We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not a subscriber? Subscribe now for unlimited access to online articles.

Business Report

How to Secure the Virtual Office

The explosion of mobile devices requires cloud-based solutions—and means that companies have to pick and choose what data they protect.

Employees are increasingly gobbling up Internet-connected mobile gadgets: they’ll buy nearly a half billion smart phones this year and more than 50 million tablets, nearly triple the number of tablets sold in 2010.

Source: Gartner

Employees using such gadgets to connect remotely to company servers and e-mail accounts can boost efficiency; but the practice also creates security challenges. Companies will have to learn how to overcome those challenges for the distributed office of the future to succeed.

This story is part of our September/October 2011 Issue
See the rest of the issue

Companies have long recognized that mere “perimeter security” around the office network doesn’t work anymore. That security model was killed off by the laptop. But traditional solutions to managing laptops—including running security software on them and setting up encrypted communications channels known as virtual private networks (VPNs)—don’t really succeed. Attackers have learned to customize malicious programs that can remain undetected for days or weeks. And VPNs only protect against eavesdropping. They’re useless against already-infected devices.

The results can be ugly: witness the Department of Health and Human Service’s Wall of Shame, a list of medical-record-related breaches, including 32 incidents this year, of which 18 were caused by lost portable devices or laptops. Such security issues are widely expected to worsen.

The problems have forced information-technology teams to switch tactics: rather than trying to secure the device, they’re coming up with ways to protect sensitive data even if the devices are compromised.

For example, Heartland Payment Systems, the credit-card processing firm—chastened by the loss of 130 million records during a conventional 2009 server breach—now treats all devices, whether mobile phones or remote point-of-sale terminals, as compromised. So these devices only refer to credit-card data using tokens; that is, special codes that correspond to the actual data, which sits in a protected digital vault, says Kris Herrin, the company’s chief technology officer.

The security firm Symantec focuses on protecting its source code, financial data, and intellectual property, ensuring that such information cannot leave the company without significant protections, says David Thompson, Symantec’s chief information officer.

Cloud security solutions, from companies such as Websense and Zenprise, are another option. Websense’s cloud service brings e-mail and Web security to any device that connects to the Internet. Rather than forcing users to connect back to the home office for security protections, a Websense proxy filters out malicious code and spam. Zenprise, meanwhile, helps companies manage their devices through the Internet. For instance, it can remotely erase the memory on lost or stolen devices.

Given the exploding need, the Radicati Group, an analyst firm, predicts that the market for cloud security services will double, to more than $2 billion in worldwide sales, in the next four years.

A different way of dealing with device proliferation is to place a small secure program—known as a virtual machine—on an employee’s device to interact with corporate data. The model, which is used by an increasing number of banks to enforce security on customers’ computers, lets companies claim a piece of the user’s device as a fenced-in compound.  

When banks use such technology, consumers are allowed to opt-in to the service and install the plug-in. Then, when a consumer connects to his bank’s server, the virtual machine does all the communicating, separate from the device’s original operating system. The technology isn’t foolproof, but it stymies attacks that could get by antivirus and antifraud monitoring.  

“I actually think that enterprises can learn from banks and financial institutions on how to secure their employees these days,” says CEO Mickey Boodaei of Trusteer, which offers banking customers such a solution, and is beginning to offer the technology to companies that want to secure devices owned by employees, but used for work.

The race is on to define the new blockchain era. Get a leg up at Business of Blockchain 2019.

Register now
Next in this Business Report
The Future of the Office

The explosion of mobile devices, together with social technologies and smart apps, is creating a new distributed workforce. It’s transforming physical offices and how work gets done. This month, Technology Review examines the implications of this trend for business efficiency, productivity, and security.

Want more award-winning journalism? Subscribe to All Access Digital.
  • All Access Digital {! insider.prices.digital !}*

    {! insider.display.menuOptionsLabel !}

    The digital magazine, plus unlimited site access, our online archive, and The Download delivered to your email in-box each weekday.

    See details+

    12-month subscription

    Unlimited access to all our daily online news and feature stories

    Digital magazine (6 bi-monthly issues)

    Access to entire PDF magazine archive dating back to 1899

    The Download: newsletter delivered daily

You've read of three free articles this month. for unlimited online access. You've read of three free articles this month. for unlimited online access. This is your last free article this month. for unlimited online access. You've read all your free articles this month. for unlimited online access. You've read of three free articles this month. for more, or for unlimited online access. for two more free articles, or for unlimited online access.