10 Mobile Security, BYOD Privacy And Security Myths

10. Existing DLP Solutions Can Be Easily Migrated To Mobile

Data Loss Prevention assumes that either all data can flow through a fixed perimeter or there can be unwieldy software running on the endpoint. Neither model is viable when corporate data can start anywhere and end up everywhere, Bluebox said. Businesses should consider emerging alternatives and avoid applying traditional security technologies to address mobile. IT security will have to manage the data as the first line of defense regardless of where it is, according to Bluebox.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.