5 approaches to securing your company’s mobile data

The simultaneous explosion of enterprise mobility and cloud adoption has resulted in a “perfect storm” for IT. It’s the “everywhere data” side effect created by bring your own device (BYOD) programs — data is now coming from anywhere and everywhere, making it hard for IT departments to keep up.

Data traveling from corporate servers to unsecured personal devices to apps and into the cloud leaves a digital paper trail of copies everywhere along its route. Gartner vice president David Willis recently highlighted this phenomenon saying, “Some mobile devices are designed to share data in the cloud and have no general purpose file system for applications to share, increasing the potential for data to be easily duplicated between applications and moved between applications and the cloud.”

SOURCE: venturebeat.com

Subscribe
Notify of
guest
0 Expert Comments
Inline Feedbacks
View all comments
Information Security Buzz
0
Would love your thoughts, please comment.x
()
x