Is BYOD Becoming “Bring Your Own Danger?”

Touted to bring agility and flexibility to an enterprise, Bring Your Own Device programs are putting enterprise security protocols at risk.

[vc_row full_width=”” parallax=”” parallax_image=””][vc_column width=”1/1″][vc_single_image image=”161693″ alignment=”center” style=”vc_box_shadow_3d” border_color=”grey” img_link_large=”” img_link_target=”_blank” img_size=”full” link=”http://www.pymnts.com/digital-identity-tracker/”][vc_column_text]

The PYMNTS.com Identity Tracker, powered by Oberthur, is a forum for framing and addressing key issues and trends facing the entities charged with efficiently and securely identifying and granting permission to individuals to access, purchase, transact, or otherwise confirm their identity in a digital world.

[/vc_column_text][vc_row_inner][vc_column_inner el_class=”” width=”3/4″][vc_text_separator title=”Overview” title_align=”separator_align_left” align=”align_center” color=”grey” style=”” border_width=”” el_width=””][vc_column_text]

  • Data security remains a hot topic, and tokenization a major theme.
  • The card networks – MasterCard and Visa – continue to popularize their payments tokens: MasterCard will rollout its new tokenization platform for Apple Pay’s Australian launch while Visa signed up 2,300 financial institutions on its tokenization platform
  • Google made encryption ubiquitous by launching customer-supplied encryption keys

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”” width=”1/4″][vc_single_image image=”161697″ alignment=”center” style=”vc_box_shadow_3d” border_color=”grey” img_link_large=”” img_link_target=”_blank” img_size=”full” link=”http://www.pymnts.com/wp-content/uploads/2015/08/Identity-Tracker-l-Final-August-8.27-4-PM.pdf”][/vc_column_inner][/vc_row_inner][vc_row_inner el_id=””][vc_column_inner el_class=”” width=”1/4″][vc_single_image image=”161698″ alignment=”center” style=”vc_box_shadow_3d” border_color=”grey” img_link_large=”” img_link_target=”_blank” img_size=”full” link=”http://www.pymnts.com/wp-content/uploads/2015/08/Identity-Tracker-l-Final-August-8.27-4-PM.pdf”][/vc_column_inner][vc_column_inner el_class=”” width=”3/4″][vc_text_separator title=”Tracker Updates” title_align=”separator_align_left” align=”align_center” color=”grey”][vc_column_text]

  • This August issue includes the profiles of 68 industry players, with 7 new profiles — Carta Worldwide, CopSonic, cryptovision, Dashlane, FaceFirst, HYPR Corp. and Seagate— and one updated company: Ethoca.

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner el_id=””][vc_column_inner el_class=”” width=”3/4″][vc_text_separator title=”Commentary” title_align=”separator_align_left” align=”align_center” color=”grey” style=”” border_width=”” el_width=””][vc_column_text]

Bring Your Own Device or BYOD, touted to bring agility and flexibility to an enterprise is putting enterprise security protocols to the test. This edition’s commentary looks at the challenges in authenticating the digital identity of employees who should have legitimate access to enterprise assets in a way that is reliable, secure and with minimal friction.

[/vc_column_text][/vc_column_inner][vc_column_inner el_class=”” width=”1/4″][vc_single_image image=”161700″ alignment=”center” style=”vc_box_shadow_3d” border_color=”grey” img_link_large=”” img_link_target=”_blank” img_size=”full” link=”http://www.pymnts.com/wp-content/uploads/2015/08/Identity-Tracker-l-Final-August-8.27-4-PM.pdf”][/vc_column_inner][/vc_row_inner][vc_separator color=”grey” align=”align_center” style=”” border_width=”” el_width=””][vc_custom_heading text=”DOWNLOAD THE AUGUST 2015 TRACKER” font_container=”tag:h2|text_align:center” google_fonts=”font_family:Oswald%3A300%2Cregular%2C700″][vc_separator color=”grey” align=”align_center” style=”” border_width=”” el_width=””][/vc_column][/vc_row][vc_row full_width=”” parallax=”” parallax_image=””][vc_column width=”1/1″][vc_single_image image=”161697″ alignment=”center” style=”vc_box_shadow_3d” border_color=”grey” img_link_large=”” img_link_target=”_blank” link=”http://www.pymnts.com/wp-content/uploads/2015/08/Identity-Tracker-l-Final-August-8.27-4-PM.pdf” img_size=”full”][vc_btn title=”DOWNLOAD NOW” style=”modern” shape=”rounded” color=”default” size=”md” align=”center” i_align=”left” i_type=”fontawesome” i_icon_fontawesome=”fa fa-download” i_icon_openiconic=”vc-oi vc-oi-dial” i_icon_typicons=”typcn typcn-adjust-brightness” i_icon_entypo=”entypo-icon entypo-icon-note” i_icon_linecons=”vc_li vc_li-heart” link=”url:http%3A%2F%2Fwww.pymnts.com%2Fwp-content%2Fuploads%2F2015%2F08%2FIdentity-Tracker-l-Final-August-8.27-4-PM.pdf||target:%20_blank” button_block=”true” add_icon=”true” i_icon_pixelicons=”vc_pixel_icon vc_pixel_icon-alert”][/vc_column][/vc_row]