Manage Learn to apply best practices and optimize your operations.

Learn strategies for plugging a mobile data leak

As enterprise workforce mobility explodes, so do opportunities for costly mobile data leaks. However, attempts to safeguard enterprise data by banning mobile data access or locking down smartphones and tablets have failed, and demonstrate a pressing need for more effective strategies.

Chief information security officers are now on the hot seat, and seeking better ways to embrace the benefits of mobility while more effectively managing high-priority threats and business risks like mobile data leaks and others.

In this video, Lisa Phifer, principal at Core Competence, explores the pitfalls related to mobile data. She looks at means to avoid mobile data leaks, and also reviews some best practices she's found effective. You will learn, too, about emerging technologies -- everything from containerized apps to context-aware security policies -- that can thwart a mobile data leak and help your enterprise focus on its critical missions minus the risk.

View All Videos

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What is your security team's biggest concern when it comes to mobile data leaks, and how are you tackling it?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close