The tricky balancing act of mobile security

As both the demand for mobility and the bring-your-own-device (BYOD) trend grow, so does the need for more advanced mobile security policies, procedures and technologies

The march toward mobility at Canada's Scotiabank is pretty typical: first laptops to enable alternative work arrangements for employees, now smartphones and tablets to give workers anywhere access to information.

The Toronto-based bank, with 83,000 employees worldwide, deployed company-owned BlackBerries several years ago to personnel who require them to do their jobs more effectively, and has since asked select staffers and IT support people to pilot other smartphone brands as well.

The approach to securing those mobile devices is typical, too. The bank uses BlackBerry Enterprise Service mobile device management (MDM) software. It also requires employees to sign statements saying that they agree to let IT erase data from devices that are lost or stolen, and to take control of devices if there's a legal investigation, says Greg Thompson, vice president of enterprise security services and deputy chief information security officer at Scotiabank.

Register or Login to continue

This article is only available for subscribers. Sign up now for free and get free access to premium content from ARN, CIO, CSO, CMO, Computerworld, and PC World.

[[ message ]]
[[ message ]]

Tags BYODBYOD security

More about BlackBerryCheck Point Software TechnologiesCheck Point Software TechnologiesCheck Point Software TechnologiesCTIAFrost & Sullivan (Aust)GartnerInternational Information Systems Security Certification ConsortiumISC2KasperskyKasperskyMcAfee AustraliaPoint Software TechnologiesPricewaterhouseCoopersPricewaterhouseCoopersSoftware TechnologiesWang

Show Comments