Mobile/Tablet Security
Continuing with our technology and security aspects related to mobile/tablet devices, you can figure out that most of the enterprises like you are upset with data theft and leakage through mobile/tablet devices.
Mostly mobiles are BYOD (Bring Your Own Device) or company owned basis. They are used outside of company's network and are exposed to security threats in public network, home network etc. There are 2 challenges to be taken seriously when you want to achieve Data Theft or Leakage Prevention on mobile/tablets.
Challenge 1: Segregation of Security Eligible Enterprise Data
Mobiles/Tablets enclose voluminous personal data in terms of entertainment, photos along with enterprise data. Your need is only to secure enterprise data from Theft and Leakage. Attempt to secure all the data irrespective, whether it is personal or enterprise, will severely intrude privacy of employee who uses mobile phone for personal purpose. Enterprise cannot disallow employees to share their personal content with near and dear ones. At the same time enterprise is worried about sharing of its enterprise data (email attachments/files etc) for competitive exploitations.
Challenge 2: Mix-up of personal and enterprise data making it difficult only to apply security policies on Mobiles/Tablets
Users may have a severe objection if their personal data is subjected to vigilance and control policies. It is not possible to apply policies selectively on personal and enterprise data as users tend to a mix-up on saving enterprise data with personal data and vice versa.
They do not have any prerequisite to stop it. Our technology separates enterprise data in data-tight (like air-tight or water-tight) manner, during the session of accessing enterprise data, it implements all data leakage and theft prevention policies on USB, emails and internet. This ensures that your staff can utilize enterprise data and the organization is not concerned about data theft or leakage. Not only this but also, all limits are automatically removed when personal data is accessed. It works great when enterprise allows devices on a BYOD basis where employees are assured of free use of personal sessions without any tracking, monitoring or restricted use of enterprise sessions under all monitoring and organization policies.
In order to understand how BLACKbox prevents theft or leakage of data, let us first understand the situations which can cause data theft or competitive exploitation or NDA liability trigger.
BLACKbox intelligently solves this challenge in a full proof manner. Its technology is known as a m-duo, first separates mobile/tablet storage in personal and enterprise compartments. It separates these compartments in enormously data-tight (like air-tight or water-tight) manner. Once implemented, enterprise data can't be accessed from the personal session and vice versa.
M-Duo technology will not allow user to mix-up personal and enterprise data. It will make sure that only enterprise data is subjected to all security and control policies.
First situation is, Data Theft over USB from Mobile; A user can easily take away your designs, drawings, documents, cost sheets, business information, customer data etc by USB drive through mobile. It can be misused for competitive exploitation or you may be liable of an NDA breach. We are 100% sure that 99% enterprises are not equipped to plug such serious loophole. Think about your enterprise, are you among those 99% vulnerable enterprises?
Second Situation is, Data Leakage or Theft in email attachment or Blind Carbon Copy; Users can easily attach data and send out by emails from their mobile. Not only that but also, user can send Blind Carbon Copy to leak or steal data. This is how it works. A confidential report or tender bid, or design or accounts data is sent to senior management and BCC is sent to a competitor. Senior management would never realize that such a confidential data is also sent to competitor as BCC is not visible. We are 100% sure that 99% enterprises can't stop data theft through their email system. Think about your enterprise, are you among those 99% vulnerable enterprises? and Three,
Data theft or leakage over Internet Ever enterprise has to provide internet to users as a resource to do their job. Specific jobs in sales, marketing, research, technical, procurement area, full access to Internet is essential. Enterprise understands necessity of unrestricted internet access to users, but is worried about data leakage or theft over internet from mobile. Firewalls cannot stop data theft over internet for the users whose internet is not restricted due to work requirement reasons. We are 100% sure that 99% of enterprises do not have any solution to prevent data theft over internet. Think about your enterprise, are you among those 99% vulnerable enterprises?
Data theft by Screenshots on mobile phone This application can also disable screenshot function of mobile phone while user is accessing enterprise data in enterprise session.
It comes with some useful features as below
- To control data leakage through Email, USB or Internet from company given mobile phones or tablets.
- To control data leakage through Email, USB or Internet from BYOD based employee owned mobile phones or tablets.
- To segregate data of enterprise apps and enterprise emails from employee's personal data on employee's mobile phone to prevent enterprise data leakage
- To prevent data leakage through screen capture while keeping enterprise data (email or attachment or images) opened
- To allow users to access enterprise applications or data through VPN only
- To allow enterprise internet browser with enterprise applications only
- To exercise complete controls on camera, apps, screen capture, VPN, internet on company given android or Samsung phone
Note : Implementation of M-Duo requires BLACKbox Prime on server side.