Access your Pro+ Content below.
Secure mobile data inside and outside the firewall
Sponsored by SearchMobileComputing
This chapter is included in the Building a mobile business E-Book.
One of IT administrators' biggest fears with respect to mobility is how easily data can move off the corporate network and into the wild. Lost or stolen devices, disgruntled employees, carelessness and lax corporate policies can all be responsible for business data leaking into public forums.
Fortunately, native device capabilities have improved since smartphones and tablets first made their way into the enterprise. Many devices and operating systems come equipped with encryption and other security measures that IT admins should encourage users to take advantage of. Additionally, technologies such as mobile application management, mobile content management and secure containers can help IT maintain control regardless of where data resides. Still, businesses and IT must strike a balance between locking down sensitive corporate data without violating users' privacy or turning their devices into bricks.