Secure mobile device data at all stages
Expert Tips on Integrating Mobile and Cloud Strategies
Secure mobile device data at all stages
The old static security principles assume there is a beginning and an end, but now they all blend into our new always connected and always on world, said Jeff M. Spivey (@spiveyjms), VP of strategy, RiskIQ. Expand past old constructs and limits with a more holistic approach to risk management not a siloed approach of cloud or mobile. The trick is to find seamless layers of security and encryption that protect data end to end at rest, in transit, and on device and are so transparent that they're as easy to use as the cloud is by itself, said Asaf Cidon (@asafcidon), CEO and co founder, Sookasa. Too often, we see security solutions that disrupt the best parts of cloud or mobile computing, such as by disabling features like sync or blocking data from getting to the cloud or devices. But that isn't the answer, because that won't enhance productivity or help prevent user errors. The real solution lies in protecting the data itself, such as with file level encryption, so that your security measures follow the data wherever it goes.