Security Sales & Integration

July 2013

SSI serves security installing contractors providing systems and services; surveillance, access control, biometrics, fire alarm and home control/automation. Coverage in commercial and residential product applications, designs, techniques, operations.

Issue link: https://securitysales.epubxp.com/i/141570

Contents of this Issue

Navigation

Page 12 of 91

Industry Pulse IN DEPTH Rise of BYOD Opens Integrators to New Consultative Role Te thought alone has security and IT managers quaking in their boots. An employee uses his personal smartphone to pull a customer report and inadvertently exposes the organization's network to a malware attack. It is that type of breach that organizations are increasingly forced to defend against as they implement bringyour-own-device (BYOD) programs, which enable employees to use their personal devices for work activities. Fueling the BYOD trend is the rapid adoption of smartphones and tablets, along with easily accessible apps and cloud-based services. According to a recent study conducted by a group of Cisco partner frms, 90% of full-time workers in the United States use their personal smartphones for work purposes. Among other fndings, 39% of employees who use personal smartphones for work don't password protect the devices, and 52% access unsecured WiFi networks. While the consumerization of mobile devices is giving today's workforce newfound fexibility, organizations of all sizes are grappling with adopting written policies that stipulate what company data can be accessed with the personal devices, says Paul Boucherle, CPP, principal of Canfeld, Ohio-based Matterhorn Consulting. "IT departments are in the beginning phases or committee phases of putting together parameters around this animal because it is so big," says Boucherle, who pens SSI's "Convergence Channel" column. "It requires IT to do a ton of work." Systems integrators will be increasingly thrown into the BYOD fray as they seize opportunities to provide technologies and consultative services to end customers. For instance, NearField Communications (NFC)-enabled smartphones are projected to one day be used widely for mobile access control credentials in organizations and campus environments. Tose integrators that have invested Employees are increasingly using personal mobile devices, such as smartphones and tablets, for work-related duties. The burgeoning trend is forcing organizations of all sizes to adopt bringyour-own-device (BYOD) policies to protect network security and other business operations. in IT infrastructure skillsets will be ideally situated to win in the BYOD marketplace, says Julian Lovelock, vice president of product marketing, Identity Assurance, HID Global. "It's not going to happen overnight, but this transition to mobile-based credentials is going to be one of the areas where that investment over time pays of tremendously," he says. "Because credentials you put onto the phone are by no means limited to physical access credentials. Tey can be credentials that are equally used to access IT infrastructure." Vector Resources, a physical security and IT systems integrator based in Torrance, Calif., is actively providing technologies and services for BYOD-driven projects. Illustrating the mushrooming use of mobile devices across the security and IT landscape, Vector is gaining traction with clients afected by requirements of the Health Insurance Portability and Accountability Act (HIPAA). "A lot of agencies that deal with protected health information are moving toward electronic systems. A lot of them use contracted doctors and contracted health-care workers who don't want to be told what mobile devices to use," says Vector's Patrick Luce, director of consultative services. "With that there is a huge demand in those spaces for appropriate BYOD policies and technologies to help them move forward with it." Luce explains that implementing BYOD entails four main components: establishing BYOD policies; having appropriate security technology in place to secure the network and mobile devices; adherence to software licensing; and training. "All of those are all income opportunities for a technology company," he says. Integrators can look to manufacturing partners to receive training and education related to BYOD technologies, but that is only a part of the equation to developing a sound business application, according to Chuck Wilson, executive director of the National Systems Contractors Association (NSCA). Tat's where associations such as NSCA, Security Industry Association (SIA) and the Electronic Security Association (ESA), Wilson says, can play an important role in formulating BYOD best practices to inform the industry about the risk/reward on the business side as well. "What everybody is racing to do is apply the same [consumer] technology to corporate settings without thinking through what are we really dealing with in terms of the risk potential," he says. "It speaks to what our industry is all about today. You are both in the business of providing technology to these end points, but you are also in the business of helping your clients secure their organizations as well." JULY 2013 / SECURITYSALES.COM / 11

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Sales & Integration - July 2013