ConditionalAccess

One of the buzz phrases we hear these days is “the rise of the mobile workforce.” Well guess what? The mobile workforce isn’t on the rise—it’s here, it’s here to stay, and most organizations have caught on already. Gartner estimates that by 2017, 90 percent of organizations will support BYOD to at least some extent, and by 2018 twice as many employee-owned devices will be used for work as enterprise-owned devices.

This makes a lot of sense. One, employee satisfaction is highest when workers can use the devices of their choosing whenever and wherever they want (and we’ve seen time and again that they’ll do this regardless of corporate compliance rules); and two, BYOD maximizes IT budgets by limiting cost and broadening access. In that same report, Gartner found that the cost of supporting user-owned tablets was 64 percent lower than buying and supporting enterprise-owned tablets. That’s to say nothing of the enhanced productivity that both user and organization enjoy. BYOD is a win-win.

Breach or business as usual: which is which?

Of course, security is a major concern, and one of the most common forms of data breach occurs when someone is not who they appear to be. A 2013 Verizon data breach investigation report found that over 70% of network intrusions exploited weak or stolen credentials—meaning someone posed as an authorized user, got in, and caused untold damage. Worse yet, this wolf in sheep’s clothing could avoid detection for weeks, months, or even years because they had the proper credentials and evaded common safety nets.

One of your first lines of defense is to spot fishy logins: is someone accessing data from far away, at a weird time? However, since mobility solutions allow employees to work wherever they are—anywhere in the world, at any time—how do you tell what’s a breach, and what’s just business as usual, without disrupting your business?

Conditional Access keeps your data safe—smartly

Let’s say a Sales VP is on a business trip to London, and recently accessed the corporate SharePoint from her personal iPad. An hour after that login, her account attempts to login again, but this time from an IP address in Romania. Sound plausible? Or even possible?

That looks like a case of compromised credentials, and is exactly the kind of thing you want your mobile management solution to catch. If your organization is using Microsoft Enterprise Mobility Suite (EMS) to manage devices and applications, you already can identify odd behavior signaling a possible breach with Conditional Access.

Powered by EMS, Conditional Access is the industry’s most comprehensive access solution. By setting customizable requirements including location, device compliance, behavior, and risk, you get identity and threat mitigation that works for your organization and your mobile users. Conditional Access can also help with compliance, by making sure only compliant devices can access data.

If you’re interested in learning more about how Conditional Access and Enterprise Mobility Suite with Long View Advantage can prevent data breaches and transform how your organization works, give us a call today.