecting the corporate data has always been a top priority. For the mobile enterprise, it is even more so. What about lost or stolen devices? Will you be able to use the same protection mechanisms as you have been using with your corporate-issued laptops? Is VPN access an option—do you want to open your network to accessing any app? Do you want to run the risk of introducing malware into the network?
  3. Data Governance: How do you get control and visibility so that you can ensure there are no data breaches? Do you need user-specific policies? Perhaps you want to allow the marketing department editing capabilities for collateral, but you do not want the sales department to be able to change the master slide deck. How do you make sure a document does not live on a user’s device forever? What do you do for departing employees who take their BYOD and personal accounts with them? How do you handle compliance regulations? You will definitely need an audit trail to prove compliance.

To ensure data security and harmony among IT and employees, enterprises should also consider the following mechanisms:

  • Secure access that provides native file server access, including to SharePoint files, network shares and other document management systems without costly, risky duplicate cloud/DMZ stores and with no firewall reconfigurations. Multifactored authentication with Active Directory credentials and a token or other industry standard authentication mechanism should be enforced for access.
  • A secure data container that doesn’t rely on the mobile device’s data protection to be enabled but instead stores all corporate data on the mobile device in a container that is encrypted with enterprise-grade encryption. The keys should be stored inside the firewall with the corporation and not with a third-party, multi-tenant cloud provider.
  • Trusted app data sharing: Allow documents to be shared only by trusted applications that are authorized by an IT administrator. Unauthorized apps should be prevented from accessing corporate data. This capability enables separation of personal and corporate data. That is, it enables dual use and co-existence of personal and corporate data on the device; but by allowing the corporate data to be accessed only by authorized apps, it isolates the corporate data from personal apps and data.
  • Policy management offers enterprise controls by enforcing policies based on a mobile worker’s profile. The policy management should be granular and capable of being applied for a variety of factors such as caching, emailing, printing, opening in apps, expiring and revoking. Mobile workers should be granted entitlements on their mobile app based on the policies. Auditing capabilities for governance are needed, too.

Securely accessing documents and sharing and syncing them through mobile devices—across any platform—from laptops to SharePoint or other file servers, is necessary for employee productivity. Mobile workers also need the most up-to-date information at their fingertips across their multiple devices. Meanwhile, IT departments need to maintain control and governance over data, mobile devices and the network itself, without interfering with employee productivity.

While network and device security are important and can certainly be useful in contributing to the overall security of an enterprise, they simply aren’t enough. Data security is more important, more effective and the best bet for an enterprise looking to secure a mobile, collaborative workforce while maintaining harmony with the IT department, which in the end increases overall enterprise efficiency.

This article originally appeared in the October 2012 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3