As smartphones and tablets stay in the spotlight, BYOD security continually becomes a greater concern to CIOs and IT professionals. Most decided to use mobile device management (MDM) for their BYOD security. MDM focuses on securing the employee device rather than the data. This is a good option if the company owns the phone, but what if the phone belongs to the employee?
Alternative options for securing BYOD include:
- Mobile Application Management (MAM): MAM focuses enterprise resources on managing an organization’s data that is on their employee’s device. This happens because MAM takes control of the applications that access the data, while the employee still has control of the device.
- Run a Second Virtual Phone with Hypervisors: This option uses type 1 hypervisors on Android handsets to essentially create two phones running at once in the same physical hardware. One phone runs standard consumer applications and the other runs a dedicated Android operating system geared for the enterprise. The enterprise only manages the second phone.
- Put a Virtual Desktop on Your Phone: This is more about managing users than managing devices. The organization would virtualize the employees’ desktop computers and deliver them as a service, giving the employees’ access on their device.
Do you think that these alternative options are ripe? Or are they hype? What BYOD security solutions are working best for you?