- Share this item with your network:
- Download

Access
- NewsVDI, mobility push IT infrastructure services to their limits
- Feature Law firm restricts mobile data access in the danger zone
- FeatureBox cloud service earns the EFSS spotlight
- TipEnterprise app stores improve mobile app discovery, provisioning
- FeatureHow has mobile changed the app development process?
- OpinionUnderstand the principles of data residency
- OpinionEMM vendors prioritize complete endpoint protection

Nmedia - Fotolia
Law firm restricts mobile data access in the danger zone
When remote employees access mobile data, whether in the U.S. or abroad, it can be difficult to restrict that access. But when they travel to blacklisted nations, IT must be especially careful.
The IT pro: Anthony Visceglia is a systems engineer at a global law firm.

The problem: IT needed a way to temporarily restrict mobile data access to sensitive corporate information in blacklisted countries and then restore full access once the employee returned home. "There is no way to completely secure the data that's on an employee's personal phone, and we can't force all their data to go through a secure VPN," Visceglia said. Plus, there's no guarantee that a foreign government isn't tapping into travelers' devices.
The strategy: The firm uses SecureAuth and Ping Identity to enforce location-specific policies for mobile data access. When an employee overseas needs to access certain data, a push notification asks for a biometric marker to confirm their identity. "As soon as they step out of the country, they immediately have access again without delay or the need for a help desk ticket to have someone [in IT] manually switch over the data," Visceglia said.
The result: The firm has seen a dramatic reduction in help desk calls and tickets from traveling employees. Meanwhile, mobile workers don't have to worry about security interfering with their workflows. "We can use it on a résumé to attract new business or differentiate ourselves from our competitors, that we meet some of the more technical, IT-specific standards," Visceglia said.
Next Steps
Best mobile apps for mobile workers
Prioritize access and security when it comes to mobile data
Mobile security and access needs are a balancing act
Related Resources
- Top 5 Enterprise Mobile Security Issues –SearchSecurity.com
- Essential Enterprise Mobile Security Controls –SearchSecurity.com
- Discover the Risks and Rewards Behind a Mobile Workforce –SearchSecurity.com
- SearchSecurity Survey Reveals Top 5 Enterprise Mobile Security Issues –SearchSecurity.com
Join the conversation
1 comment