5 Best Practices for Secure Enterprise Content Mobility

Date of Publication: 
March 2014

The proliferation of mobile devices and IT management’s increasing acceptance of Bring Your Own Device (BYOD) are creating new security challenges for enterprises. Employees are using personal devices such as iPads and Android phones to access and store business data. To share this data, they’re relying on email and consumer-class file sharing services. Never before have so many different devices had access to so much enterprise IT resources and data, with so few IT and security controls.

In addition to the risk posed by insufficient data security for file sharing services, enterprises are also facing the risk of new, difficult-to-detect security attacks against mobile devices. Attacks on mobile devices are expected to grow in frequency and sophistication now that these devices are storing valuable data such as business files, email contacts, and login credentials.

Enterprises need a data security solution that encompasses employees’ personal mobile devices. While Mobile Device Management (MDM) provides a useful framework for provisioning mobile devices and Mobile Application Management (MAM) provides a useful framework for provisioning and managing apps, neither MDM nor MAM address the file sharing and collaboration needs of mobile users. Such a solution—Mobile Content Management (MCM)—protects content itself, regardless of which devices are being used, enabling users to share that content securely across mobile devices and with other authorized users. By making file sharing safe and convenient, MCM enables mobile workers to be as productive as possible on any device, anywhere, anytime.

Mobile security should be granular enough to let IT managers define and enforce policies that vary by position, department, geography, and security level, but flexible enough to enable mobile workers to use enterprise content in the way that best suits their position and work style. Collectively, MDM, MAM and MCM solutions, supported by solid policies and enforced by proactive IT departments, represent the key components of an effective, secure enterprise content mobility solution.