Cloud security has been a top concern ever since organizations first began to shift data into the cloud and away from on-premises solutions.
While many cloud providers offer robust enterprise capabilities, including encrypted content, passcodes, and mobile device management, many can still fall victim to a serious security risk: data leakage.
Blake Brannon is a senior solutions engineer at AirWatch by VMware.
In an age where organizations and employees muddle the boundary between personal and private devices, employees can often access or transfer data to their unmanaged and unprotected devices. Providing employees with the ability to transfer and share sensitive data significantly increases the risk of data leakage.
The cloud leakage problem is one of the greatest threats to enterprise content security. While many cloud solutions secure enterprise content within the cloud infrastructure, they often lack the controls necessary to keep mobile users from downloading and walking away with critical information on personal, unsecured devices. However, there are powerful mobile security solutions that provide extra security for content in and out of the cloud. Here are the top five features companies must look for when choosing a mobile security solution that ensures content is secure.
Email protection — One of the easiest ways for employees to compromise content is by emailing secured cloud data to themselves on unprotected, personal email accounts. This not only leaks corporate content outside of an organization, but places it at greater risk of external hacks. Find a mobile security solution that can rein in rogue emailing and button up this source of content leakage by allowing only managed devices to synchronize with and download content from the cloud. These solutions also enable IT teams to monitor downloaded content, further securing your data.
Download prevention — The advent of the cloud means IT can no longer contain sensitive content behind four walls, and managing what devices can access company data has its limits with some cloud solutions. The easiest way to prevent employees from downloading sensitive data to personal devices is by forbidding external downloads onto unsecured devices altogether. But with some services, users can access content with phones that aren’t managed, creating a major backdoor into your data. Fixing this problem will take some integration between the technology and the particular ecosystem, but this issue will likely be addressed sooner rather than later. For now, find a solution that can limit what devices have access to content in the cloud. Continue Reading…