Marlow, 18th February 2013 - Organisations across the UK are floundering when it comes to managing consumer devices in the enterprise, but it can be done with the minimum of fuss and a simple set of rules, according to Trend Micro's new Technical Director, Michael Darlington.
With a career spanning over 20 years at big name IT companies like Fujitsu and CSC, Darlington has witnessed first hand how technology advances have forced IT managers to make difficult decisions on security.
“I’ve done a lot of evangelising about the blurring of boundaries in organisations around ‘internal’ and ‘external’ spaces,” he says. “The key is about redefining the perimeter around where the organisational boundaries are.”
An effective BYOD strategy should be centred around roles-based access controls, based in turn on a clearly thought-out policy drawn up by IT in conjunction with the business, according to Darlington.
Once these basics are in place, the type of device used – whether employee or company owned – becomes almost irrelevant, as long as users can access corporate applications and data according to their roles and no data resides on that smartphone, tablet or laptop, he says.
Of course, the relevant technology needs to be acquired to check and manage those logging on and ensure their devices are clean of malware, but such tools are readily available.
In redefining their perimeters, organisations must not overlook the potential risk from partners and other third parties who may require network access, says Darlington. “These partners may not have the same protection you have in your organisation so the key is to protect against those risks, by giving them access only on a case-by-case basis,” he adds. “People spend a fortune on protecting the perimeter but it’s really about redefining where that is, and third parties need to earn the trust to be included.”
Darlington honed his IT skills over the past two decades delivering a broad range of solutions and services to a huge breadth of different sectors including local and central government, healthcare, financial, manufacturing, utilities and retail.
As Technical Director at cloud security specialist Trend Micro, he will be leveraging his skills to position and deliver Trend Micro’s offerings to ensure his customers fully understand the risks, benefits and how they mitigate against an ever-changing landscape.
About Trend Micro
Trend Micro Incorporated (TYO: 4704), a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, Trend Micro™ Smart Protection Network™ provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.
All of solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe.
For more information, visit www.trendmicro.com/en_gb/. Or follow our news on Twitter at @TrendMicroUK.