When I speak to CISOs about the future of the mobile workforce, I am reminded of Gandalf from The Fellowship of the Ring: “Keep it simple. Keep it safe.”
Ok, that is not an exact quote from J.R.R. Tolkien, but the similarities are striking. The earnestness with which IT and security professionals implore that business apps be both secure and easy to use accentuates the gravity of the situation they face. The data wraiths and thieves are constantly on their heels. With mobile devices, the physical loss of the device—and the data it contains—is a new threat. And even if the device remains firmly in the clutches of the user, the data may not. There are a multitude of mobile apps that make it easy to share and over-share data. If workers find the corporate app to be too difficult to use or it hinders their workflow, they are likely to turn to unapproved alternatives.
For these reasons TITUS has built our mobile apps to be familiar and intuitive while providing enterprise-grade security, such as Microsoft Rights Management and geofencing. With the latest release of TITUS Classification for Mobile we have further enhanced mobile email, calendar, and contact security. Of particular note, we have added certificate-based authentication. Here is why:
- It is easy for your users
With certificate-based authentication, users are not required to remember a password. Once the certificate is installed on their device there is nothing further for the user to do.
- It is more secure
Following from the point above, because user-chosen passwords are of notoriously poor strength, managing authentication with a certificate provides greater security for your data by eliminating the potential for criminal password phishing, key logging, or guessing. In addition, because the certificate must exist on the device being used it is not possible for the employee to login using an unapproved and unsecured device.
- Share certificates across networks and applications
Certificate-based authentication can be enabled across your enterprise since many applications and networks support the same public key standards. As a result, the same authentication system can be extended to users when they are at their desktop, connecting via VPN, or on their mobile device.