Page 7 - Mobile Data Loss
P. 7

CHAPTER 1 1






            Preparing for Generation Mobile



            INTRODUCTION

            The world is shifting to a mobile-first generation of mobile devices and
            away from the personal computer. Its impact on our personal lives and
            our workday is like no other phenomenon of computing history. This
            phenomenon has brought about a huge shift in how we share and con-
            sume information. It has also blended our personal life with our work
            life. While some companies have attempted to strong arm the wave in
            opposition, others have embraced mobile thereby allowing these com-
            panies to offer solutions that meet the needs and the demand of
            Generation Mobile.

               This tidal wave of mobile devices has been impossible to stop.
            Whether enterprises embrace them or not, users are accessing your
            data with mobile devices and sharing it in countless ways, a phenome-
            non known as Shadow IT. Controlling this data loss may at first
            appear to be an impossible task. In many cases, users are bringing in
            their own device and have full control of that device and the data on
            it. Even those organizations that have issued corporate devices find
            that in most cases users still find a way to use them for personal use,
            commonly referred to as COPE (Corporate Owned Personally
            Enabled).

               This has ushered in a new generation of Enterprise IT, one that
            embraces the value that mobile brings to the company and its business.
            It’s about enablement, agility, disruption, speed, ease-of-use, and aban-
            doning our old approaches to IT. But this doesn’t mean that security is
            an afterthought. We must learn from the security flaws of the PC era,
            embrace the enhanced security that mobile provides, and take our
            enterprises securely into the next generation of computing—mobile
            computing.





            Mobile Data Loss. DOI: http://dx.doi.org/10.1016/B978-0-12-802864-3.00001-5
            © 2016 Elsevier Inc. All rights reserved.
   2   3   4   5   6   7   8   9   10   11   12