If you give your users company-issued Android devices, or allow them to use their own as part of your BYOD strategy, you are probably familiar with the struggle between them wanting to run apps on their devices and your security teams trying to protect the confidentiality and integrity of corporate data on many devices.
The security teams' view is clearly justified: apps that "exfiltrate or leak sensitive data from the device" were identified as a significant risk in CESG's recently published guidance on how to enable users to access protectively marked information on Android devices.
On the other hand, if your users have 'brought-their-own-device', it is understandable that they will want to use it as their own, keep personal information on it and install apps on it. Even with a company-issued device, your user will likely demand apps to help improve their productivity. If this challenge is not managed properly, it can pose a significant threat to your corporate data and network.
Share