Mobility and Corporate Data Security

Blog /Mobility-Corporate-Data-Security

Due to rapidly changing IT landscape and inclusion of both company-owned and personal mobile devices into an enterprise environment, protecting corporate data is becoming a challenging task and no doubt is one of key things to be looked at and planned for before adopting a Mobile Device Strategy. In the past, Enterprise Mobile Devices were mostly limited to emails, and Blackberry owned the majority of the enterprise market, but  now due to maturity of the mobile market both in terms of hardware software and OS, there is more to be expected from a mobile device. A device that can be leveraged to securely access enterprise emails, apps and can provide a means for collaboration. 

When it comes to data protection, it is very important that we understand the layout of the organization. Here are some common questions that would need to be addressed:

  • What kind of devices are to be supported?
  • Which Apps will be accessed from the mobile devices?
  • Is BYOD part of the equation? 
  • Where does the Mobile back end infrastructure reside – on premise and/or in the cloud?
  • What does the Mobile infrastructure Architecture look like?
  • What Security Standards apply to an organization – PCI, HIPAA, SOX, GxP etc.?

Obviously, there is a lot of planning that would go into development of comprehensive and secure mobile strategy. But then, how about implementing the data protection strategy? Good news, there are options available in the form of Mobile Device Management (MDM) and Mobile Application Management (MAM) products. These solutions let you securely access your corporate data be it emails or apps, both in company-owned devices and BYOD scenario. 

Finally,  to summarize, securing corporate data can be achieved by:

  • Proper planning 
  • Careful review of security standards and policies
  • Choosing the right MDM/MAM solution
  • Setting up the right Mobility back end infrastructure that is configured as per the security requirements.

Post Date: 2/7/2014

default blog image Ashish Shukla

About the author

VIEW ALL POSTS
EXPLORE OUR BLOGS