When my fiancé recently started his first job out of law school, his firm asked whether he wanted to use a company-owned BlackBerry or his own iPhone for work. Stephen chose the path many users do: bring your own device. IT then took the iPhone from him for an entire day, enrolled it in the firm’s mobile device management system and installed a number of other security tools.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
For a law firm, IT security isn’t just about preventing corporate data leaks or stopping mobile malware. It’s about client confidentiality and regulatory compliance. Legal problems abound if restricted data gets out. Stephen even has to use one of those privacy shields over his PC screen when traveling for business, so his neighbors on the train can’t see any sensitive information. IT also enforces more stringent passcode requirements on his iPhone’s home screen, to protect access to his corporate email and other applications and data.
Implementing that kind of stronger access management is just one of many ways IT departments have had to evolve their approach to security in the face of mobility. And with mobile application and content management tools, plus features like remote wipe, IT administrators can better secure corporate data on mobile devices.
In this month’s Modern Mobility cover story, news writer Jake O’Donnell explains how mobility has influenced and improved overall enterprise security techniques. The verdict is in: Rather than taking a perimeter-based approach that keeps data in and attackers out, mobile organizations must secure apps and data wherever they are.