Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Consumerization

Protect your business data with five BYOD security apps

By Jack Wallen February 19, 2013, 3:30 AM PST

Image
1
of 8

a1_packetfence_1.png
a1_packetfence_1.png
Protect your business data with five BYOD security apps

PacketFence 1

PacketFence 1

rntThis gallery is also available as a post in the Five Apps Blog.

rntBring Your Own Device (BYOD) will help to not only empower your employees; it will save your company’s bottom line. Without having to purchase extra hardware, that budget will be freed up for other crucial elements of business. But along with BYOD comes a wealth of concerns u2013 one of which is security. Not only do you risk having your network compromised, you run the risk of seeing sensitive data lost as devices are lost or used improperly on your network.

rntHow do you prevent data loss and a compromised network? That is simple u2013 with some planning and the right tools. I have found five must-deploy tools to help secure your company’s BYOD experience. Although these tools won’t suit everyone’s needs and platforms, they will give you a solid understanding of what you need to secure your company’s BYOD platform.

rntFive apps

rnt1. Packetfence

rntPacketfence is one of the finest Network Access Control tools you will find. This open source solution allows you to control who/what/when/where can use your network. All of those BYOD devices that will be joining your network can be registered and controlled.

rntCredit: Images by Jack Wallen for TechRepublic

Protect your business data with five BYOD security apps

PacketFence 2

PacketFence 2

rntSo well designed is Packetfence, that you can enforce a policy that only registered devices can join the company network. Packetfence has an outstanding web-based management portal and allows you to: Control VLAN, manage guest access, manage violation types, control expiration, manage bandwidth usage, and much more.

rntCredit: Images by Jack Wallen for TechRepublic

Protect your business data with five BYOD security apps

Boxcryptor 1

Boxcryptor 1

rnt2. Boxcryptor

rntBoxcryptor adds additional security to Dropbox, SkyDrive, and Google Drive. This security is simple u2013 all encrypted files/folders that are synced with a supported cloud service are encrypted. The encryption is handled directly on the phone or tablet, so no passwords are ever transmitted. For an additional level of security, the app itself can be password protected.

rntCredit: Images by Jack Wallen for TechRepublic

Protect your business data with five BYOD security apps

Boxcryptor 2

Boxcryptor 2

rntIf the company itself doesn’t use cloud services, many employees do u2013 if only to enable themselves to be able to work from anywhere. For those that do, having a layer of encryption between that mobile device and their cloud service can mean the difference between compromised and secure data.

rntCredit: Images by Jack Wallen for TechRepublic

Protect your business data with five BYOD security apps

DirectPass 1

DirectPass 1

rnt4. DirectPass

rntDirectPass is an outstanding application to prevent business web-based logins from getting into the wrong hands. DirectPass installs a password protected, secure browser on your mobile device and allows the user to store bookmarks and site credentials safely.

rntCredit: Images by Jack Wallen for TechRepublic

Protect your business data with five BYOD security apps

DirectPass 2

DirectPass 2

rntDirectPass also enables a one-click access to your most frequented sites as well as auto form filling.

rntCredit: Images by Jack Wallen for TechRepublic

Protect your business data with five BYOD security apps

FileLocker 1

FileLocker 1

rnt5. FileLocker

rntFileLocker allows you to encrypt specific files on your mobile device. This app encodes the actual file, making it virtually unreadable, without decoding. Huge files are quickly hashed by encoding only the beginning and the ending of the file. Encrypted files are also hidden from view u2013 making them practically disappear. FileLocker also tracks temporarily unlocked files u2013 in case you’ve forgotten to re-lock them. If you’re looking for an outstanding (and simple) way to protect sensitive company data on a mobile device, look no further than FileLocker.

rntCredit: Images by Jack Wallen for TechRepublic

Protect your business data with five BYOD security apps

FileLocker 2

FileLocker 2

rntBottom line

rntBYOD doesn’t need to be synonymous with a lack of security. There is no reason not to allow BYOD because of security u2013 not when you can deploy a few tools to ensure your company data is safe from prying eyes. Some of these applications even allow the user to enjoy security away from the company. These are a no-brainer for anyone wanting to add BYOD to a company infrastructure.

rntAlso read:

rntThe Bring Your Own Device phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. Our editors and analysts delve into what it means, the key products involved, how to handle it, and where it’s going in the future.

    rnt

  • rntt10 BYOD concerns that go beyond security issues
  • t

  • rnttMake sure BYOD doesn’t mean Bring Your Own Disaster
  • t

  • rnttThree BYOD policies for keeping workers (and IT) happy
  • t

  • rnttThe Executive’s Guide to BYOD and the Consumerization of IT (Download)
  • Consumerization
  • Security
  • Account Information

    Share with Your Friends

    Protect your business data with five BYOD security apps

    Your email has been sent

Share: Protect your business data with five BYOD security apps
Image of Jack Wallen
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.
  • Account Information

    Contact Jack Wallen

    Your message has been sent

  • |
  • See all of Jack's content

TechRepublic Premium

  • TechRepublic Premium

    Guidelines for building security policies

    PURPOSE These guidelines from TechRepublic Premium will help you define the necessary ingredients of a security policy and assist in its proper construction. They’re designed to work hand in hand with the subjective knowledge you have of your company, environment and employees. Using this information, your business can establish new policies or elaborate on those ...

    Published:  March 23, 2023, 12:00 PM EDT Modified:  March 24, 2023, 1:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Artificial intelligence architect

    PURPOSE Recruiting an Artificial Intelligence Architect with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY ...

    Published:  March 23, 2023, 12:00 PM EDT Modified:  March 24, 2023, 1:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Autonomous systems engineer

    PURPOSE Hiring the right Autonomous Systems Engineer requires a specific and precise recruitment process, supported by a thorough understanding of the project requirements. This Hiring Kit from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, ...

    Published:  March 23, 2023, 12:00 PM EDT Modified:  March 24, 2023, 3:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring kit: Application support engineer

    PURPOSE This Hiring Kit: Application Support Engineer from TechRepublic Premium provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS AND SKILLSETS The skillset of successful Application Support Engineers is marked by balancing the technical expertise ...

    Published:  March 23, 2023, 12:00 PM EDT Modified:  March 24, 2023, 5:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice