The Mobile Device Threat: Shocking Mobile Security Stats

Printer-friendly versionEmail this CRN article

Preferred Risk-Fighters

When it comes to mobile risks, some combative technologies are more preferred than others, Ponenom and Websense found.

The study listed a number of potential solutions for minimizing mobile security risks and asked respondents to identify which they most prefer. Device-level encryption topped the list (despite the fact that, in a separate survey question, only about half of the respondents said they enforce this measure). Endpoint security solutions was a close second, followed by identity and access management (IAM) solutions, anti-virus/anti-malware (AV/AM), and mobile device management (MDM) technologies. The study said that many companies invest significantly in encryption and endpoint security solutions to safeguard mobile environments, but lack the ability to track how and what data is leaving through insecure mobile devices. For maximum risk mitigation, businesses need data loss prevention technology that can keep tabs on where critical data is hosted, who accesses it, and how exactly it’s being lost.

Printer-friendly versionEmail this CRN article

Get a roundup of CRN's mobility coverage right to your inbox with the Mobility Insights newsletter.