Managed encryption services provider Echoworx has extended its mobile e-mail encryption technology to Apple devices, a move driven by the Bring You Own Device (BYOD) to work trend that sees IT departments increasingly having to deal with non-corporate-issued devices. http://www.echoworx.com/
Robbie Gulri, vice-president of products with the Toronto-based vendor, said that while IT departments find device management solutions a necessary part of dealing with this trend, it’s not the complete answer.
“There is a lot of proprietary information sitting around on these devices, especially as it relates to e-mail and messaging,” said Gulri.VIDEO: The inevitable BYOD revolution
Besides Echoworx’s mobileEncrypt Endpoint product now supporting iPads and iPhones, about a month ago, the company released a version for BlackBerry devices. Gulri anticipates there will be an offering for Android devices as well.
There’s also the ability to centrally manage devices by the IT department, including user provisioning and dealing with misplaced or stolen devices.
“If something happens to the device … I can, from an IT perspective, simply just shut down the device,” said Gulri.
A recent survey on mobile security in the enterprise, conducted by Telus Corp. and Rotman School of Management, found that the number one concern across almost all respondents was the fear of losing a mobile device containing corporate data.
Moreover, the survey reported that for more than half of respondents (47 per cent), their companies’ technology usage included a mobile component that was merely added on. More than a quarter (28 per cent) had an IT policy that didn’t even address mobile device usage.
Along the same vein, Cupertino, Calif.-based Symantec Corp. extended its e-mail encryption offering to iOS devices as well. Besides its PGP Viewer for iOS, the technology already existed for BlackBerry and Windows Mobile devices.
Michelle Warren, analyst and principal of Toronto-based MW Research & Consulting, said iOS devices are also on the radar for hackers as the number of security threats will increase in relation to the number of devices that users are bringing to the business arena.
“Apple users might claim that their devices are impenetrable, but nothing is impenetrable,” said Warren. “And, if corporate data is the goal, and an iOS device is the way in, a way will be found.”
Follow Kathleen Lau on Twitter: @KathleenLau
Understanding how IBM Spectrum Protect enables hybrid data protection
Abdicating your company’s data protection responsibilities to the first cloud solution provider you encounter is just as unwise as doing nothing at all to leverage the cloud. On the other hand, it can be a wise decision to investigate what results you might achieve by choosing a backup technology that is capable of supporting a hybrid protection approach capable of covering both on-premises technology and offsite cloud capabilities.