dcsimg

Ten Approaches to Protecting Mobile Data

  • Ten Approaches to Protecting Mobile Data-

    Mobile Device Management

    Mobile Device Management (MDM) enables organizations to institute a consistent set of policies and security applications across the entire device holdings. Procedures, such as wiping data off lost or stolen devices, can be executed through MDM platforms. Increasingly, MDM is being combined with applications that protect the data and the communications channels between the device and the corporate network.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12

Ten Approaches to Protecting Mobile Data

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
  • Ten Approaches to Protecting Mobile Data-4

    Mobile Device Management

    Mobile Device Management (MDM) enables organizations to institute a consistent set of policies and security applications across the entire device holdings. Procedures, such as wiping data off lost or stolen devices, can be executed through MDM platforms. Increasingly, MDM is being combined with applications that protect the data and the communications channels between the device and the corporate network.

Mobility exploded onto the business scene during the past decade and, needless to say, is here to stay. Now, important and sensitive tasks are as likely to be performed on smartphones, tablets and other non-PC devices as on big machines sitting on office desks.

Security has been a bit of a game of catch up. It is complicated by a couple of ongoing challenges: Like diet and exercise, people (and the companies for which they work) pay lip service to good security practice, but usually skimp, forget or get lazy. On top of that, the emergence of bring-your-own-device (BYOD) approaches complicated things significantly.

But great progress has been made. SNS Research reported in September that the investment in mobile device and network security in 2013 alone will be $9 billion. This slideshow covers some of the latest techniques and approaches to bolstering mobile data security.