Business Intelligence Blog from arcplan
16Feb/120

Mobile BI: Device & Data Security Concerns

by

Accessing information from mobile devices is becoming second nature for business users and executives who need to be connected to performance data 24/7. We’ve seen predictions from Gartner heralding 2012 as the year of mobile BI explosion, where employees will bring their own smartphones and tablet PCs into the workplace. As the number of organizations that have implemented (or are planning to implement) mobile BI increases, there are mounting concerns about mobile security. Lack of control of downloaded applications, lack of centralized server management, and virus protection are some of the concerns that come to mind as business users tote their shiny new personal tablets to work.

Let’s examine more closely how your IT team can handle these issues:

The Bring Your Own Device (BYOD) phenomenon. Understandably so, many of us (myself included) have begun taking our own devices to work. Tablets and smartphones can be remarkably efficient for business users on the go, and sometimes it’s just easier to have your personal and business information on the same device. Since the company doesn’t own the device, there is no legal way of controlling what apps an individual can download. However, exposure to malicious software (malware) can pose a tremendous threat to business information. One way to address this concern is to whitelist applications so users have a selection of applications to choose from that IT approves. Employees can still use their devices at work, but within IT-sanctioned limits. IT may also ask users to install a mobile security package to help detect and remove malicious applications.

Mobile device security. Data breaches are a very real threat to data stored on mobile devices. This risk may seem obvious, but accidents do happen. Employees may inadvertently leave their smartphone or tablet in a cab, or at a Mexican restaurant while on a business trip (the arcplanner responsible shall remain nameless), complete with company confidential information.

Continue reading this article here>>