Mobile Devices & BYOD Risk & Security
Mobile devices: Secure or security risk?
The traditional perimeterised architecture was perfectly adequate for an organisation that simply wanted to operate inside its own controlled environment, with e-mail to the outside world.
Today, this type of organisation has almost ceased to exist because today’s business needs demand wider connectivity to support sharing of sensitive information over the Internet (e.g. cloud computing) and IT consumerisation (e.g. Mobile devices & BYOD). While developing online collaboration with business partners, customers, suppliers, and outworkers, organisations have to carefully consider new threats and risks posed by de-perimeterisation principles and related technologies.
How Deloitte can help?
Deloitte can help organisations to address the underlying challenges raised by the phenomenon of Mobile Devices and BYOD, and the move of IT assets, users and data outside of the traditional network perimeter:
- Security – Assessing and Defining security solutions which are effective for mobile devices & BYOD
- Data Privacy – Protecting confidential and private information which migrate to places outside the network boundaries
- Regulatory Compliance – Ensuring compliance with national and industry regulatory requirements
- Social & Legal – Defining policies that comply with the applicable legal and social requirements
Our approach & methodology
Deloitte has developed mature proprietary risk assessment frameworks as well as a specific security methodology in order to address challenges and risks raised by mobile devices and BYOD.