BYOD - Bring Your Own Device

Why BYOD Application Shielding Promotes GDPR Objectives

A majority of businesses support a policy popularly known as BYOD (Bring Your Own Device). This involves individuals accessing corporate data through company-sanctioned, IT-secured applications on mobile devices. Most companies permit some level of use of personal devices, while some deploy their own tightly-controlled smartphones and tablets to staff.

However, if Malware successfully exposes corporate data of EU citizens that was held on a personal device after May 2018, the EU’s General Data Protection Regulation (GDPR) cites that the EU will heavily penalize the organization, legally and financially.

The private nature of mobile devices, the sheer number of end-points and the variability of device operating systems makes Application Shielding a viable solution to a problem that could destroy companies.

The Cyber Security Challenge BYOD Presents

While it may be possible to secure corporate applications and data in the field through IT command-and-control mechanisms, personal devices exist outside the domain of protective corporate firewalls. It becomes nearly impossible to deploy security measures to every personal device in the field on a frequent, consistent basis.

Company IT departments have traditionally protected corporate data by rolling out Enterprise Mobile Management (EMM) / (MDM) Mobile Device Management software across their networks. IT departments prefer centralized control over device authentication, user credentials like user ids and passwords, and even end-point data encryption.

However, most BYOD policies allow staff to log into corporate applications with almost any mobile device the user has in hand. The approach makes it very difficult for IT departments to know what devices to secure, and which should have the latest security updates. Further, corporate scanning of personal devices may make device owners suspect organizations have motives other than simply securing corporate applications and data.

Securing devices owned by contractors and partners of corporations becomes especially problematic in light of privacy issues and the possibility of conflicting corporate policies.

Application Shielding Secures corporate data

An effective approach to BYOD cybersecurity is Application Shielding solutions. The security technology follows the application everywhere it is used. Whether data is at rest or in motion, it is protected without impacting the user experience. Data controllers and processors gain robust, consistent data protection across their employees’ and partners’ mobile devices—managed or unmanaged—without the cost, complexity, or risk associated with securing individual devices.

While individually securing hundreds or thousands of devices may not be feasible or desirable, Application Shielding offers a robust and elegant solution to any corporation serious about protecting its data and its credibility.