Corner Image

Vitrium Content Security and DRM Blog

Welcome to a world of content security, Digital Rights Management, and content tracking and analytics.

Get DRM Security Insights

Recent Blog Posts

Security controls needed for BYOD programs

Jan 9, 2012 8:04:53 AM

Many organizations today are realizing the productivity benefits that can be derived from a bring-your-own-device mobility program, but BankInfoSecurity recently argued that any practice also requires strict security controls.

As employees access and store enterprise information on their personally owned smartphones and tablets, the company should be sure that the appropriate safeguards, such as a document protection solution, are in place. The news provider highlighted the Delaware state government, which allows employees to use their own devices, as long as specific security measures installed on them.

"In the beginning, it was not such an issue, but as the smartphones became more and more popular, we found that the number of devices accessing the state network was continuing to grow,"  Elayne Starkey, Delaware's chief security officer, told the news provider.

With document protection in place, the organization can better control who can access certain information, as well as on which devices it can be viewed.

Given the rise of consumerization, ZDNet contributor Adam Powers recently said that employee misuse and abuse presents a high risk to information security.