APAC CIO Outlook
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Agile

    AI Healthcare

    Artificial Intelligence

    Aviation

    Bi and Analytics

    Big Data

    Cloud

    Cyber Security

    Digital Infrastructure

    Digital Marketing

    Digital Transformation

    Digital Twin

    Drone

    Internet of Things

    Low Code No Code

    Networking

    Remote Work

    Startup

    Unified Communication

    Wireless

  • E-Commerce

    Education

    FinTech

    Healthcare

    Manufacturing

    Pharma and Life Science

    Retail

    Travel and Hospitality

  • Dell

    IBM

    Microsoft

    Salesforce

    SAP

  • Cognitive

    Compliance

    Contact Center

    Corporate Finance

    Data Center

    Data Integration

    Digital Asset Management

    Full Stack Development

    HR Technology

    IT Service Management

    Managed Services

    Procurement

    Proptech

    RegTech

Menu
    • Compliance
    • IBM
    • Big Data
    • Unified Communication
    • Digital Infrastructure
    • Data Center
    • Salesforce
    • MORE
    #

    Apac CIO Outlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIO Outlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • News
    • Networking
    Editor's Pick (1 - 4 of 8)
    left
    The Network Economy, Fibre Investment and a Better Place to Live

    Gary McLaren, CTO, Hong Kong Broadband Network Limited

    What is CLOUD doing to our networks?

    Sam Schoelen, Chief Information Technology Officer, Continental Resources

    Stepping into IT Mainstream with Advancement in Big Data and CDN

    ColinBoyd, VP & CIO, Joy Global Inc

    Connect, Engage, Disrupt-XaaS and the Power of IoT

    Charlie Isaacs, CTO, IoT, Salesforce

    Secure Smart Homes Need Control on Site, not in the Cloud

    Simon Hunt, CTO - Home Gateway Security, Intel Security

    Software Defined Networks and Network Function Virtualization

    Massimo Rapparini, CIO, Viavi Solutions

    Software Defined Networks- A New Spine for IT

    Scott Fenton, VP & CIO, Wind River

    Leveraging Digital Platforms to Facilitate Patient-Centric Healthcare

    Ricardo Vong, Head of IT, Malaysia, and Lekha Satish, Innovation & Internal Excellence Lead, Asia at AstraZeneca

    right

    Tips to Keep in Mind for Securing Your Enterprise Mobile Apps

    Apac CIO Outlook | Wednesday, December 01, 2021
    Tweet

    Fremont, CA: Company mobile applications meet the increased demand for employees to access enterprise data from their personal devices. It's especially true after the outbreak of COVID-19, which caused many workers to work from home rather than in the workplace. While workplace mobile applications provide organizations and their workers with maximum flexibility and increased productivity, they are also vulnerable to security attacks and data breaches.

    A recent survey demonstrated the impact of the pandemic on organizations progressing their digital business transformation efforts, highlighting that boosting security controls surrounding these activities will entail safeguarding company mobile applications for nearly half of respondents.

    While software-as-a-service (SaaS) suppliers embed basic security into their platforms, there are actions that businesses should take as part of their mobile device management (MDM) strategy to safeguard mobile enterprise apps.

    Tips to keep in mind for Securing Your Enterprise Mobile Apps

    • Encrypt data

    Only half of businesses now have an encryption plan in place to secure their cloud data. Encrypt data sent between devices, apps, and cloud servers using the Advanced Encryption Standard (AES), Triple Data Encryption Standard (DES), VPN tunnels, or HTTPS. Using the more standard AES and Triple DES techniques will also necessitate proper key management. To encrypt apps and data containers, hardware security models, which are devices built for tamper-resistant cryptographic operations and key management, are becoming increasingly popular. Whatever encryption method(s) the firm employs, it should be layered with firewalls, a network monitoring tool, and/or endpoint security software.

    • Provide company-use-only devices

    An organisation can choose a BYOD, corporate-owned and personally enabled (COPE), or hybrid model of device use. While BYOD allows users to connect with whatever device they like, COPE is a paradigm in which businesses offer employees with corporate-approved devices.

    It is important evaluating the upfront and ongoing expenditures of supplying each employee with a laptop, desktop computer, tablet, and/or smartphone, so that workers' personal applications and data storage do not conflict with the company mobile apps.

    The advantage of providing the employees with the devices they require for their jobs is that the firm retains control over device security, geolocation monitoring, and setting setup without invading employees' privacy.

    • Segment your cloud 

    If the firm has a bring you own device (BYOD) policy for device use, it is feasible to reduce security breaches in workplace mobile apps by containerizing employee personal data from corporate data on their personal devices. In principle, regardless of device usage model, the organisation should take a Zero Trust approach to technology use and access by implementing access security rules to various sections of the cloud via applications.

    See Also : Enterprise Search Solutions Companies

    tag

    SaaS

    Weekly Brief

    loading
    ON THE DECK

    Digital Twin 2022

    Top Vendors

    E-Commerce 2022

    Top Vendors

    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Achieving Business Agility

    Key Challenges Facing Real-time Data Processing in Data Centers

    Digital Transformation Agility

    Angela Lam, CIO Shell Australia, COG & Integrated Gas, Shell (NYSE: SHEL)

    Technology Trends Impacting Digital Infrastructure in 2022

    The Benefits of Portable Solar Generators for Cities

    Agile Culture -The Path To Business Success

    Loading...

    Copyright © 2022 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    |  Sitemap |  Subscribe |   About us

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/tips-to-keep-in-mind-for-securing-your-enterprise-mobile-apps-nwid-8618.html