BorderLAN announces availability of mobile applications and solutions for bring your own device (BYOD) challenged organizations. The announcement focuses primarily on securing email on mobile devices.
BorderLAN Inc., a provider of network security solutions, announced today the availability of a new mobile app for businesses allowing easy access to secure email. With a simple per user pricing model, a user can now utilize email in a secure manner and reduce the exposure of sending and storing confidential information on a mobile phone. Data such as email residing on a mobile device can be detrimental in the event of a theft, loss or hack. In fact mobile device OS’s are just now getting the full attention of the hacking community as they realize the value of the data on the mobile devices.
“The BorderLAN announcement is to ensure our customers know we are diligently partnering and reviewing solutions to ensure data security and compliant technologies.” said Craig Smith, President of BorderLAN Inc., Smith goes on to explain the importance of BYOD – “Mobile computing is projected to be one of the fastest growing market segments in 2013 – 2016. Our preparation for helping customers focus reducing legal liability to corporations for having data like PHI, HIPAA and more on a mobile device, while simultaneously avoiding the liability that would normally come with corporate monitoring of an end user device.”
The app available for email security shows a user simple pin key entry, followed by access to the secure hosted email. In this way nothing is on the device and sending can be entirely secure delivery with a 3rd party encrypted mail service. Smith Continued “According to what we’ve read from Gartner Research in April 2013, 38% of companies plan to stop providing mobile devices entirely to end users by 2016. The primary reason for this elimination of devices is liability. BYOD often takes the place of corporate phones, but are even less secure as they are not monitored or managed. We at BorderLAN feel we can finally have the convenience of mobility while maintaining security.”
BorderLAN Network Security sees a steady increase of the use of mobile devices, both corporate owned and private over the next three years. The ability to secure these mobile devices will empower companies to finally use the mobile technologies for convenience and customer service in a way never before seen.
For more information on Bring Your Own Device For Secure Email – Click Here.
Any challenge in supporting the increasing diversity of devices involved with BYOD?
Anytime you open the door for outside devices you have to ask yourself “what is technology’s role in your tech plan?” With a NAC solution you have the ability to detect what kind of device is trying to connect to your network; with policies you can determine what access to give. Furthermore the NAC solution can also detect if that device is “safe” for your network by detecting Anti-Virus setting to insure compliance.
Let’s face it: IT managers are not salesmen and often can be completely misunderstood with “geek speak”. With terms like BYOD, SNMP, NAC, MDM and even PC can become confusing to the non-initiated.
The key is to sell the sizzle not the steak.
In other words what decision makers want to hear is not BYOD but how awesome it will be if “Johnny” can bring his laptop he got for Christmas to do school work. Without having to do a lot of training for the teachers or risk to the network.
For years IT managers have been worried about people bringing their own technology into the classroom – what kind of viruses are they bringing onto the network? How many hours will be lost from support tickets from technology that’s not even owned by the school?
But as time progresses so did the realization that the funding level for technology maintenance and growth in schools are insufficient.
With a Network Access Control (NAC) a school can now set policies and provides a security gateway for newly connected machines. The NAC can provide flexibility to select and use policy modules needed to satisfy the requirements of their security plan and enforce them across the network. Read More: http://borderlan.com/byod-for-schools/
Technology is playing an increasing role in education every year – we have to have a greater density and access to technology. At one time it was a popular expression “10:1” that’s a ratio of ten students to computer but now “1:1” is becoming the standard.
Most decisions are made to move into BYOD comes with a realization that with schools limited budgets makes it impossible to reach the technology density required to be effective.
BorderLAN’s BYOD solution makes it possible for students to bring their own devices to school while at the same time maintaining required standards (Security, privacy and regulatory). Read More.
I was fascinated at the idea we might be able to overcome the fact we have a growing need to provide access to our students. Because of the kind of curriculum deliver we are faced with and that’s only going to become more important. Without having to expend massive amounts of money that we don’t have, to provide these technologies for the students.
The secret is that all these kids have parents/grandparents/guardians that give those kindles, iPads, laptops for birthdays, Christmas etc. Furthermore these kids are often better then us at using these technologies. So why wouldn’t we want to find a way to let the students bring these technologies on campus.
The problem is we have a number of things we have to deal with that are different than businesses like Starbucks. Among them are the CIPA/FIRPA regulations and the risk of allowing viruses into the network. BorderLAN’s BYOD solution allows non-organization owned devices to connect with less worry of security breaches, viruses and open policy. It’s also very easy to use and implement and enforce compliance with policies in place.
The SafeConnect NAC solution provides the flexibility to select and use only the policy modules needed to satisfy the requirements of their security plan. Administrators can implement the policy modules standard to the SafeConnect solution including compliance with anti-virus, anti-spyware, Microsoft OS patches, as well as registration and authentication.
Other standard policy modules include peer-to-peer file sharing, access points, and power management. Custom policies can also be created based on the existence or non-existence of file types, registry settings, services, and processes on endpoint devices.