10 Mobile Security, BYOD Privacy And Security Myths

3. Mobile Device Management Is The Cornerstone Of Mobile Security

MDM may give companies more control and visibility into employee-owned devices connecting corporate infrastructure. But applying comprehensive data protections may be the ultimate cornerstone of mobile security, according to Bluebox, because data readily travels off the device through apps into the cloud, making multiple copies along the way. Security experts tell CRN that data encryption and better managed user provisioning systems could also help provide added security.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.