we Analyze the level of mobility present in the organizations, and the challenges that remain to be resolved, along with experts from VMware AirWatch and Check Point.

there is No doubt that mobility is already an unavoidable part of any business strategy is a modern self-respecting. But mobility must pay adequate attention to, being aware at all times of who is connecting to the corporate network. To manage the mobility must also address other issues, such as learning to separate the documents professionals profile purely personal, to provide enough protection to devices, applications and services or to control access to the data of the company when you decide to use wireless connections. To address all these issues, and some more, NetMediaEurope has decided to lay face to face a couple of experts from the technology industry: Juan Miguel Haddad, Business Manager End User Computing (Desktop & Mobility) AirWatch Iberia, and Antonio Abellán, commercial director at Check Point Spain

Both of these professionals have participated in a meeting online that has been moderated by our colleague, Rosalia Arroyo, editor-in-chief of ChannelBiz.is. During the round table “Mobility in the enterprise: Productivity and safety go hand in hand”, has spoken of how to exploit mobility in companies to boost productivity in a secure manner. There has been discussion on whether the security is seen as a barrier or not. It has deepened the value of the identity management and in the problems posed by the boom of mobile applications. It has been touched by the phenomenon BYOD (Bring Your Own Device). It has unraveled the situation of the projects of enterprise mobility from the point of view of the wifi networks. And it has analyzed the linkage of mobile phones and other devices with the internet of things.

productivity in mobility

Have you already understood the Spanish business fabric that mobility improves productivity? John Michael Haddad, Business Manager, End User Computing (Desktop & Mobility) AirWatch Iberia thinks so. “Undoubtedly, all the companies are adopting mobility”. Although it is possible to differentiate between “enterprise mobility” and “mobility of the employee as such. Let’s say that the companies and the employees already have clear that they need access to business resources, work from home, connect at any time. This mobility exists” in addition “for quite some time. Another thing is” that “business processes are adapted to the mobility and is able to perform automatically certain tasks”. For example, in logistics, “control, where is the package that we have to deliver”, where there would still be room for improvement.

For Antonio Abellán, commercial director of Check Point Spain, has been “long, proceloso”, to get to the current point. is mobility would be favoured “rather by the social habits” and topics such as “balancing work and family”, you get along well with teleworking. “Anyway,” says Abellán, is “way to go. Because above all what we need is to bring awareness first to the companies that the information that goes in and out of their companies is critical”. And also to its employees.This expert sees a certain “frivolity” or “carelessness” on the part of the users who handle the information, and invites to differentiate “three terms: the personal, own; labor ”with professionals working outside the main environment; and «the management of the information we need more now» than «companies are committing to deadlines» and «impeccable services.»

Security in mobility

Is usability or safety more premium? Is security seen as a barrier? Security should be «transparent . That is, it does not have to be a barrier for the user, ”says Antonio Abellán, who rejects the deployment of“ restrictive ”solutions. At present “what happens is that accessibility prevails over all. In the end, an employee when he wants to connect connects to his phone or his laptop or his tablet and gets to work. ” What crosses his mind is to be able to do his job, not how or with what level of security. Juan Miguel Haddad reveals that companies have taken into account a first phase of security security of the device and the content that device has. ” Thus, for example, they are able to delete it if it is lost thanks to “a mobile device manager”. The next phase, which is being transited now, would be «the danger posed by the device within the company, accessing from multiple applications , multiple elements, to the rest of the contents».

mobility4

Identity management

What role does identity management play? Are you at the level of device management? In Haddad’s opinion, “identity management is not yet booming . At the device level and at the level of the applications we run, it is not at the level of ‘traditional identity management’ where the newly hired employee is “registered in the systems, provided with his email” and so on. «The part of profiling the user, profiling the applications, allowing the use of these applications based on» issues such as «geographical location» or «if it is inside or outside the company», is something that «we are still starting to work, ”explains the VMware AirWatch manager, with whom Antonio Abellán is“ completely in agreement ”.

