As the majority of businesses have begun to allow employees to use their own laptops, smartphones and tablets to access company databases, policies regarding the security of corporate information requires cloud technology and remote database support to uphold these regulations.
Findings from the Cisco’s IBSG Horizon Study revealed that 65 percent of employees require access to corporate networks from personal mobile devices in order to properly perform their jobs. Businesses cite heightened collaboration and productivity as well as improved job satisfaction as the main advantages to the bring-your-own-device (BYOD) phenomenon.
However, granting employees the ability to view sensitive data on more devices has raised concerns regarding the company’s ability to monitor and control this access. Siemens mobility portfolio vice president Randy Roberts explained the stress this has caused security personnel to Computer World UK.
“IT folks are scared to death because they’re realizing now that BYOD is happening on their networks, there are devices hitting their networks they’re not aware of. And they don’t know what kind of devices they are, they don’t know who these people are, what applications they have or what content they’re getting access to,” he said.
According to Computer Weekly, 62 percent of enterprises have turned to cloud technology to resolve these security concerns, are planning on using them or are in the process of researching them.
The continual migration to the cloud is most likely due to the fact that the BYOD phenomenon has caused IT professionals a lot of frustration surrounding data protection.Where previously, it was easy to micro-manage access to data, an increasingly mobile workforce has made monitoring database use far more complicated.
Forrester Research senior vice president and analyst Ted Schadler told Computer World UK that cloud technology will be a primary answer to this dilemma. He explained that usability is the key to efficient work in a BYOD workplace, and traditional on-site storage administration of mobile services requires case-by-case granting of authorization, delegation of login access capabilities and creating firewall pathways, among other time-consuming operations. Conversely, Schadler suggested that cloud technology is an optimal long-term solution to integrating mobile and non-mobile devices more seamlessly.
Cloud hosting allows businesses to manage database activity on all employee devices from a remote, virtualized location. As enterprises accept that BYOD is an integral part of the modernized workforce and critical to productivity, companies will also leverage cloud servers for better information governance and enhanced data safety.