TY - GEN
T1 - Securing Corporate Data on Personal Devices Using Containerisation and Other Security Techniques
AU - Mamogale, Clementine
AU - Mpekoa, Noluntu
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
PY - 2025
Y1 - 2025
N2 - The increasing adoption of personal mobile devices for professional tasks, commonly referred to as Bring Your Own Device (BYOD), has revolutionised workplace dynamics by offering flexibility, reduced operational costs, and enhanced productivity. However, BYOD also introduces significant security challenges, primarily due to the merging of personal and corporate data on a single device. These challenges include unauthorised access to sensitive corporate information, potential data leakage, and difficulties in ensuring compliance with regulatory standards, all of which are exacerbated by the varied security postures of personal devices. This paper proposes a comprehensive security framework that addresses these concerns by separating corporate data from personal data using containerisation, combined with Mobile Device Management (MDM) and Multi-Factor Authentication (MFA) technologies. The proposed framework ensures that corporate data remains isolated from personal use, mitigating risks related to data breaches, privacy violations, and unauthorised access while simultaneously maintaining user privacy and device performance. Furthermore, this framework integrates encryption and remote wipe capabilities to safeguard data in cases of device loss or theft, ensuring compliance with corporate policies and regulatory requirements. The framework integrates technological solutions that enforce strict boundaries between corporate and personal environments on employee-owned devices, thereby fostering a secure BYOD environment. This framework aims to provide a scalable, robust solution to data protection challenges in modern workplaces through a detailed analysis of current strategies and technologies. By addressing both organisational and employee concerns, this approach enables organisations to harness the advantages of BYOD without compromising security or user privacy.
AB - The increasing adoption of personal mobile devices for professional tasks, commonly referred to as Bring Your Own Device (BYOD), has revolutionised workplace dynamics by offering flexibility, reduced operational costs, and enhanced productivity. However, BYOD also introduces significant security challenges, primarily due to the merging of personal and corporate data on a single device. These challenges include unauthorised access to sensitive corporate information, potential data leakage, and difficulties in ensuring compliance with regulatory standards, all of which are exacerbated by the varied security postures of personal devices. This paper proposes a comprehensive security framework that addresses these concerns by separating corporate data from personal data using containerisation, combined with Mobile Device Management (MDM) and Multi-Factor Authentication (MFA) technologies. The proposed framework ensures that corporate data remains isolated from personal use, mitigating risks related to data breaches, privacy violations, and unauthorised access while simultaneously maintaining user privacy and device performance. Furthermore, this framework integrates encryption and remote wipe capabilities to safeguard data in cases of device loss or theft, ensuring compliance with corporate policies and regulatory requirements. The framework integrates technological solutions that enforce strict boundaries between corporate and personal environments on employee-owned devices, thereby fostering a secure BYOD environment. This framework aims to provide a scalable, robust solution to data protection challenges in modern workplaces through a detailed analysis of current strategies and technologies. By addressing both organisational and employee concerns, this approach enables organisations to harness the advantages of BYOD without compromising security or user privacy.
KW - Bring Your Own Device (BYOD)
KW - Containerisation
KW - Malti-Factor Authentication (MFA)
KW - Mobile Device Management (MDM)
KW - Mobile Security
UR - https://www.scopus.com/pages/publications/105008647829
U2 - 10.1007/978-3-031-93064-5_6
DO - 10.1007/978-3-031-93064-5_6
M3 - Conference contribution
AN - SCOPUS:105008647829
SN - 9783031930638
T3 - Lecture Notes in Computer Science
SP - 87
EP - 102
BT - Human-Centered Design, Operation and Evaluation of Mobile Communications - 6th International Conference, MOBILE 2025, Held as Part of the 27th HCI International Conference, HCII 2025, Proceedings
A2 - Wei, June
A2 - Margetis, George
PB - Springer Science and Business Media Deutschland GmbH
T2 - 6th International Conference on Design, Operation and Evaluation of Mobile Communications, MOBILE 2025, held as part of the 27th HCI International Conference, HCII 2025
Y2 - 22 June 2025 through 27 June 2025
ER -