(ID999) INCIDENT RESPONSE - Tel: UK 0044 1732 897 601

Integrated Technology Solutions (BYOD)

BYOD Security

Today, employees expect to use personal smartphones and mobile devices at work, making BYOD security a concern for IT teams. Many corporations that allow employees to use their own mobile devices at work implement a BYOD security policy that clearly outlines the company's position and governance policy to help IT better manage these devices and ensure network security is not compromised by employees using their own devices at work.

Mobile device management (MDM) / Remote working

Access Any Application, Any Where, From Any Device, Any Time Securely 

The world we work in today is rapidly changing! There is an ever increasing need for workers to access corporate networks and applications from anywhere, using any device at any time securely!

By 2014, some 80% of professionals will use a minimum of 2 personal devices to access corporate systems. The world we work in today is rapidly changing! There is an ever increasing need for workers to access corporate networks and applications from anywhere, using any device at any time securely. 

Consumerisation of IT

In the consumerisation of IT, BYOD is a phrase that has become widely adopted to refer to employees who bring their own computing devices – such as smartphones, laptops and PDAs – to the workplace for use and connectivity on the corporate network.

Ensuring your data is secure?

To meet with this ever increasing need, Vigil has integrated a combination of tools from Ultra Electronic AEP Networks, SecurEnvoy and FancyFon to provide a unique, comprehensive secure solution.

  1. Secure Remote Access
  2. Identity & Access Management Solutions
  3. Mobile Device Management

The BYOD integrated solution

In combination, you can allow a user and their corporate devices (securely accessed by SecurEnvoy and locked down and managed by FancyFon) to be able to go to specific secure locations (based on AEP layers of validation) or not as the case may be.

The solution/integration

To effectively protect your corporate assets and increase employee productivity, you need to ensure that workers have best of breed security and access management, according to their user privileges, from sign on through to their applications. With BII's vast experience in this area and technical knowledge, they have put together a solution using the following:

Ultra AEP Networks

Today's focus is shifting from user-centric validation to device-centric validation. AEP offers multiple granular layers of validation to confirm both the identity of the user and also the device they're using. Based on verification you can also get access to specific locations or applications inside your network.

FancyFon

FancyFon allows you manage those smart devices (not just phones) which you as an organisation are accountable for. It allows you to tie down the functionality of a device so that it is really only used as a corporate device. It can also enforce a policy on user's personal devices too. For example, with the new release it is possible to put a policy on someone's smart device and enforce it during offices hours.

SecurEnvoy

SecurEnvoy's SecurAccess provides two-factor, strong authentication for remote access solutions without the complication of deploying hardware tokens or smartcards. Two-Factor authentication is provided by the use of your PIN and your Phone to receive the onetime passcode.