When it Comes to BYO, Securing the End Device is a Losing Proposition for the Enterprise


When it Comes to BYO, Securing the End Device is a Losing Proposition for the Enterprise

By Laura Stotler

When it comes to the bring-your-own (BYO) trend, Moka5 operates on a pretty basic tenet. It is one that extends from the end device all the way to the cloud, and covers all points in the middle, regardless of how they may be configured.

"There will always be ways to thwart device security and device management," says David Appelbaum, senior vice president of marketing at Moka5. "Don't manage the device, assume the device is corrupted." Given the myriad security solutions on the market today aimed at isolating the end device, or a specific application, or even a specific network, that's a pretty bold approach. And yet, the world is pushing toward a BYO model in which end users are employing their own PCs, laptops, smartphones and tablets to move data all over the place. The cloud can present a wild card in that equation depending on how it is used, and so Moka5's concept of protecting data and not individual devices is a sound one.

Moka5, based in Redwood City, Calif., secures the workspace instead of end devices, locations or specific applications. The company uses client virtualization to create "containers" that essentially isolate the end user's workspace from the end device and over whatever network is being used, to wherever data is traveling. Transactions are fully encrypted within the container, while users' personal data and apps may continue to reside on their end devices, outside of the Moka5 secure perimeter. The company's platform may be used for everything from desktops to smartphones to tablets.

Image via Shutterstock

The container is created using the BareMetal principle in which client-virtualization software is installed directly on any machine. Once the Moka5 workspace is created with all the relevant apps and data, isolated from the underlying OS, the software creates a single "golden" image for all corporate devices. That image may be updated, modified or deleted completely from a device within seconds through central management.   

"What you're getting is essentially a second computer," says Appelbaum. "Why would you spend the time and money to update a $500 or $600 device?" He added that with smartphones, laptops and other end-user devices now commodities for most remote workers, fueling the BYO trend, it doesn't make sense to issue each user a costly corporate device, with regular software and security updates required that an in-house IT department must perform.

And yet many large enterprises are clinging to an expensive, resource-intensive method of managing remote workers, and one that flies in the face of BYO. As more and more C-level executives employ smartphones and tablets and insist on using them to access corporate email and other data, IT departments have been forced to support those devices. And they are doing that in the manner they're accustomed to, which is to secure the device.

"The problem is when you take that kind of approach, you're suddenly dealing with systems that are very heavy, intrusive and costly," said Appelbaum. "It defeats the purpose of why you're using the device in first place - because it's lightweight and flexible." He added that heavyweight apps meant to secure end devices often fail to differentiate between which data and apps belong to the end user and which are corporate. In a nutshell, it's not an effective way of isolating work from play.

Moka5 believes cost savings will be the ultimate driver in propelling enterprises to adopt a new approach to BYO. When companies realize just how much they can save by securing data on workers' existing BYO devices as well as network access, they will understand the true value of this approach.

And as far as the cloud is concerned, adoption and deployments should not interfere with BYO. People are used to popular cloud apps like Dropbox for moving data and that's not likely to change any time soon, according to Appelbaum. But cloud-based file sharing, storage and other apps may be used effectively within Moka5 containers, eliminating security headaches for IT administrators. The company also plans to make its own cloud announcement during the first half of 2014.

Moka 5 is now focusing on the Asian market, with its evolved mobile infrastructure and growing deployments of BYO and remote and offshore contractor scenarios. The company is releasing a Mandarin version of its platform, and is working with distributor Lenovo to expand their footprint in the overseas market.

Edited by Alisen Downey

MSPToday Contributing Editor

Related Articles

ISG, cyberconIQ Address Human Error Cyber Security Risk

By: Greg Tavarez    9/23/2022

ISG formed a partnership with cybersecurity platform cyberconIQ to address the human side of cybersecurity.

Read More

Companies Increase IT Security Spending as Ransomware Rises

By: Greg Tavarez    9/23/2022

Almost two-thirds of companies increased IT security spending from 2021-22 according to GetApp's "Fourth Annual Data Security Report."

Read More

Blackfoot Communications Delivers Wireless WAN Options with Cradlepoint

By: Greg Tavarez    9/23/2022

Blackfoot Communications joined Cradlepoint's partner program to deliver wireless WAN solutions to a growing client-base of enterprise organizations a…

Read More

Infrastructure as a Service: The Foundation of an XaaS World

By: Juhi Fadia    9/22/2022

Smart MSPs have completely shifted their own overall architecture built around IaaS.

Read More

ColorTokens to Tackle Cyberattack Damage Prevention Challenge with Zinfinity

By: Greg Tavarez    9/19/2022

ColorTokens partnered with Zinfinity to address how organizations can prevent damage when attackers get in.

Read More