Sanjay Gupta, Vice President of the Fusion Middleware group at Oracle India, recently took to the pages of India?s Business Today to opine that the biggest ongoing problem most enterprises have with employee-owned devices boils down to the lack of mutual trust.
?When it comes to company culture, BYOD will only flourish in companies where trust is absolute,? Gupta wrote. ?Business executives need to be able to have complete confidence in their IT department and the technology framework they have in place to secure employee devices. Employees, meanwhile, need to rest assured that their device cannot compromise the enterprise and that, conversely, their own private data cannot be viewed by anyone in the business. This is a two-way street of course.?
So how do you create a corporate culture where this kind of trust exists? Jared Hansen, CEO of secure mobile printing leader Breezy, says that it starts with understanding that trust is never freely given in the workplace ? it has to be earned. ?I think the key is recognizing that device owners ? your employees, contractors and other authorized network users ? have a reasonable expectation that their personal data won?t be erased or viewed by the company except in clearly defined circumstances. In exchange for this reassurance, they are willing to allow the company to manage the device?s identity and applications, and to follow security procedures that protect company data.?
When top management trusts IT, employees trust the company, and IT trusts the technology being used to secure company data and the employees whose behavior can be the most important factor in maintaining that security, all of the pieces fit together. ?It?s a little bit like the Cold War definition of international security,? Hansen says. ?Trust, but verify. In other words, you work to build a climate of trust where employees are willing to come forward when there is a potential data breach, but at the same time you deploy the monitoring and management tools required to ensure compliance with corporate security policies.?
Building trust starts with communication and training, but the key is a security infrastructure that secures company data without placing an undue burden on individual employees. Breezy?s partner, Citrix, published a white paper that lists the 10 components such a mobile security infrastructure must have, and a secure system that protects employee privacy is near the top of the list. It?s available for free download at this link.
Breezy?s secure mobile printing technology is fully integrated with EMM providers like Citrix and many others, and can add an extra layer of protection to the mobile devices that connect to your network or store your data. For more information on mobile device security and secure mobile printing, watch this video from Breezy, download The Definitive Guide to Mobile Printing, a free ebook, or click here to schedule a Breezy demo now.
Photo credit: This image of a businessman using a smartphone was offered under a Creative Commons license on Pixabay by photographer Niekverlaan.
Customers report that Breezy installations are among the easiest they’ve ever seen for an enterprise product.