dcsimg

Ten Approaches to Protecting Mobile Data

  • Ten Approaches to Protecting Mobile Data-

    Containerization

    Mobile:Helix defines containerization as “a separate, partitioned and secure environment on a mobile device in which to run corporate applications and store related sensitive corporate data.” In other words, it is a discrete space in which the access rules and security are different – and, presumably, more stringent – than in other areas of the mobile device.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12

Ten Approaches to Protecting Mobile Data

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
  • Ten Approaches to Protecting Mobile Data-5

    Containerization

    Mobile:Helix defines containerization as “a separate, partitioned and secure environment on a mobile device in which to run corporate applications and store related sensitive corporate data.” In other words, it is a discrete space in which the access rules and security are different – and, presumably, more stringent – than in other areas of the mobile device.

Mobility exploded onto the business scene during the past decade and, needless to say, is here to stay. Now, important and sensitive tasks are as likely to be performed on smartphones, tablets and other non-PC devices as on big machines sitting on office desks.

Security has been a bit of a game of catch up. It is complicated by a couple of ongoing challenges: Like diet and exercise, people (and the companies for which they work) pay lip service to good security practice, but usually skimp, forget or get lazy. On top of that, the emergence of bring-your-own-device (BYOD) approaches complicated things significantly.

But great progress has been made. SNS Research reported in September that the investment in mobile device and network security in 2013 alone will be $9 billion. This slideshow covers some of the latest techniques and approaches to bolstering mobile data security.