Combining MDM and BYOD: The Best of Both Worlds

ZixCorp's Johnson on a New Look at Mobile Device Management
Combining MDM and BYOD: The Best of Both Worlds

Users' fear of data loss on personal devices must be balanced with an organization's need to protect sensitive information, says ZixCorp's Nigel Johnson. He explains the evolution of mobile device management.

See Also: A Framework for Securing Mobile Applications

Johnson, vice president, business development and product management, says that mobility used to be simple, with a company issuing and controlling an employee's mobile device. But today, many employees want to use their own devices on the network, creating new security challenges.

"The most concerning thing is the idea of the company controlling their personal device," Johnson says. "People realize that if you have MDM on your phone, and the company is controlling it, they can see your photos, or can wipe them out."

In an interview recorded at the Gartner Security & Risk Management Summit, Johnson discusses:

  • The evolution of BYOD and MDM;
  • How specific solutions allow for a balance between personal and corporate needs;
  • Why employees should be asking for better BYOD solutions.

Johnson joined ZixCorp in April 2004 and serves as vice president, business development and product management. He has more than 20 years of IT security experience, and leads efforts to develop ZixCorp's OEM channel and set the development direction for the ZixCorp Email Encryption Service. Prior to joining ZixCorp, Johnson held senior management positions at Entrust Inc., including vice president of product management and vice president of business development.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.