Page 9 - Mobile Data Loss
P. 9
Preparing for Generation Mobile 3
Lastly, many enterprises rely on perimeter security technologies as
5
the foundation of their security strategy. As mobile becomes the
primary computing method, these enterprises are ill-equipped to
protect their data from ubiquitous mobile devices, cloud services,
social media, and the new generation of mobile computing. Mobile
doesn’t respect traditional network boundaries. And many of these
organizations see mobile security solutions as a bolt-on product to
their perimeter security strategy, rather than a fundamental shift in
how enterprise data is shared and protected.
WHAT’S DIFFERENT ABOUT MOBILE?
Managing and controlling data-at-rest on a legacy PC is difficult. The
operating system provides very little in terms of isolating corporate
data from personal. And in most cases all applications have access to
all data on the PC. If you have access to the PC, you’re considered a
trusted user. This provides a huge threat surface leading to data loss,
malware attacks, and breaches (Figure 1.1).
Mobile operating systems are different from their PC counterparts in
that they employ operating system sandboxing. This sandbox approach
separates each app and its data from other apps and their data. This also
Figure 1.1 Operating systems PC vs. Mobile.
5 Breach Level Index Annual Report 2014, http://breachlevelindex.com/pdf/Breach-Level-Index-
Annual-Report-2014.pdf