Mobile Devices Open Doors in the Enterprise

The proliferation of consumer mobility and bring-your-own-device (BYOD) programs in the enterprise has increased the use of file synchronization and sharing offerings. However, there are limitations that can hinder individual productivity, such as:

  • Many devices have limited on-device storage and offer fragmented support for file system access.
  • The increasing number of devices per person poses a problem for data alignment and synchronization among all.

Personal cloud services such as Dropbox, Apple’s iCloud and Google Drive are simple and available free of charge, easily solving file sync and sharing problems between devices. This simplicity is why users are readily adopting these services.

But worker productivity and collaboration require content editing and manipulation capabilities beyond the ability to just move and share files; viewing and making annotations on work files are must-haves.

Four Reasons File Sync Is Growing More Popular

There are four key use cases that are driving the demand for mobile content and collaboration:

1. Access to Data

One example of the need for access is in the legal industry, where attorneys meeting a client over coffee might securely access confidential case documents from their mobile devices. In the health care sector, an example would be a doctor or nurse securely accessing patient information from a mobile tablet while in the patient’s hospital room.

2. Distribution of Documents

File sync assists in document distribution in disseminated environments. You could upload the latest product materials and competitive analysis to your sales team’s tablets. Or you can have up-to-the-minute inventory information at every retail store’s fingertips, provide digital textbooks to your students’ devices or send out quarterly financial documents to the board of directors with expiration settings and user restrictions.

3. Syncing Data Across Multiple Devices

File sync provides users the ability to view, edit and share last-minute changes to a presentation on the go, right before a customer meeting. Edits could be made on a smartphone in the cab yet appear on the overhead projector from the computer in the conference room.

4. Sharing Data

Whether it is the marketing team brainstorming ideas, executives pitching those ideas to a client or the finance team reporting the campaign results, the ability to share data internally with colleagues or externally with customers is key.

All of these examples can represent a potential security and compliance threat for an organization. Employees could share corporate documents with third parties or store documents on personal devices, completely outside of IT’s control.

Mobility Management Enables Productivity

With IBM MaaS360 enterprise mobility management (EMM), work on the go is simple, secure, shareable and, most importantly, managed by IT.

Mobile productivity starts with employee familiarity with the apps they use in their daily lives. With MaaS360, you can deliver content from Box, SharePoint, OneDrive and other repositories without the concern of data leakage that comes with consumer-class alternatives.

Mobile security has extended beyond simply managing devices. Today, true protection is achieved by managing the vast volumes of data these devices download, transform and share, as well.

More from Endpoint

The Needs of a Modernized SOC for Hybrid Cloud

5 min read - Cybersecurity has made a lot of progress over the last ten years. Improved standards (e.g., MITRE), threat intelligence, processes and technology have significantly helped improve visibility, automate information gathering (SOAR) and many manual tasks. Additionally, new analytics (UEBA/SIEM) and endpoint (EDR) technologies can detect and often stop entire classes of threats. Now we are seeing the emergence of technologies such as attack surface management (ASM), which are starting to help organisations get more proactive and focus their efforts for maximum…

5 min read

X-Force Identifies Vulnerability in IoT Platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

4 min read

X-Force Prevents Zero Day from Going Anywhere

8 min read - This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The 2023 X-Force Threat Intelligence Index shows that vulnerability discovery has rapidly increased year-over-year and according to X-Force’s cumulative vulnerability and exploit database, only 3% of vulnerabilities are associated with a zero day. X-Force often observes zero-day exploitation on Internet-facing systems as a vector for initial access however, X-Force has also observed zero-day attacks leveraged by attackers to accomplish their goals and objectives after initial access was…

8 min read

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

12 min read - ‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.Figure 1 — Exploitation timelineHowever, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can…

12 min read