Comments
Mobile Security: All About The Data
Newest First  |  Oldest First  |  Threaded View
Muthu LeesaJ889
50%
50%
Muthu LeesaJ889,
User Rank: Apprentice
12/4/2013 | 7:04:43 AM
Yes, its the data and not really the device!
I always believed that MAM was the subset of MDM. But now I see a change in the trend where CIO's are favoring MAM to MDM. And the reasons? Ofcourse, its the data and not really the device! Read more at http://mlabs.boston-technology.com/blog/why-are-cios-looking-at-mam-versus-traditional-mdm
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
11/30/2013 | 12:23:54 PM
Re: Managing Mobile Security
If this sensitive data falls to a fraudster's hands it can be used for fraudulent activities. This will harm the reputation of the organization as well as to loss the customer integrity towards the organization. 
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
11/30/2013 | 12:20:16 PM
Re: Managing Mobile Security
This is an interesting article on data over smart phones. As you correctly mentioned many of the users has configured data channels to their mobile phones which is a risk. 
Adam2IT
50%
50%
Adam2IT,
User Rank: Apprentice
11/28/2013 | 7:55:23 AM
Managing Mobile Security
One way to reduce the security risks of mobile computing is to use virtualization and HTML5 technologies to keep data and applications separate from devices.  For example, Ericom AccessNow is an HTML5 RDP client that enables users to connect from most types of devices to any RDP hosts (such as VDI virtual desktops or Windows Remote Desktop Services) and run full Windows desktops or applications in a browser tab.

There's nothing to install on the end user devices, as you only need an HTML5-compatible browser.  That protects corporate data by keeping it off the device, and also reduces IT support costs, since IT staff don't need to spend time installing software on so many different platforms.  All they need to do is give employees a URL and login credentials.

For an online, interactive demo visit: http://www.ericom.com/demo_AccessNow

Please note that I work for Ericom
Shepy
50%
50%
Shepy,
User Rank: Apprentice
11/28/2013 | 7:24:34 AM
Central locking
In the UK we've long had a inter-network blacklist for mobile devices, preventing locked IMEI from using the networks. Obviously IMEI re-programming gets round this if known how to be done, but it would be interesting to asee some kind of central blocking from Apple or Google end as each device needs to be registered with itunes or play etc.
Ulf Mattsson
50%
50%
Ulf Mattsson,
User Rank: Strategist
11/27/2013 | 11:40:17 PM
Re: Interesting report from the Aberdeen Group
I agree about "an alternative rather than an addition" but the trend is interesting. I think that every sensitive data element should be encrypted or tokenized, to be ably to enforce "security policy" rules.
Thomas Claburn
100%
0%
Thomas Claburn,
User Rank: Author
11/27/2013 | 3:39:23 PM
Re: Interesting report from the Aberdeen Group
>Aberdeen has also seen "a steady increase in enterprise use of tokenization as an alternative to encryption for protecting sensitive data".

Why an alternative rather than an addition? Everything should be encrypted, regardless of other security measures.
WKash
100%
0%
WKash,
User Rank: Author
11/27/2013 | 1:35:34 PM
Data vs Devices
Interesting to note the perspective from Ashok Sankar, who's worked with the Defense Department and the Intelligence Community to manage the data movement on classified and top secret domains.  He makes the same case. See  "Keep Data Off Mobile Devices & Away From Adversaries" by Ashok Sankar also on InformationWeek at  http://add.vc/fZy
Ulf Mattsson
50%
50%
Ulf Mattsson,
User Rank: Strategist
11/27/2013 | 11:07:14 AM
Interesting report from the Aberdeen Group
I agree that "Three ways of dealing with the issue come to mind: containerization of business data, user authentication, and data encryption".

We can follow the lead by credit card companies that establised PCI DSS for "containerization of business data, and data encryption" of sensitive data.

I recently read an interesting report from the Aberdeen Group that revealed that "Over the last 12 months, tokenization users had 50% fewer security-related incidents(e.g., unauthorized access, data loss or data exposure than tokenization non-users".

Nearly half of the respondents (47%) are currently using tokenization for something other than cardholder data The name of the study, released a few months ago, is "Tokenization Gets Traction".

Aberdeen has also seen "a steady increase in enterprise use of tokenization as an alternative to encryption for protecting sensitive data".

Modern data tokenization can also be used for containerization of business data.

Ulf Mattsson, CTO Protegrity


The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.