Record Detail Back

XML

DLP for Tablets An Intelligent Security Decision


Given its ubiquity, it’s hard to believe that the Apple iPad has only been on the market for 18 months. Consumers love these devices, but they are also sprouting like weeds in the commercial sector as they enable new types of business processes and applications.
As tablet computers become more and more pervasive, will their presence increase IT risk? In other words, where does tablet security fit into CIO’s implementation plans? This report concludes: Employees access sensitive data with tablets and other mobile devices. ESG research indicates that many users access company confidential data, customer data, and regulated data via an army of mobile devices. A lack of security controls will inevitably lead to some highly publicized disclosed data breaches or routine regulatory compliance violations. CISOs are leaning toward data security controls for tablets. Large corporations may install endpoint security software controls on tablets over time, but in the near-term, security executives have issued a clear directive around data security. DLP for tablets is the best initial fit. DLP tools have oversight over users, devices, and data. By tracking all three parameters, these tools can execute granular security policy enforcement decisions, making them extremely flexible and effective. The best DLP for tablet suites will give users the freedom to access corporate and personal data and applications, align devicecentric and enterprise policy management and enforcement, and provide central command-and-control and reporting.
Enterprise Strategy Group, Inc - Organizational Body
NONE
Information Technology
English
2011
1-8
LOADING LIST...
LOADING LIST...