BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Managing Mobile Workers

Post by Peter McCalister May 19, 2011

According to a Runzheimer survey released last month, 45 percent of today’s workforce is mobile. For companies, having such an extensive number of remote employees can provide a number of great advantages, but it has plenty of downsides too.

Among the top concerns of enterprise executives is being able to effectively manage the mobile workforce to ensure maximum productivity and control the distribution of data. IT mangers have indicated that it is a lot more challenging to keep remote employees informed of security policies and initiatives. And on top of that, mobile workers are significantly more likely to access dangerous content than those in the office. Additionally, when employees bring their own personal mobile devices into the office network fray, security management can seem like a nightmare.

But it’s not all bad. By combining the deployment of up-to-date security solutions with instituting best practices and compliance standards, organizations have a golden opportunity to capitalize on all of the positive aspects of a mobile workforce, while minimizing the potential for data losses, breaches, or even worse. Part of companies’ mobile security strategy should also include implementing a least privilege solution, ensuring that remote workers can only access the data and perform the computing functions needed to do their jobs. Employees can’t lose what they can’t access.

Leave a Reply

Additional articles

Vulnerability Expert Forum Highlights: April 2014

We had a great turnout for last week’s April 2014 Vulnerability Expert Forum (VEF) webcast. BeyondTrust Research experts, Carter and DJ, provided in-depth knowledge about the latest vulnerabilities and their potential impacts on network environments. Below are highlights from the Forum, plus an on-demand video of the presentation. Latest critical vulnerabilities, vendor patches, and zero-day…

Post by Chris Burd April 16, 2014
Tags:
, , , , ,
BI-5.1-user-asset-visibility-img

Understanding Who Has Access to What with BeyondInsight v5.1

Today, it’s my pleasure to introduce you to BeyondInsight version 5.1, the latest release of our IT Risk Management platform, which unifies several of our solutions for Privileged Account Management and Vulnerability Management. BeyondInsight v5.1 embodies BeyondTrust’s mission to give our customers the visibility they need to make smart decisions and reduce risk to their…

Post by Morey Haber April 15, 2014
Tags:
, , , , , , , , , , , ,

PowerBroker for Unix & Linux Now Available via Web Services

This week BeyondTrust released a fully functional Web Services interface (REST API) for its PowerBroker for Unix & Linux product.  With this new feature users of the solution will now be able to remotely and securely configure and retrieve data via the API.  The Web Services interface implemented by BeyondTrust is an industry standard that…

Post by Paul Harper April 10, 2014
Tags:
, , , , ,