Controlling and Protecting Company Data in a Mobile World

Controlling and Protecting Company Data in a Mobile World

In this increasingly data-driven world, corporate security is more important than ever before. This concept is even more prevalent with the rise of the modern smartphone. Although these devices are quite convenient, the chances of proprietary information becoming lost, corrupted or stolen have dramatically increased. An employee could leave a company and no longer be authorised to view private data or a phone may be lost and fall into the hands of criminals and similar fraudsters. Intellectual property theft is therefore a very real concern. When we combine these threats with ever-advancing mobile phone hacks, it becomes clear that powerful solutions need to be put in place. What are some of the latest systems designed to mitigate the risks of this data loss?


Like many other systems, XenMobile addresses the issue of mobile device management (MDM). Secure email, document sharing, cloud-based solutions and the ability to effectively wipe all data should a device be lost are some of the techniques that this software employs.

Symantec Mobility

This mobility suite offers protection at important data access points such as the device, the application and the data layers themselves. Proprietary systems help to ensure that threats such as malware, unauthorised viewing and leakage are adequately addressed. Another key benefit here is that company-centred applications can be located alongside personal apps; neither of which will interfere with the other.


Enterprise-grade security is a defining feature of the enterprise mobility systems provided by Drupa. Cloud-based storage is shielded from third-party eyes through the use of two-factor encryption. This will prevent any unauthorised individuals from viewing important data. Remote deletion capabilities as well as location monitoring can effectively deal with any threat as soon as it becomes known. All of these features are backed up with centralised monitoring; offering management and the end user superior levels of transparency.

IBM MobileFirst

IBM MobileFirst offers a number of security solutions which are based around the needs of the business. These include device security and content security. Furthermore, both applications and communications can be hidden from prying eyes thanks to robust levels of encryption alongside systems such as multi-factor authentication (amongst other methods).


This company offers a framework known as Mobile Device Manager Plus. Permissions based upon the role of the employee, the ability to immediately wide remote data, geolocation tracking and the blocking of commercial applications while on company premises are a few mobile security solutions offered by ManageEngine.

The Critical Concept of Encryption

All of these systems share one thing in common. Each employs a proprietary encryption system to dissuade and prevent intellectual property theft from a mobile device. This is important, for many employees may use passwords that are considered to be rather weak. Should an employee copy data onto his or her phone and their PIN number be similarly vulnerable, fraud and theft are an even greater possibility. Whether accidentally or to view this data from the convenience of home with no bad intentions, the threat is just as real.

In these and other cases, encryption will always play an important role. Not only should peer-to-peer (P2P) encryption systems be used, but there can also be times when the data itself is encrypted. This will require another password in order to be viewed. Such a concept is an excellent redundant security feature and many systems will make use of multiple levels of encryption.

Increased Threats

Ultimately, mobile security and intellectual property theft are both growing concerns. Due to the sheer number of these devices and the presumption that their presence within the corporate world will continue to grow, companies should take these possibilities very seriously. What also should be mentioned is the rise of 4G connectivity. As this allows massive amounts of data to be downloaded, the potential of such information to be compromised obviously increases. Whether from the loss of a device or an intentional breach of traditional firewalls, more innovative solutions need to be put into place. The examples that we have seen are only a handful of the solutions that now exist. Still, their methods will continue to evolve alongside the threats that will likewise advance.

Mobile device management is an area that must be taken quite seriously by any company. Theft, fraud and data corruption can cost an enterprise untold amounts of money while placing their proprietary information in jeopardy. These solutions are effective ways to address and nullify such threats within real-world scenarios.
Surelock Global Investigators and Security Consultants are also well qualified (with a wealth of experience and knowledge) to provide advice in matters of corporate and personal security.