PRO+ Premium Content/E-Books

Thank you for joining!
Access your Pro+ Content below.
May 2016

Secure mobile data inside and outside the firewall

Sponsored by SearchMobileComputing

This chapter is included in the Building a mobile business E-Book.

One of IT administrators' biggest fears with respect to mobility is how easily data can move off the corporate network and into the wild. Lost or stolen devices, disgruntled employees, carelessness and lax corporate policies can all be responsible for business data leaking into public forums.

Fortunately, native device capabilities have improved since smartphones and tablets first made their way into the enterprise. Many devices and operating systems come equipped with encryption and other security measures that IT admins should encourage users to take advantage of. Additionally, technologies such as mobile application management, mobile content management and secure containers can help IT maintain control regardless of where data resides. Still, businesses and IT must strike a balance between locking down sensitive corporate data without violating users' privacy or turning their devices into bricks.

About The Author

Lisa Phifer - Contributor

Lisa Phifer, owner of Core Competence, is a networking, security...Read More

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close