«We are still a little far from that identity management at the mobility level,» agrees Abellán, who believes that progress exists «by belief in the company’s internal environment.» Juan Miguel Haddad continues along the same line, clarifying that accounu na thing is the internal perimeter of the company ”, which“ is already very controlled. And another thing is what is happening now, which is deperimetralized the company. The user is out; the applications, out; the data, inside or outside. And that is the game we have right now, «a» complicated game of user identity. » Haddad concludes by saying that « the key is that the user can authenticate to internal systems and external systems,» centralizing the action.

The applications

Next to users and devices, applications appear.How are apps managed throughout this world of mobility? «Today, the average is estimated to be 95 applications per device per user» , says Antonio Abellán . Of these, only “the first 6 or 7 would be used. There is a compulsive download of applications, ”says the Check Point manager, and this leads to“ a certain alert tone. Because in the end not all are good. There is malware undercover in many of the applications that take control of our phones. ” There is malware capable of “photographing the environment in which you are” or “recording conversations, having access to your agenda” and “having access to your GPS, so by squareing all that information you really put in risk «» integrity «and» information «.

For Juan Miguel Haddad, mobile applications «are already uncontrollable», because «there are thousands» and there is no way «to prevent the user from downloading any of them». From his point of view, «what we need to propose are combined solutions » and «integrations with third parties» that allow «scan reputation» and «create black and white lists of applications that can be installed. ” The most radical end, in the face of «total security», is to «restrict the mobile or prevent the user from installing those applications.» But this seems «unfeasible,» Haddad rules out. The alternative would be to protect the apps «that access the business systems», while the others remain on the sidelines. Antonio Abellán sees danger in the applications by the mere fact of sharing devices, «something that was not done so much before» and now «is the main hacker «. Therefore, “the proposals go through separating the environments” and the “awareness” of company and user.

mobility5

The separation of environments

And do you resort to the separation of environments in the middle of the BYOD era? Are companies aware that phones should separate personal from professional? Abellán observes that still uses «two telephones : the personal telephone and the work telephone». Although today there are solutions designed so that, “within the same device, both worlds, both personal and professional, can coexist”, without one attempting against the other. In fact, companies are moving in that direction. «It is being adopted, little by little,» confirms Haddad, who highlights «the separation of corporate or business applications from the others.» This expert also gives importance to being able to erase a device if it is lost.

Wireless networks

Is the role of wireless networks contemplated in business mobility projects and for securing such mobility? Juan Miguel Haddad contemplates “a paradigm shift” and “two different problems”. On the one hand, «the company that provides shelter» has to design the «wifi chord so that there are no intrusions in its own network. But the current problem is the other way around: it is the external device that connects to a Wi-Fi, ”says Haddad. So «you have to secure that device so that Wi-Fi does not capture or absorb information that is in the device.» In this sense, organizations would already be applying policies and protection of their own wireless network.

Antonio Abellán describes the current use of Wi-Fi connections as «compulsive» and «impulsive.» It seems basic that those people who work “in business environments that are not their own” take into account where they “are connecting”. Abellán encourages the endowment of the “ability to detect which roads are safe, when” the networks “are public”. In the case of private environments, within the company, protection measures are also needed “so that from outside, through devices or through external connections” nobody is able to “attempt against our information”, the representative of Check Point The problem is that «people are totally unaware of what channels they connect to the internet through.»

mobility1

The internet of things

As companies incorporate sensors and gadgets IoT as part of mobile communications, what security challenges will they encounter? Differentiating the hundreds or “thousands of mobile devices” in the hands of the employees of the “hundreds of thousands or millions of IoT devices that we can find in the company”, Juan Miguel Haddad, talks about the need for management tools and, likewise , of “security mechanisms. And there the same game will be applied a bit as in traditional security, ”says . “We will have to buy quality devices” . And put certificates . And secure access «to the management environment and other elements with authentication of the device». And even control «the movement of that device within a company,» said Haddad, which points to mechanisms such as firewalls . «In the end there will be» several «ways to authenticate,» which will give way to «massively introduce IoT into the company.» Antonio Abellán concludes that we are facing “the same problems” as before “but more sophisticated, with which the road is more than clear”. Because, “the more the range of availability and usability of the information is opened,” the more “monitoring” will open.