In the age of BYOD, it is no device left behind. Here’s how Biocon tightened data security with enterprise mobility management. Bring your own device (BYOD) security is no longer an afterthought for organizations. With corporate data residing on multiple endpoints now, the IT security team cannot rely on just perimeter security anymore. According to research firm Gartner, 70 percent of employees will be working on their own devices (smartphones or tablets) by 2018.As enterprises roll out BYOD policies to increase productivity, the rise of mobile malware has added to the security woes of organizations. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe To tackle this problem within the organization, Indian biopharmaceutical company, Biocon, deployed an enterprise mobility management (EMM) platform to boost mobility and enhance security. Secure collaboration“The EMM suite provides access to corporate emails in a secure manner and ensures the data from emails is not moved to local storage or personal applications,” says Veena Vasanth, senior director, Infotech at Biocon. It has a secure browser, which helps the device user connect to the intranet and ensures that no corporate web applications are accessed on third-party browsers, she adds.It allows employees to collaborate on personal or corporate devices in a secure manner thereby ensuring data confidentiality.The CIO, risk and compliance manager were key in deploying the project, Vasanth points out. “Stakeholders also helped in enabling an enterprise application catalogue for third-party and in-house applications, application security and compliance policies, including blacklisting, whitelisting and authentication.”Better security within budgetThe EMM suite has not only strengthened device and data security for Biocon but also helped in reducing IT costs and work load with BYOD policy.“It empowers users with the increased mobility these need to serve their customers better,” she adds. The solution has also streamlined mobility intelligence reports for compliance and audit requirements. With its mobile threat management feature it secures against malware attacks, has jailbreak and root device detection and automated remediation, she points out. Related content feature 4 reasons why gen AI projects fail Data issues are still among the chief reasons why AI projects fall short of expectations, but the advent of generative AI has added a few new twists. By Maria Korolov Oct 04, 2023 9 mins Data Science Machine Learning Artificial Intelligence feature What a quarter century of digital transformation at PayPal looks like Currently processing a volume of payments worth over $1.3 trillion, PayPal has repeatedly staked its claim as a digital success story over the last 25 years. But insiders agree this growth needs to be constantly supported by reliable technological ar By Nuria Cordon Oct 04, 2023 7 mins Payment Systems Digital Transformation Innovation news analysis Skilled IT pay defined by volatility, security, and AI Foote Partners’ Q3 report on IT skills pay trends show AI and security skills were in high demand, and the value of cash-pay premiums was more volatile but their average value across a broad range of IT skills and certifications was slightly do By Peter Sayer Oct 04, 2023 6 mins Certifications Technology Industry IT Skills brandpost Future-Proofing Your Business with Hyperautomation By Veronica Lew Oct 03, 2023 7 mins Robotic Process Automation Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe