5 mobile content management solutions to keep your data safe

locked mobile phonePhones and tablets have become ubiquitous workplace tools. As such, employees demand access to all the content they need to do their job wherever they might be. And while that’s good for productivity, it can be trouble for security.

If your organization is like most, you have an on-premises solution for content management, but might not have a system in place for when the data is accessed from a mobile device. And if your organization fails to offer adequate access, workers turn to consumer sync and share services — one in five use these services to store and share corporate documents in the cloud, according to a recent Forrester survey. While these solutions are convenient, they lie outside of IT control and expose companies to a number of data security threats.

Five years ago conversations revolved around mobile device management (MDM) as organizations equipped their employees with smartphones and tablets. Now it’s time to talk about mobile content management (MCM) and how to secure corporate data accessed from those devices.

Some organizations might have MCM as part of their MDM solution but aren’t using it. Others have no MCM, and their IT departments are forced to play catch up on data security threats. If you haven’t yet implemented an MCM solution, it’s time to assess your needs and see how they match up to some of the top enterprise-grade options available. Continue Reading…

Tags: , , , , , , ,

The top 5 features all companies should look for in a mobile security solution

Cloud security has been a top concern ever since organizations first began to shift data into the cloud and away from on-premises solutions.

While many cloud providers offer robust enterprise capabilities, including encrypted content, passcodes, and mobile device management, many can still fall victim to a serious security risk: data leakage.

Blake Brannon Airwatch

Blake Brannon is a senior solutions engineer at AirWatch by VMware.

In an age where organizations and employees muddle the boundary between personal and private devices, employees can often access or transfer data to their unmanaged and unprotected devices. Providing employees with the ability to transfer and share sensitive data significantly increases the risk of data leakage.

The cloud leakage problem is one of the greatest threats to enterprise content security. While many cloud solutions secure enterprise content within the cloud infrastructure, they often lack the controls necessary to keep mobile users from downloading and walking away with critical information on personal, unsecured devices. However, there are powerful mobile security solutions that provide extra security for content in and out of the cloud. Here are the top five features companies must look for when choosing a mobile security solution that ensures content is secure.

Email protection — One of the easiest ways for employees to compromise content is by emailing secured cloud data to themselves on unprotected, personal email accounts. This not only leaks corporate content outside of an organization, but places it at greater risk of external hacks. Find a mobile security solution that can rein in rogue emailing and button up this source of content leakage by allowing only managed devices to synchronize with and download content from the cloud. These solutions also enable IT teams to monitor downloaded content, further securing your data.

Download prevention — The advent of the cloud means IT can no longer contain sensitive content behind four walls, and managing what devices can access company data has its limits with some cloud solutions. The easiest way to prevent employees from downloading sensitive data to personal devices is by forbidding external downloads onto unsecured devices altogether. But with some services, users can access content with phones that aren’t managed, creating a major backdoor into your data. Fixing this problem will take some integration between the technology and the particular ecosystem, but this issue will likely be addressed sooner rather than later. For now, find a solution that can limit what devices have access to content in the cloud. Continue Reading…

Tags: , , , , ,