Search This Blog

Powered by Blogger.

Blog Archive

Labels

IBM Hosted Mobile Device Security Management to Protect Confidential Data


IBM launched Hosted Mobile Device Security Management service to protect confidential data of organization against the risks of using corporate data in mobile.

This service helps protect against mobile device risks like theft, malware, spyware and inappropriate applications across mobile platforms

“The new service from IBM helps organizations protect their enterprise data while allowing employees to have the flexibility needed for today’s work environment," said Marisa Viveros, vice president of IBM Security Services.

A recent Dell Kace survey of 750 IT managers found that 87 percent of companies have employees using some kind of personal device accessing a corporate network
Accessing the corporate data through the mobile help to increase productivity. But accessing corporate data on unsecured mobile devices can leave you vulnerable to potentially disastrous data theft or loss.

You may also be risking noncompliance with regulatory requirements that can result in penalties, legal action and loss of brand reputation. However, setting up an in-house mobile device security infrastructure can involve large IT expenditures and a high level of technical expertise.

Hosted Mobile Device Security Management:

IBM Managed Security Services (Cloud Computing)—hosted mobile device security management is a comprehensive, cloud-based, fully managed solution that helps protect mobile devices used by employees to access corporate data.

It supports virtually all mobile devices across platforms, can help you: address data security issues, reduce capital and operational costs, better manage regulatory compliance and improve employee productivity.

This service is supported by skilled technical professionals with experience and expertise in implementing and managing mobile device security solutions.

The Security Service provides :

  • Protection against and monitor data loss and other risks caused by device theft
  • Protection against unauthorized access
  • Protection against malware, spyware and malicious applications
  • Secure data if the phone or tablet is lost or stolen
  • Track the missing device.

IBM is working with Juniper Networks to provide the protection and device management technology through the Junos Pulse Mobile Security Suite. The service will provide a self-cleaning feature that protects devices from dangerous applications by deleting them from the server.
Share it:

IT Security

Security News