Skip to main content
Jun 18, 2013

Addressing Enterprise Mobility and Continuity Challenges

The movement towards enterprise mobility as part of the growing BYOD (bring your own device) movement presents new challenges to business continuity planning (BCP) for IT and operations managers -- including wider distribution of sensitive corporate and customer data on devices that aren't owned by the company. As Tom Olzak notes in a recent article for TechRepublic, BCP helps to uphold one of the three pillars for security: availability.

Traditional BCP strategies have been centered around the use of a second data center or the use of disaster recovery services from a third-party provider. However, as BYOD becomes more prevalent in the enterprise and employees become increasingly mobile and reliant upon the use of enterprise mobile apps, this shift in the delivery and use of information assets requires a new approach for BCP, argues Olzak. For instance, employees’ increasing use of laptops, smartphones, and tablets outside the traditional boundaries of a company’s internal network makes it more challenging than ever for companies to protect their information assets from hackers, malware, and cyber attacks.

Companies can deploy a mobile application management (MAM) strategy to protect enterprise apps and data -- ensuring sensitive corporate information stays classified by regularly inspecting devices for security compromises and then by taking appropriate actions (e.g. app deletion or device wipe). As part of the BOYD movement, employees and business leaders alike rely heavily on enterprise mobile apps and data to get their jobs done and keep operations humming regardless of where they may be at the moment. It’s also critical for an organization’s IT team and others who are involved with BCP to ensure that appropriate safeguards and backup plans are considered in the event of a network outage.

Server and other types of virtualization can make it easier for IT and businesses to guard against unanticipated outages while requiring the organization to manage fewer physical assets. Mobile application management provides IT with visibility into the usage of corporate apps while promoting enterprise mobility and a mobile workforce. If a company needs to shift application management and support to a virtualized server when a primary server is down due to a power outage or a technical glitch, MAM can be used to help ensure that the corporate apps and data being used by employees continue to remain protected regardless of where an employee is accessing that information.


More from the Blog
Feb 24, 2020

Android Cracks and App Hacks – What Is StrandHogg?

StrandHogg is a critical v
Read more
Feb 19, 2020

Four application security themes for 2020

The United States was astonished recently when the Iowa Democratic caucuses vote count failed due to a bad app.
Read more
Feb 05, 2020

Financial Mobile App Vulnerability FAQs

Last year research by Aite Group examined mobile application security vulnerabilities across eight financial services sectors ...
Read more