Review Article

A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

Table 3

Implementation of the proposed framework.

Features implementationProposed framework

Network structureAccessing within corporate network+
Accessing from public network+

Secure communication channelSSL/TLS+
VPN

Location-based functionLocation tracking+
Location-based policy enforcing

Identities preservingIdentities blurring/hiding

Sensitive information preservingPasscode locking+
Data encryption
Remote wiping+

Platform dependencySupport major mobile OSes+
Central management platform+

Security architectureVirtualization, walled garden, and limit separation+
Trusted boot+

Multiple devices managementIndividual management+
Central management+

ProvisioningNetwork connection+
Corporate email+
Corporate apps+

Policy enforcingRole-based enforcing+
Location-based enforcing

+: the feature is implemented.
−: the feature is not implemented.
: the feature can possibly be implemented in the future.