Meeting The Mobile Enterprise Threat: Securing and Governing Sensitive Files With Mobile Devices

“Ask any IT manager, compliance officer or C-level executive what keeps them up at night, and the loss of market confidence, competitiveness and compliance resulting from a mobile data breach is near the top of the list,” said Josh Bohls, Founder, Inkscreen

The mobile security gap behind those sleep problems is real, according to experts.

A February 2016 Mobile Iron study gives further cause for concern: more than 50% of enterprises are likely to have at least one non-compliant device, whether jailbroken, rooted, lost, mis-managed or with a disabled personal identification number (PIN).[i]  Mobile apps themselves are also part of the problem, and policing them for security flaws seems to be a challenge. NowSecure recently reported that a quarter of all mobile apps have at least one high risk security flaw, 35 percent of communications sent by mobile devices are unencrypted, and the average mobile device connects to 160 unique servers each day.[ii]

Bohls cites six key requirements for enterprise mobile data governance and security:

  • Prevent files from going to unauthorized cloud repositories, third-party applications and other un-managed devices,
  • Demonstrate compliance with industry regulations and standards,  
  • Secure data at rest, both on devices and in centralized storage,
  • Secure data in transit, 
  • Enforce policies that prevent data leakage while promoting productivity, and
  • Manage all of the above without potentially impacting an individual employee’s personal content or device, and without usability complexities that might drive a user to unmanaged apps and a “shadow IT” mindset.

At the annual Gartner Security and Risk Management Summit in Maryland this week, Bohls and the Inkscreen team premiered the latest edition of the company’s CAPTOR™ app. Bohls cites the new app as a comprehensive mobile solution for IT-driven data policy enforcement and control over the capture, security and governance of mobile enterprise content – for organizations with or without an enterprise mobility management (EMM) solution in place.

Resolving mobile content security and governance problems is increasingly urgent, as mobile content capture becomes part of the workflow process.  In highly regulated industries such as construction, manufacturing, healthcare and banking, lapses can incur steep fines and penalties.  

"Mobile communication and collaboration is accelerating and improving enterprise productivity and growth like no other universal technology since the dawn of the Web 25 years ago, and various products have picked piecemeal at the breadth of mobile security problems,” Bohls concludes, adding that Inkscreen’s latest offering can help “close the gaping security holes that mobile content creates.” 


[i] https://www.mobileiron.com/en/company/press-room/press-releases/weak-links-more-50-enterprises-have-out-compliance-mobile-devices

[ii] http://www.businesswire.com/news/home/20160211005743/en/2016-NowSecure-Mobile-Security-Report-Reveals-25