This post is from the Apperian blog and has not been updated since the original publish date.
BYOD Security: Think Apps and Data
Historically, many companies involved in enterprise mobility have attempted to apply a device-level approach to mobile security. The problem with this method is that it doesn't address a crucial security requirement facing organizations -- protecting enterprise apps and data from malware, viruses, data leakage, and other threats to proprietary information. The most effective approach to protecting sensitive corporate data is through mobile application management (MAM®) with an enterprise app store. With MAM™, companies can use app wrapping to secure apps and data on both personal and corporate mobile devices at the application level rather than at the device level.
This way, no matter how or whether the device is managed, corporate data will always be secure. By “wrapping” corporate apps and data with a company’s unique security policies, multiple layers of protection can be added to apps without changing the app or its code. An app wrapper is able to protect corporate data in the event of a network intrusion while providing corporate administrators additional control. App wrapping allows administrators to add security policies to apps that might also be used to access corporate data. Best of all, employees who own and use personal devices, app wrapping doesn't require the use of a software development kit (SDK) and doesn't interfere with the personal apps on an employee’s mobile device.
Meanwhile, an enterprise app store provides employees with a central location to find approved or recommended apps that are as secure as possible. This helps to ensure that employees are using those apps that have been authenticated by IT while providing the security necessary through each stage of the app lifecycle – from inspection to onboarding to deployment. Taking an app-level approach to mobile security is the best and most effective approach to ensure that employees use IT-sanctioned BYOD security, rather than scrambling for workarounds that jeopardize the security of proprietary apps and data.