Related Stories

  • Accreditation body revises HIPAA data privacy and security standards
    URAC, a nonprofit healthcare accreditation organization, has revised its Health Insurance Portability and Accountability Act (HIPAA) privacy and security standards.
  • HHS levies first fines under HIPAA privacy rule
    The Department of Health and Human Services (HHS) has issued its first fines under the Health Insurance Portability and Accountability Act (HIPAA) privacy rule to Maryland-based Cignet Health Care for denying 41 patients access to their medical records and obstructing the department's probe.
  • Malware – arriving soon on a mobile device near you
    Malware affecting mobile devices is still in its infancy, but huge growth in this area is likely in the not-too-distant future. This was the message imparted by Andrew Hayter, anti-malcode program manager with ICSA Labs, who spoke with Infosecurity at this week’s RSA Conference in San Francisco.
  • Mobile malware on the rise, warns McAfee Labs
    Malware targeting mobile devices increased 46% in the fourth quarter of 2010, according to McAfee Labs’ latest threat report.
  • Mobile app users’ account data compromised
    Trapster – the mobile application that warns members about the location of various speed traps and road hazards – has informed users about a ‘security incident’ involving their account data.

Top 5 Stories


Mobile devices move to cloud for security

16 March 2011

The use of cloud-based technology is one way to provide security for personal mobile devices used within enterprise networks, according to Phil Hochmuth, program manager at IDC’s security products research group.

“Many enterprise security teams now regard cloud-based security technology as the best approach to provide effective security controls that allow non-corporate mobile devices to mix safely with enterprise networks, applications and data”, Hochmuth observed.

The rise of mobile devices and social media are driving IT to take a different approach to information security, said Peter Galvin, chief marketing officer at Proofpoint. IT needs to have the “security and compliance capability on top of these new consumer technologies”, he said.

“There is this trend of bringing your own device to work, BYOD, and I think it is a challenge for IT organizations to be able to put in place the proper security compliance requirements”, he added.

Proofpoint is offering a cloud-based product to secure mobile devices called Proofpoint Mobile, a family of applications that extend the company’s email security, compliance and archiving products to mobile devices. The mobile product runs on Proofpoint CloudControl, a security and compliance platform, and is delivered either through native applications or mobile-optimized web-based applications.

“One of the ways to help IT secure mobile devices, email communications, and other types of communication is using a cloud platform that provides the ability to handle millions of transactions at reduced costs”, he said.

Galvin said that medical industry is one area where his company is seeing an increasing demand for mobile security, particularly in response to tightening of the Health Insurance Portability and Accountability Act (HIPAA) privacy rules.

“We are seeing more desire by doctors and patients to communicate via email. Where many users are on road, being able to view those emails in a secure fashion on your phone has become very important”, Galvin said.

“One of the areas that mobile encryption is very popular now is in the healthcare environment. Whenever there is potentially private health information in an email correspondence, that email automatically becomes encrypted [using the Proofpoint Mobile product], thereby meeting the requirements of the HIPAA regulation”, he said.

This article is featured in:
Cloud Computing  •  Compliance and Policy  •  Wireless and Mobile Security


Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×