Access "Smartphone encryption, authentication ease mobile management"
This article is part of the May 2011 issue of Comprehensive information security programs vital for PCI compliance
Kenneth Johnston, CIO and vice president of information systems at Guaranty Bank, is not alone in his struggles to keep pace with workers on the move. Extending the bank’s existing email encryption capabilities to mobile devices resulted in a painful and time-consuming process for employees. “Our mobile workers and clients would try to get around the authentication process and fail,” Johnston says. “Instead of adding protection, encrypted email actually added to our data leakage fears.” Johnston turned to Proofpoint Mobile Encryption to help extend email encryption for bank employees and his bank’s commercial clients. Proofpoint provides a mobile application or Web-based access to its email encryption services. Springfield, Missouri-based Guaranty Bank has a virtual deployment of Proofpoint’s Enterprise suite to guard against unauthorized access via inbound and outbound email. Johnston says the mobile application is a natural extension of the enterprise suite, giving users a familiar experience. Now workers and clients can quickly authenticate and open a ... Access >>>
Premium Content for Free.
Navigating international data privacy laws
by Cynthia O’Donoghue, Katharina A. Weimer and Amy Mushahwar
Companies should revisit streamlined global data operations with an eye toward revamping compliance.
Robust information security program key to PCI compliance requirements
by Eric Holmquist
A strong information security program that goes beyond minimum standards will ease compliance.
- Navigating international data privacy laws by Cynthia O’Donoghue, Katharina A. Weimer and Amy Mushahwar
Gaining awareness to prevent social engineering techniques, attacks
by Marcia Savage, Editor
Cybercriminals are using social engineering fueled by social media to attack users and break into companies.
Smartphone encryption, authentication ease mobile management
by Robert Westervelt, News Director
New security tools allow companies to extend encryption and authentication to mobile devices.
- Gaining awareness to prevent social engineering techniques, attacks by Marcia Savage, Editor
Information security professionals and the resource gap
by (ISC)2 Advisory Board of the Americas Executive Writers Bureau
There’s growing demand for information security professionals, but where will these skilled people come from?
Information security job titles: Irrelevant to your career
by Lee Kushner and Mike Murray
Remember, potential new security roles are doled out based on experience and accomplishments, not some fancy title.
Breaches highlight need for better employee security awareness training
by Marcia Savage, Editor
Companies need to improve their employee security awareness training to fight today’s threats.
- Information security professionals and the resource gap by (ISC)2 Advisory Board of the Americas Executive Writers Bureau
More Premium Content Accessible For Free
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises ...
The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based ...