Page 9 - Mobile Data Loss
P. 9

Preparing for Generation Mobile  3

               Lastly, many enterprises rely on perimeter security technologies as
                                                     5
            the foundation of their security strategy. As mobile becomes the
            primary computing method, these enterprises are ill-equipped to
            protect their data from ubiquitous mobile devices, cloud services,
            social media, and the new generation of mobile computing. Mobile
            doesn’t respect traditional network boundaries. And many of these
            organizations see mobile security solutions as a bolt-on product to
            their perimeter security strategy, rather than a fundamental shift in
            how enterprise data is shared and protected.



            WHAT’S DIFFERENT ABOUT MOBILE?

            Managing and controlling data-at-rest on a legacy PC is difficult. The
            operating system provides very little in terms of isolating corporate
            data from personal. And in most cases all applications have access to
            all data on the PC. If you have access to the PC, you’re considered a
            trusted user. This provides a huge threat surface leading to data loss,
            malware attacks, and breaches (Figure 1.1).

               Mobile operating systems are different from their PC counterparts in
            that they employ operating system sandboxing. This sandbox approach
            separates each app and its data from other apps and their data. This also























            Figure 1.1 Operating systems   PC vs. Mobile.


            5 Breach Level Index Annual Report 2014, http://breachlevelindex.com/pdf/Breach-Level-Index-
            Annual-Report-2014.pdf
   4   5   6   7   8   9   10   11   12   13   14