REPORTS
Endpoint Security

Download

Containing Corporate Data on Mobile Devices

Endpoint Security

Containing Corporate Data on Mobile Devices 

If you’re still focused on securing endpoints, you’ve got your work cut out for you. WiFi network provider iPass surveyed 1,600 mobile workers and found that the average US employee carries three devices — a smartphone, a computer, and a tablet or e-reader — with more than 80% of them doing work on personal devices. That’s not always officially sanctioned: Among the 424 respondents to the latest InformationWeek Mobile Security ­Survey, all of them involved with mobile device management, policy development, and/or security at their organizations, just 68% support BYOD in some form.

It’s time to accept that data is ending up on personal devices, like it or not, and figure out how to secure it. One option: containerization systems that allow people to keep their books and photos in the clear while IT corrals business data in a virtual or logical container, protected by encryption and policy controls. 

This should be a reasonably easy sell: 45% of mobile security survey respondents let users bring in any device, and they let it on the network as long as the user agrees to ­certain policies, with no enforcement. Meanwhile, 78% say their top mobile security ­concern is lost or stolen devices — with good reason, as 45% have had a data loss ­incident within the past 12 months. Eleven percent of them were required to publicly ­disclose the loss. 

In this report, we discuss the pros, cons, and considerations of selecting and using data containers. (S7630114)

 

Download
Table of Contents