Comments
Mobile Security: All About The Data
Newest First  |  Oldest First  |  Threaded View
Muthu LeesaJ889
50%
50%
Muthu LeesaJ889,
User Rank: Apprentice
12/4/2013 | 7:04:43 AM
Yes, its the data and not really the device!
I always believed that MAM was the subset of MDM. But now I see a change in the trend where CIO's are favoring MAM to MDM. And the reasons? Ofcourse, its the data and not really the device! Read more at http://mlabs.boston-technology.com/blog/why-are-cios-looking-at-mam-versus-traditional-mdm
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
11/30/2013 | 12:23:54 PM
Re: Managing Mobile Security
If this sensitive data falls to a fraudster's hands it can be used for fraudulent activities. This will harm the reputation of the organization as well as to loss the customer integrity towards the organization. 
shakeeb
50%
50%
shakeeb,
User Rank: Apprentice
11/30/2013 | 12:20:16 PM
Re: Managing Mobile Security
This is an interesting article on data over smart phones. As you correctly mentioned many of the users has configured data channels to their mobile phones which is a risk. 
Adam2IT
50%
50%
Adam2IT,
User Rank: Apprentice
11/28/2013 | 7:55:23 AM
Managing Mobile Security
One way to reduce the security risks of mobile computing is to use virtualization and HTML5 technologies to keep data and applications separate from devices.  For example, Ericom AccessNow is an HTML5 RDP client that enables users to connect from most types of devices to any RDP hosts (such as VDI virtual desktops or Windows Remote Desktop Services) and run full Windows desktops or applications in a browser tab.

There's nothing to install on the end user devices, as you only need an HTML5-compatible browser.  That protects corporate data by keeping it off the device, and also reduces IT support costs, since IT staff don't need to spend time installing software on so many different platforms.  All they need to do is give employees a URL and login credentials.

For an online, interactive demo visit: http://www.ericom.com/demo_AccessNow

Please note that I work for Ericom
Shepy
50%
50%
Shepy,
User Rank: Apprentice
11/28/2013 | 7:24:34 AM
Central locking
In the UK we've long had a inter-network blacklist for mobile devices, preventing locked IMEI from using the networks. Obviously IMEI re-programming gets round this if known how to be done, but it would be interesting to asee some kind of central blocking from Apple or Google end as each device needs to be registered with itunes or play etc.
Ulf Mattsson
50%
50%
Ulf Mattsson,
User Rank: Strategist
11/27/2013 | 11:40:17 PM
Re: Interesting report from the Aberdeen Group
I agree about "an alternative rather than an addition" but the trend is interesting. I think that every sensitive data element should be encrypted or tokenized, to be ably to enforce "security policy" rules.
Thomas Claburn
100%
0%
Thomas Claburn,
User Rank: Author
11/27/2013 | 3:39:23 PM
Re: Interesting report from the Aberdeen Group
>Aberdeen has also seen "a steady increase in enterprise use of tokenization as an alternative to encryption for protecting sensitive data".

Why an alternative rather than an addition? Everything should be encrypted, regardless of other security measures.
WKash
100%
0%
WKash,
User Rank: Author
11/27/2013 | 1:35:34 PM
Data vs Devices
Interesting to note the perspective from Ashok Sankar, who's worked with the Defense Department and the Intelligence Community to manage the data movement on classified and top secret domains.  He makes the same case. See  "Keep Data Off Mobile Devices & Away From Adversaries" by Ashok Sankar also on InformationWeek at  http://add.vc/fZy
Ulf Mattsson
50%
50%
Ulf Mattsson,
User Rank: Strategist
11/27/2013 | 11:07:14 AM
Interesting report from the Aberdeen Group
I agree that "Three ways of dealing with the issue come to mind: containerization of business data, user authentication, and data encryption".

We can follow the lead by credit card companies that establised PCI DSS for "containerization of business data, and data encryption" of sensitive data.

I recently read an interesting report from the Aberdeen Group that revealed that "Over the last 12 months, tokenization users had 50% fewer security-related incidents(e.g., unauthorized access, data loss or data exposure than tokenization non-users".

Nearly half of the respondents (47%) are currently using tokenization for something other than cardholder data The name of the study, released a few months ago, is "Tokenization Gets Traction".

Aberdeen has also seen "a steady increase in enterprise use of tokenization as an alternative to encryption for protecting sensitive data".

Modern data tokenization can also be used for containerization of business data.

Ulf Mattsson, CTO Protegrity


The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join InformationWeek’s Lorna Garey and Mike Healey, president of Yeoman Technology Group, an engineering and research firm focused on maximizing technology investments, to discuss the right way to go digital.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.