Enterprises are facing rising challenges as cloud-based services that are used on a growing number of mobile devices threaten security. While establishing controls over these devices may conflict with the spirit of bring your own device, a Gartner study found that many enterprises and IT leaders are unsure how to deploy a strategy that protects company data while preserving the nature of BYOD.
Some of the key challenges for businesses that Gartner observed are related to how they can address data leakage concerns as larger volumes of company data is stored in personal cloud services. Promoting BYOD while ensuring the security of stored data, along with managing access from mobile devices connected over public networks so that it does not risk potential data leakage, regulatory noncompliance and performance problems are complex tasks.
IBM's invents new security technique
As cloud computing services take on a more profound role in business environments, companies like IBM are developing new ways to protect sensitive data before it's transmitted to the cloud, according to a recent Scientific Computing article written by IBM.
Since maintaining security and privacy of mission-critical data remains the chief concern of cloud computing, cloud service providers have made protecting vulnerable information from inadvertent leaks and exposure a top priority, and IBM's invention intends on improving that ability.
"IBM's invention helps overcome security concerns by redacting, removing or replacing sensitive data from records that are being sent to the cloud for processing," according to the source. "It then restores the sensitive data when the records are returned from the cloud."
While this new, patented technique will help alleviate many preoccupations businesses have when using services through cloud providers, it will only act as an added security layer to the protections already in place by managed service providers.
Implementing the best security practices
The Gartner study listed several recommendations that work best to secure in-transit data from mobile devices to the cloud:
- Confine enterprise data on endpoints and neutralize data leakage to personal cloud services by deploying mobile device management solutions in addition to "a containerization on mobile devices."
- Inhibit unwanted personal cloud services by providing enterprise file synchronization and sharing or standardizing on an enterprise-class cloud solution.
- Utilize network access control solutions to block any channels of data leakage that are capable of bypassing MDM's mail server controls - e.g. unsanctioned computing devices.
- Protect legitimate company data in the cloud with single sign-on access.
Businesses can benefit immensely from security safeguards offered by unified endpoint management providers. Furthermore, as seen with IBM's latest data protection invention, new ways of preserving sensitive information will help appease enterprises and the concerns they have with BYOD and cloud computing.