Prevent enterprise IoT security challenges with preparation
A comprehensive collection of articles, videos and more, hand-picked by our editors
Wearable devices could be coming to an organization near you, so it’s time for IT administrators to assess the...
management and security capabilities around wearables in their business. Companies with sales workforces or field workers, or in verticals such as healthcare and manufacturing, may soon find uses for wearables that can provide employees with a hands-free, portable app experience.
Given the unique properties of wearables, it will take time for vendors in the enterprise mobility management (EMM), WLAN, and wireless intrusion prevention system markets to fully integrate these new kinds of devices into mobile policies and device settings and alerts.
However, there are many opportunities for IT to use existing platforms to manage and secure wearable devices. IT departments should get a head start on developing a wear your own device (WYOD) strategy, and the following seven suggestions are a good way to begin.
- Companies can adjust their EMM policy to combine restrictions with geofencing. IT can disable Bluetooth between wearable devices and IT-managed smartphones or tablets, either altogether or in high-risk areas.
- Use EMM application blacklists to disable wearable-specific apps on managed smartphones. Better yet, IT-managed containers and tools such as Apple's Managed Open In feature can control the flow of data between enterprise apps. IT has several resources available to prevent users from sharing business data in personal apps specific to their wearables.
- When wearables lack enterprise-grade authentication, IT can use WLAN access control lists and intrusion prevention systems to block or allow enterprise network access to business wearables.
- If your organization allows WYOD, consider using authentication such as biometrics, proximity and geofencing. These approaches are useful for enabling the device itself and for using wearables as an authentication token to unlock or start other business resources.
- Analyze network traffic to detect and measure the workload that wearable-generated data streams create. However, employers may want to avoid logging wearable device traffic too extensively, given that if often includes personally identifiable information.
- Use wireless intrusion prevention systems (WIPS) to detect and report on irregular connections and potential attacks that could exploit business wearables. As with any new consumer electronics, wearables are likely to harbor at least a few vulnerabilities, and it's important to identify and address any low-hanging fruit.
- IT can already manage a few wearable devices as if they were smartphones -- most notably, Android-based smart watches. For the others, IT can use regular EMM to assess and enroll devices, provision security policies, applications and data containers, and apply actions such as find and wipe when business wearables are lost or stolen. Craft custom policies for these devices to balance risk and usability, and work with early adopters to refine those policies for future use.
As more wearables enter the workplace, EMM, WLAN and WIPS providers will adjust their services to allow better wearable device management. However, IT can't ignore security concerns in the meantime, as there are already several useful options out there to manage wearable access.
Five things IT should know about wearable devices
How wearables could fit into the enterprise
Wearable heart rate monitors enter the consumer market
Related Q&A from Lisa Phifer
Understanding the functions of a wireless access point vs. wireless router will help you deploy the right device for the right circumstance.continue reading
Learn the difference between a site-to-site VPN and a remote-access VPN, as well as the protocols used for each one.continue reading
Need to send an email, check your flight's status or get ready for a presentation? You can do it all on your smartwatch, thanks to a slew of Apple ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.