• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Housing Technology Main Logo

Housing Technology

Housing | IT | Telecoms | Business | Ecology

  • Free Subscription
  • Contact
  • Home
  • Research
  • Magazine
  • Events
  • Awards
  • Recruitment
  • On Demand
Home / Free Subscriber Access / Mobile-centric, zero-trust security

Mobile-centric, zero-trust security

Mobile working can help housing providers deliver a more engaging, customer-centric service based on the principles of convenience and self-service. For instance, mobile technology has the potential to reduce the amount of time tenants are left waiting for repairs and home improvements by giving workers the ability to diagnose tenants’ problems remotely, and then calling for the required professional assistance.

In addition, mobile also has the potential to improve payment methods, with mobile devices being used as portable payment systems. Mobile working also drastically improves housing providers’ internal operations by providing workers with a more effective communication channel.

BYOD in the housing

Recent figures suggest that the average employee could save around 80 minutes per week in productivity by using their own mobile device at work as well as saving employers around £1,000 per employee per year in device and software costs.

There are clearly many benefits to enabling housing staff to use their own devices, but those benefits aren’t without some associated issues. The main problem lies in how the devices are secured; allowing a privately-owned device the ability to connect to a corporate network immediately raises organisational security concerns due to the danger of malware on the device spreading to company servers, putting very delicate data at risk.

There are risks with BYOD, but with a well-thought-out plan these risks can be mitigated and the clear benefits of BYOD realised; below is some practical advice.

A changing security landscape

Smartphones and tablets have overtaken PCs and laptops as the preferred device for people to get their work done on. All you have to do is check the app store and see that business apps are now the second most popular category. This, combined with the performance gains 5G will bring, means that mobile has won – it’s what the users have chosen.

This move to mobile isn’t the only revolution we are seeing within the enterprise; access to apps have accelerated the adoption of cloud services. Today, 77 per cent of businesses use cloud services, and on average, an enterprise is using over 1,000 cloud apps.

This means modern work takes place on mobile devices connected to cloud networks, taking it beyond the control of traditional security measures and multiplying the number of access points for attackers. As a result, the modern working environment can no longer be governed by the traditional security perimeters and boundaries of yesterday.

This change creates three main challenges for CIOs and CISOs:

  • Drive business innovation with mobile productivity by giving employees the ability to use mobile, cloud and endpoints.
  • Enforce corporate security without impacting users’ experience.
  • Redefine enterprise security strategies to address a perimeter-less environment.

The zero-trust approach

To overcome these challenges, security professionals are forced to reconsider the best practices on which they have previously relied. The more adaptable have realised the best solutions provide a secure contextual connection, based on device, app, user, environment, network, and everything else that’s involved in accessing their data.

One approach that organisations are investigating is called ‘zero-trust’ and was first coined by Forrester Research in 2010. Around the same time, a similar idea was being embraced by Google as a way to connect its employees to their internal applications. The Google BeyondCorp methodology was born out of this need and led to a specific adaption of the software-defined perimeter (SDP).

The zero-trust model treats all devices or ‘hosts’ as if they’re internet-facing, and considers the entire network to be compromised and hostile. It assumes that all access to corporate resources should be restricted until the user has proved their identity and access permissions and until the device has passed a security profile check.

Mobile-centric security

There are several different ways to implement zero trust. The main approaches are focused on identity, gateway and the device. However, as the tide of mobile and cloud continues to intensify, it is clear gateway- and identity-centric approaches simply aren’t enough. Only a mobile-centric approach addresses the security challenges of the perimeter-less modern enterprise while allowing the agility and anytime access business needs.

A mobile-centric approach really raises the security bar and goes beyond traditional identity management and gateway point solutions. It demands several more answers from a complete set of attributes before granting access to the user. It validates the device, establishes user context, checks app authorisation, verifies the network and even detects and remediates threats before allowing secure access. Importantly, this all happens instantaneously.

David Critchley is the regional director for the UK & Ireland for MobileIron.

See More On:

  • Vendor: MobileIron
  • Topic: Infrastructure
  • Publication Date: 069 - May 2019
  • Type: Contributed Articles

Primary Sidebar

Most Recent Articles

  • Artificial intelligence in housing
  • Mobysoft – Data problems affecting complaints’ handling
  • Data, AI and private-sector strategies
  • Smart repairs & smarter homes
  • From firewalls to fortresses
  • Achieving three quick wins in AI
  • Rebuilding Selwood Housing’s IT infrastructure
  • Are you ready for organisational AI?
  • PIMSS releases AI Document Reader for compliance
  • Calico Homes cuts arrears with RentSense
  • FourNet launches digital transformation index
  • New income recovery software from Voicescape
  • Asprey Assets at YMCA
  • I love spreadsheets…
  • All watched over by machines of loving grace – AI assistants and adult social care
  • The rent revolution – The case for AI-powered payments
  • Unlocking safer living through data
  • Aareon acquires MIS ActiveH
  • Vericon launches MouldSense
  • Back to the future at Housing Technology 2025
  • FireAngel wins Which? Award
  • Maximising income and preventing homelessness
  • Anchoring digital innovation with Plentific
  • Cynon Taf Community Housing gets Housing Insight’s Arrears Manager
  • Tenants, AI & your biggest compliance risk
  • EDITOR’S NOTES – Data, standards & straight-through processing
  • AI as a social housing expert
  • South Yorkshire Housing halves arrears with Mobysoft
  • Bromford Flagship wins Aico’s smart-home competition
  • Putting VIVID’s customers in control of their tenancies

Footer

Housing Technology Main Logo
  • Instagram
  • LinkedIn
  • YouTube
  • Contact
  • Free Subscription
  • Book an event
  • Research
  • Update Your Subscription
  • Privacy Policy

Welcome to the housing Technology – Trusted Information For Business Professionals in HOusing

Housing Technology is the leading technology information service for the UK housing sector and local governments. We have always believed in the fundamental importance of how the UK’s social housing providers use technology to improve their tenants’ lives.

Subscribe to Housing Technology to gain market-leading research, unsurpassed peer networking opportunities and a greater understanding of your role to transform your business.

Copyright © The Intelligent Business Company 2025 | Terms and Conditions | Privacy Policy
Housing Technology is published by the The Intelligent Business Company. A company with limited liability. Registered in England No. 4958057 | Vat Registion No. 833 0069 55.

Registered Business Address: Hoppingwood Farm, Robin Hood Way, London, SW20 0AB | Telephone: +44 (0) 20 8336 2293