Page 11 - Mobile Data Loss
P. 11

Preparing for Generation Mobile  5

            compromised. Furthermore, the EMM can work in unison with a
            secure mobile gateway to block access for devices that are unknown or
            identified as out-of-compliance. Without EMM, your organization will
            be crippled by lack of visibility, control, and automation to respond to
            risks and threats.

               EMM also compliments the aforementioned detect-and-respond
            techniques with greatly enhanced defensive techniques to proactively
            prevent data loss, breaches, cyber espionage, malware infestations, and
            network threats. This is accomplished through the use of data loss
            prevention (DLP) controls, encryption, containerization, and much
            more. It’s safe to say that most organizations would rather avoid a
            data loss breach than have to respond to one. EMM allows the organi-
            zation to secure devices, apps, content, network access, and cloud. But
            success of the program is not all about lockdowns, it also involves
            providing ease-of-access to the users, and protecting their privacy.

               In mobile, users are accustomed to ease-of-access to content as a
            result of an apps-based model. One-click access allows access to their
            email, calendar, social media, cloud repository, and much more.
            Balancing this with security takes a careful approach that makes the
            security more invisible to the user and gives the look and feel of
            the native experience they are accustomed to. This can be accomplished
            by using mobile-specific approaches such as app-based security, certifi-
            cates, per-app VPN, and other technologies commonly used in mobile.

               Balancing mobile security with privacy is the sword by which your
            security strategy will survive or fail. At a time when people share
            everything about their lives in social media, they are paranoid about
            what a company can see or not see on their mobile devices. Paranoia
            about this has increased immensely from the PC era to the Mobile era.
            Surprisingly, there’s very little that a company can see on a mobile
            device that they’re managing. In 2015, a “trust gap” survey was
            performed to understand the variance in what employees thought an
            employer could see on their mobile device versus the very limited
                                                                 6
            personal information that an employer can actually see. Contrary to
            popular belief, employees cannot see personal emails, attachments, text
            messages, photos, videos, voicemails, or personal web browsing
            activity. Remaining transparent to your employees about this is crucial

            6 https://www.mobileiron.com/sites/default/files/trust-gap/Trust-Gap-Infographic_v1.0_EN.pdf
   6   7   8   9   10   11   12   13   14   15   16