point
Menu
Browse by year:

July - 2015 - issue > CXO View Point

Mobile Workforce - Defining New Security Norms

By Anshuman Singh, Director, Product Management of Application Security, Barracuda Networks
Friday, June 26, 2015
By Anshuman Singh, Director, Product Management of Application Security, Barracuda Networks
Founded in 2003, Barracuda Networks (NYSE: CUDA) is a worldwide leader in Security, Application Delivery and Data Protection Solutions. Headquartered in California, the company has a market cap of $2.24 billion.

The Information Technology sector is booming and the research and development in this sector is powering radical innovations at a very fact pace. These radical discoveries have the ability to transform the way businesses conduct their routine business, while allowing them to achieve highest levels of efficiency. Mobile access to company data and Bring-Your-Own-Device (BYOD) are some of the trends that are burgeoning among the consumers as well as powering the corporate sector. As these enhancements are promising for the corporate world they also bring about the need for extra caution to review the security infrastructure.

Innovations in consumer technology space together with the phenomenal growth of wireless Internet has given birth to this new era mobile workers who believe in staying connected and available at work even on the move. According to Gartner, by 2016, two-thirds of the world's mobile workforce will own a smartphone and 40 percent of the entire workforce will be mobile. There is increased acceptance among organizations to implement BYOD policies and mobile admittance to business data is fast becoming one of the defining factors of realizing full efficiency and effectiveness for mobile workers.

Measuring the Risks

While companies may be able to cut down on cost by adopting BYOD policies, this trend is forcing dramatic changes in the way the network infrastructure is perceived and built. As IT experts specialize in detecting maliciousness, trends such as these increases the risk of data breaches as these personal devices are usually not protected by enterprise network security measures. These risks include:


Share on Twitter
Share on LinkedIn
Share on facebook