Advertisment

ENTERPRISE APPLICATIONS : Protecting Mobile Access

author-image
VoicenData Bureau
New Update

Smartphones and personal digital assistants (PDAs) are among the top growth

technologies today, as organizations use mobile devices to provide personnels

with the information needed to make informed decisions anytime, anywhere. This

mobile business intelligence (BI) raises the value of mobile devices by enabling

organizations to use them to deliver accurate, mission-critical performance

information that is customized to personnels, where and when they need it.

Advertisment

As the delivery of business intelligence on mobile devices becomes

increasingly popular among organizations, five important security guidelines

must be considered.

Authentication



Authentication ensures that only users with valid passwords, IDs and related

identifiers can access a system. Mobile BI solutions should be security agnostic

and must work with an organization's existing security model to define and

maintain identifiers, such as user names, IDs, passwords, regional settings, and

personal preferences.

Mobile BI solutions should also support multiple user communities, including

the ability to assign permission rights to users to ensure that only those with

the proper permission have access to specific folders, sub-folders, reports,

analyses, scorecards, dashboards, shared group-based portal pages, and other BI

capabilities.

Advertisment

Ideally, mobile BI solutions should leverage your existing organizational

security structure to secure all BI content, including the content used on

mobile devices.

Authorization



Authorization ensures that only certain users, groups, and roles can access

specific data or information, and can perform only certain actions on that data

or information.

Advertisment

While setting these access permissions, organizations should leverage users

and groups defined within their existing authentication providers. As with

authentication, the authorization security measures that you establish apply to

all of your BI content.

Safeguard Sensitive Data



Most mobile BI solutions come with an encryption mechanism for all data and

communications. Only authenticated and authorized sources and users can decrypt

the data, converting it back into a meaningful form that can be accessed and

understood. Encryption security applies to all BI data communicated between and

used on mobile devices.

Mobile device manufacturers are acutely aware of the security issues that

users face on their devices and the need to address these issues with security

geared specifically for their products.

Advertisment

Passwords: More Complex, the Better



Passwords are used to control who can use and access data on a mobile

handheld device. To maximize password protection, it is highly recommended to

create a strong password that aligns with password policies of the enterprise.

Strong passwords are refreshed every few months and typically mix numbers, upper

and lower case letters and alpha numeric characters are used.

'Kill' Lost or Stolen Devices



If a device is reported lost or stolen, an administrator can prevent data

stored on the device from being accessed. The administrator sends a remote

'kill' command to the device, erasing all the data on the device-including data

in memory-disabling it from further use.

If connections are disabled on a lost or stolen device, there is no way to

remotely wipe the data. 'Lease key' technology addresses this challenge by

ensuring that data stored on mobile devices remains safe even if a device is

offline and cannot be contacted by an administrator.

Lease key technology functions like a hotel key. The key is enabled for the

duration or lease of your stay. When you check out, your key is disabled and you

are unable to access the room. The room is still there, but you can't gain

access until you make appropriate arrangements, or in the case of some mobile BI

solutions, until you connect, re-authenticate, and are granted a new lease key.

Consequently, BI data is even more secure on mobile devices than email.

V Subramanyam



The author is VP, information management, IBM


Software Group, India/South Asia


vadmail@cybermedia.co.in

Advertisment