ECM policy points critical in BYOD

Enterprise mobility remains a powerful trend in the private and public sectors, with the vast majority of organizations allowing employees to use smartphones, tablets and portable computers, along with a range of apps. However, analysts have continued to find relatively lackluster results regarding how companies are handling their mobile data, apps, devices and users, as many reports have found that fewer than half of firms have a formal policy in place.

Flying blind in enterprise mobility presents some of the gravest threats to corporate data security and continuity, as smartphones and apps have been designated as the favorite targets of hackers today. Should companies not cover content services (ECM) in their BYOD policies, they will be inherently at greater risk of experiencing a data breach before long.

Continued security shortfalls

Computerworld recently reported that a new study on BYOD revealed roughly 53 percent of companies are still operating without a mobile policy in place. And, more than 25 percent have not yet implemented a reasonable security strategy. The research, conducted by infrastructure consulting firm Champion Solutions, showed just how far behind the majority of businesses are with respect to the full range of mobile-related matters.

Businesses need to put the pieces of BYOD together quickly. Businesses need to put the pieces of BYOD together quickly.

Remember that security and control only represent two pieces of a much larger pie. When companies do not have plans in place to support mobile users, rogue IT can quickly become an issue. When access is stifled, productivity will drop. Put simply, leaders need to recognize the importance of formal, comprehensive policies for mobility, and act soon to get the strategies in place. Computerworld added that it would be difficult to enjoy the benefits of BYOD in any regard without a tight policy in place.

Interestingly, the researchers also found that multi-factor authentication has not caught on thus far, and that companies might be more focused on ECM from a security standpoint today.

“Right now, there’s some confusion and trepidation in the market about MFA,” Champion Solutions Director of Software Development Jason Milgram told the source. “None of our customers are incorporating biometric authorization into their security plan, even though they will eventually. Many are focused on enterprise content rights management and all of them are working out their strategy.”

ECM app monitoring’s place in BYOD

In addition to the core demands of BYOD policy management, including device and user oversight, companies will need to focus on the ways in which ECM apps will be impacted by relevant activities. Should employees not be able to access mission-critical ECM apps from their mobile devices, they will not be nearly as likely to be optimally productive. In that same vein, when ECM apps are too open, security risks will ensue.

As such, leveraging ECM app monitoring software can go a long way toward maintaining optimal mobility performance across the business, all the while boosting data security for the firm.