by Mansi Joshi

Biocon empowers users with secure BYOD

Nov 26, 2017
CareersCIOHealthcare Industry

In the age of BYOD, it is no device left behind. Here’s how Biocon tightened data security with enterprise mobility management.

Bring your own device (BYOD) security is no longer an afterthought for organizations. With corporate data residing on multiple endpoints now, the IT security team cannot rely on just perimeter security anymore. 

According to research firm Gartner, 70 percent of employees will be working on their own devices (smartphones or tablets) by 2018.

As enterprises roll out BYOD policies to increase productivity, the rise of mobile malware has added to the security woes of organizations.

To tackle this problem within the organization, Indian biopharmaceutical company, Biocon, deployed an enterprise mobility management (EMM) platform to boost mobility and enhance security.

Secure collaboration

“The EMM suite provides access to corporate emails in a secure manner and ensures the data from emails is not moved to local storage or personal applications,” says Veena Vasanth, senior director, Infotech at Biocon.

It has a secure browser, which helps the device user connect to the intranet and ensures that no corporate web applications are accessed on third-party browsers, she adds.

It allows employees to collaborate on personal or corporate devices in a secure manner thereby ensuring data confidentiality.

The CIO, risk and compliance manager were key in deploying the project, Vasanth points out. “Stakeholders also helped in enabling an enterprise application catalogue for third-party and in-house applications, application security and compliance policies, including blacklisting, whitelisting and authentication.”

Better security within budget

The EMM suite has not only strengthened device and data security for Biocon but also helped in reducing IT costs and work load with BYOD policy.

“It empowers users with the increased mobility these need to serve their customers better,” she adds. The solution has also streamlined mobility intelligence reports for compliance and audit requirements.

With its mobile threat management feature it secures against malware attacks, has jailbreak and root device detection and automated remediation, she points out.