Feature Security Privacy 2

Letting the personal mobile devices of staff and business partners to connect to the corporate network is increasingly becoming the norm, with one recent survey suggesting 75 per cent of organizations around the world now allow it.

But the approaches to ensuring sensitive corporate data getting on those is secure widely vary, with some enterprises unwilling to devote much money or resources to policy enforcement.

Check Point Software Technologies is offering CSOs who already have its solutions an answer: Merging a number of its technologies together to create a secure environment on a mobile device. Called Capsule, it allows enterprises control over devices it doesn’t oversee under a mobile management suite.

Capsule is a container enabled through a software upgrade to Check Point’s security appliances, plus a mobile app for the device. Security is created by policies applied when documents are created.

So far apps are for Android and iOS.

96688, 91979/related]

“We’re not going to have you re-build a whole infrastructure to do this,” Kellman Meghu, head of the company’s security architects in the Americas. “We take advantage of existing (security) policies and adding a BYOD functionality.”

“We’re carving out our own little space within the mobile device that links back to the organization, and allows it to push applications, data, email, calendar there, where people can manipulate it. But the information can’t leak out.”

If a user tries to email a document or send it to cloud storage, the security policies and encryption around the data remains.

Check Point also released a survey of 706 IT and security professionals in six countries including Canada, the U.S. and Britain illustrating the rise of personal devices on corporate networks. Just over 90 per cent of respondents said the number of personal devices on their networks is growing.

Just over 80 per cent of security pros expect mobile security incidents to increase this year.

And in what may be a reflection of the increase in phishing exploits and lost USB keys, 87 per cent say careless employees are a greater threat to security than cybercriminals



Related Download
Five Key Issues for DNS: The Next Network Management Challenge Sponsor: F5 Networks
Five Key Issues for DNS: The Next Network Management Challenge
Download this whitepaper to learn the five issues that IT needs to think about around DNS and why, as well as how you can build a strong DNS foundation to maximize use of resources, secure DNS, and increase service management, while remaining agile.
Register Now