Mobility Management for Enterprises in BYOD Deployment

Bring your own device (BYOD) adoption has become more and more popular in the enterprises because of its convenience and fantastic user experience. However, BYOD was found to expose the enterprises to security risks and thus BYOD adoption can be an opportunity as well as threat to enterprises. This paper focuses on deriving a secure mobility management solution by dissecting three contemporary BYOD solutions, namely, MDM, MAM, and MCM. Based on those three basic solutions, this paper specifically analyzes and compares different solutions provided by VMWare AirWatch, IBM MaaS360, Globo GO!Enterprise, Blackberry BES 12, Samsung KNOX, Blackberry Balance and Black Phone. With such detail analyses, enterprises are provided with insight into different Enterprises Mobility Management solutions so that enterprises can have a holistic view of BYOD deployment and are able to choose appropriate solutions for their own secure BYOD deployment.

[1]  Daniele Sgandurra,et al.  Towards enforcing on-the-fly policies in BYOD environments , 2013, 2013 9th International Conference on Information Assurance and Security (IAS).

[2]  Jeffrey M. Voas,et al.  BYOD: Security and Privacy Considerations , 2012, IT Professional.

[3]  Maryam Var Naseri,et al.  BYOD: Current state and security challenges , 2014, 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE).

[4]  Juan Julián Merelo Guervós,et al.  Corporate security solutions for BYOD: A novel user-centric and self-adaptive system , 2015, Comput. Commun..

[5]  K. Scarfone,et al.  Guidelines for Managing the Security of Mobile Devices in the Enterprise , 2013 .

[6]  Khoula AlHarthy,et al.  Implement network security control solutions in BYOD environment , 2013, 2013 IEEE International Conference on Control System, Computing and Engineering.

[7]  Antonio Scarfò,et al.  New Security Perspectives around BYOD , 2012, 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications.

[8]  Hormazd Romer,et al.  Best practices for BYOD security , 2014 .

[9]  Arunkumar Gangula,et al.  Survey on Mobile Computing Security , 2013, 2013 European Modelling Symposium.

[10]  Bill Morrow,et al.  BYOD security challenges: control and protect your most sensitive data , 2012, Netw. Secur..

[11]  Shashikant Rai,et al.  BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES , 2013 .

[12]  Yong Wang,et al.  Bring your own device security issues and challenges , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).