PRO+ Premium Content/E-Books
Access your Pro+ Content below.
Secure mobile data inside and outside the firewall


Sponsored by SearchMobileComputing
This chapter is included in the Building a mobile business E-Book.
One of IT administrators' biggest fears with respect to mobility is how easily data can move off the corporate network and into the wild. Lost or stolen devices, disgruntled employees, carelessness and lax corporate policies can all be responsible for business data leaking into public forums.
Fortunately, native device capabilities have improved since smartphones and tablets first made their way into the enterprise. Many devices and operating systems come equipped with encryption and other security measures that IT admins should encourage users to take advantage of. Additionally, technologies such as mobile application management, mobile content management and secure containers can help IT maintain control regardless of where data resides. Still, businesses and IT must strike a balance between locking down sensitive corporate data without violating users' privacy or turning their devices into bricks.
-
E-Handbook
Explore the latest enterprise mobile security technology
Download -
E-Chapter
Device diversity complicates endpoint management
Download -
E-Handbook
Mobile data backup helped by encryption, data policies
Download -
E-Handbook
Mobile content management software, EFSS protect data in the cloud era
Download