Access "Companies consider application virtualization for mobile data security"
This article is part of the Special Edition, November 2013 issue of Insider edition: Layering mobile security for greater control
The onslaught of mobile technology enabling anyone access to corporate data anytime, anywhere is forcing many IT administrators and CIOs to renew their quest for the Holy Grail of mobile data security. A careful approach to application virtualization can aid in that pursuit. There is no single solution for companies to keep their data safe. Each deployment is different, whether it's in healthcare, education or another industry, but basic mobile data security concerns transcend all environments. "This keeps me up the most at night," said Linda Hartford, CIO at Northeast Wisconsin Technical College in Green Bay, Wis. "We all have firewalls and data protection and double authentication on certain systems where we need it. I think it's a constant [process] to keep up with the knowledge of what's changing in the environment and how people are getting past the [security]." End users and IT professionals have a wealth of choices in this era of bring your own device (BYOD), bring your own application and now bring your own everything. In every organization, ... Access >>>
Premium Content for Free.
MDM vs. MAM: Comparing enterprise mobile security management options
by Matt Kosht, Contributor
Struggling to compare MDM vs. MAM? You're not alone. Learn all about the various technology options in enterprise mobile security management.
IT, workers need to know cloud storage security basics
by Diana Hwang
If workers use cloud-based file storage, IT has to be aware of where data is stored and users should be held responsible for their sharing.
- MDM vs. MAM: Comparing enterprise mobile security management options by Matt Kosht, Contributor
Companies consider application virtualization for mobile data security
by Diana Hwang
App virtualization can add a layer to mobile data security efforts, but it takes some work to set up and some users might find it frustrating to use.
- Companies consider application virtualization for mobile data security by Diana Hwang
More Premium Content Accessible For Free
Beat the security odds with a cloud risk equation
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Antimalware technologies and techniques to the rescue
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
UTM: Decision time
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.