Access your Pro+ Content below.
Companies consider application virtualization for mobile data security
This article is part of the Special Edition, November 2013 issue of Information Security magazine
The onslaught of mobile technology enabling anyone access to corporate data anytime, anywhere is forcing many IT administrators and CIOs to renew their quest for the Holy Grail of mobile data security. A careful approach to application virtualization can aid in that pursuit. There is no single solution for companies to keep their data safe. Each deployment is different, whether it's in healthcare, education or another industry, but basic mobile data security concerns transcend all environments. "This keeps me up the most at night," said Linda Hartford, CIO at Northeast Wisconsin Technical College in Green Bay, Wis. "We all have firewalls and data protection and double authentication on certain systems where we need it. I think it's a constant [process] to keep up with the knowledge of what's changing in the environment and how people are getting past the [security]." End users and IT professionals have a wealth of choices in this era of bring your own device (BYOD), bring your own application and now bring your own everything. ...
Access this Pro+ Content for Free!
Features in this issue
Struggling to compare MDM vs. MAM? You're not alone. Learn all about the various technology options in enterprise mobile security management.
App virtualization can add a layer to mobile data security efforts, but it takes some work to set up and some users might find it frustrating to use.
If workers use cloud-based file storage, IT has to be aware of where data is stored and users should be held responsible for their sharing.