Page 11 - Mobile Data Loss
P. 11
Preparing for Generation Mobile 5
compromised. Furthermore, the EMM can work in unison with a
secure mobile gateway to block access for devices that are unknown or
identified as out-of-compliance. Without EMM, your organization will
be crippled by lack of visibility, control, and automation to respond to
risks and threats.
EMM also compliments the aforementioned detect-and-respond
techniques with greatly enhanced defensive techniques to proactively
prevent data loss, breaches, cyber espionage, malware infestations, and
network threats. This is accomplished through the use of data loss
prevention (DLP) controls, encryption, containerization, and much
more. It’s safe to say that most organizations would rather avoid a
data loss breach than have to respond to one. EMM allows the organi-
zation to secure devices, apps, content, network access, and cloud. But
success of the program is not all about lockdowns, it also involves
providing ease-of-access to the users, and protecting their privacy.
In mobile, users are accustomed to ease-of-access to content as a
result of an apps-based model. One-click access allows access to their
email, calendar, social media, cloud repository, and much more.
Balancing this with security takes a careful approach that makes the
security more invisible to the user and gives the look and feel of
the native experience they are accustomed to. This can be accomplished
by using mobile-specific approaches such as app-based security, certifi-
cates, per-app VPN, and other technologies commonly used in mobile.
Balancing mobile security with privacy is the sword by which your
security strategy will survive or fail. At a time when people share
everything about their lives in social media, they are paranoid about
what a company can see or not see on their mobile devices. Paranoia
about this has increased immensely from the PC era to the Mobile era.
Surprisingly, there’s very little that a company can see on a mobile
device that they’re managing. In 2015, a “trust gap” survey was
performed to understand the variance in what employees thought an
employer could see on their mobile device versus the very limited
6
personal information that an employer can actually see. Contrary to
popular belief, employees cannot see personal emails, attachments, text
messages, photos, videos, voicemails, or personal web browsing
activity. Remaining transparent to your employees about this is crucial
6 https://www.mobileiron.com/sites/default/files/trust-gap/Trust-Gap-Infographic_v1.0_EN.pdf