Access your Pro+ Content below.
Smartphone encryption, authentication ease mobile management
This article is part of the Information Security magazine issue of May 2011
Kenneth Johnston, CIO and vice president of information systems at Guaranty Bank, is not alone in his struggles to keep pace with workers on the move. Extending the bank’s existing email encryption capabilities to mobile devices resulted in a painful and time-consuming process for employees. “Our mobile workers and clients would try to get around the authentication process and fail,” Johnston says. “Instead of adding protection, encrypted email actually added to our data leakage fears.” Johnston turned to Proofpoint Mobile Encryption to help extend email encryption for bank employees and his bank’s commercial clients. Proofpoint provides a mobile application or Web-based access to its email encryption services. Springfield, Missouri-based Guaranty Bank has a virtual deployment of Proofpoint’s Enterprise suite to guard against unauthorized access via inbound and outbound email. Johnston says the mobile application is a natural extension of the enterprise suite, giving users a familiar experience. Now workers and clients can ...
Access this PRO+ Content for Free!
Features in this issue
Companies should revisit streamlined global data operations with an eye toward revamping compliance.
Cybercriminals are using social engineering fueled by social media to attack users and break into companies.
A strong information security program that goes beyond minimum standards will ease compliance.
New security tools allow companies to extend encryption and authentication to mobile devices.
Columns in this issue
There’s growing demand for information security professionals, but where will these skilled people come from?
Remember, potential new security roles are doled out based on experience and accomplishments, not some fancy title.
Companies need to improve their employee security awareness training to fight today’s threats.