Nmedia - Fotolia

Problem solve Get help with specific problems with your technologies, process and projects.

Law firm restricts mobile data access in the danger zone

When remote employees access mobile data, whether in the U.S. or abroad, it can be difficult to restrict that access. But when they travel to blacklisted nations, IT must be especially careful.

This article can also be found in the Premium Editorial Download: Access: How to make your IT infrastructure systems EUC-ready:

The IT pro: Anthony Visceglia is a systems engineer at a global law firm.

Anthony ViscegliaAnthony Visceglia

The problem: IT needed a way to temporarily restrict mobile data access to sensitive corporate information in blacklisted countries and then restore full access once the employee returned home. "There is no way to completely secure the data that's on an employee's personal phone, and we can't force all their data to go through a secure VPN," Visceglia said. Plus, there's no guarantee that a foreign government isn't tapping into travelers' devices.

The strategy: The firm uses SecureAuth and Ping Identity to enforce location-specific policies for mobile data access. When an employee overseas needs to access certain data, a push notification asks for a biometric marker to confirm their identity. "As soon as they step out of the country, they immediately have access again without delay or the need for a help desk ticket to have someone [in IT] manually switch over the data," Visceglia said.

The result: The firm has seen a dramatic reduction in help desk calls and tickets from traveling employees. Meanwhile, mobile workers don't have to worry about security interfering with their workflows. "We can use it on a résumé to attract new business or differentiate ourselves from our competitors, that we meet some of the more technical, IT-specific standards," Visceglia said. 

Next Steps

Best mobile apps for mobile workers

Prioritize access and security when it comes to mobile data

Mobile security and access needs are a balancing act

This was last published in June 2017

Dig Deeper on Enterprise mobile security

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What tools do you rely on to protect mobile data?
Cancel

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close