Premium Content

Access "Companies consider application virtualization for mobile data security"

Published: 19 Nov 2013

The onslaught of mobile technology enabling anyone access to corporate data anytime, anywhere is forcing many IT administrators and CIOs to renew their quest for the Holy Grail of mobile data security. A careful approach to application virtualization can aid in that pursuit. There is no single solution for companies to keep their data safe. Each deployment is different, whether it's in healthcare, education or another industry, but basic mobile data security concerns transcend all environments. "This keeps me up the most at night," said Linda Hartford, CIO at Northeast Wisconsin Technical College in Green Bay, Wis. "We all have firewalls and data protection and double authentication on certain systems where we need it. I think it's a constant [process] to keep up with the knowledge of what's changing in the environment and how people are getting past the [security]." End users and IT professionals have a wealth of choices in this era of bring your own device (BYOD), bring your own application and now bring your own everything. In every organization, ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Is your mobile security strategy combating the wrong enemy?
    ism_0414.png
    E-Zine

    As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...

  • What's the best focus for MDM strategy now?
    best_focus_for_MDM.png
    E-Handbook

    This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...

  • Beat the security odds with a cloud risk equation
    ISM_0314.png
    E-Zine

    Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...