Information Security Leader, Author, Instructor and Speaker

Securing Mobile Devices with Containers

Posted on February 26, 2013 in Articles | by

Chances are that right now, there are hundreds or thousands of individuals around the world carrying mobile devices that hold sensitive information belonging to your organization.  In many cases, these may be personally owned devices connected to enterprise systems.  Are you confident that if one of these devices is lost or stolen that your organization’s data is safe?  If an employee leaves the company, are you certain that you can successfully remove enterprise data from their personally owned devices?

Managed containers promise to provide organizations with this peace-of-mind.  They make use of encryption technology to isolate the organization’s sensitive information from other components of a mobile device and strictly control the use and dissemination of that information, as well as enforce strong security measures around it.  Container systems typically support the major mobile operating systems and may be used on both enterprise-owned and personally-owned devices.

Read more: Securing Mobile Devices with Containers

Originally published in BizTech Magazine, Feb 26, 2013

TAGS: , ,

Leave a Reply

Your email address will not be published. Required fields are marked *