Tackling Mobile Security

With mobility penetrating the enterprise to a big extent, security risk to apps and data has grown. So, what do you do?

IT Next sought some experts' opinion on the risks involved in mobile security and how to tackle them. Over to them:

KAPIL MEHROTRA, CHIEF MANAGER IT APPLICATIONS, APOLLO MUNICH HEALTH INSURANCE COMPANY LTD:

A mobile is no longer a luxury, its a necessity. Right implementation of a mobile device strategy across the organisation and mapping that strategy to local device settings can address security concerns. Make and implement an IT policy that governs usage and employees understanding. Use threat management to identify the risks of moving applications to a mobile platform. Educate application developers in secure coding practices for mobile device platforms.

SDPL NARAYANA, ASST GM IT, NEULAND LABORATORIES LTD:

To ensure security when using mobile computing, the protection should be commensurate with the risks. When using mobile computing facilities, e.g. Notebooks, palmtops, laptops, smartphones and tablets, special care should be taken to ensure that the business information is not compromised.

The policy should include requirements for physical protection, access controls, cryptographic techniques, back-ups and virus protection. Remote access to business information across public network using mobile computing facilities should be authenticated.

SKD BHAVANI PRASAD, SENIOR IT MANAGER, FIFTH AVENUE SOURCING PVT LTD:

Some security challenges include protecting corporate data in transit over public Wi-Fi and cellular networks. Encrypting data stored on device, making it available only to authenticated users on domain. Limiting end users access, preventing harmful internet downloads and unauthorised software installation.

IT managers can overcome the challenges by securing overthe air communication to protect data in transit, use SSL/TLS certificates to secure data and encrypted file transfers and store on the device, etc.

Marki


Add new comment