Share

Top 5 Stories

News

Mobile devices move to cloud for security

16 March 2011

The use of cloud-based technology is one way to provide security for personal mobile devices used within enterprise networks, according to Phil Hochmuth, program manager at IDC’s security products research group.

“Many enterprise security teams now regard cloud-based security technology as the best approach to provide effective security controls that allow non-corporate mobile devices to mix safely with enterprise networks, applications and data”, Hochmuth observed.

The rise of mobile devices and social media are driving IT to take a different approach to information security, said Peter Galvin, chief marketing officer at Proofpoint. IT needs to have the “security and compliance capability on top of these new consumer technologies”, he said.

“There is this trend of bringing your own device to work, BYOD, and I think it is a challenge for IT organizations to be able to put in place the proper security compliance requirements”, he added.

Proofpoint is offering a cloud-based product to secure mobile devices called Proofpoint Mobile, a family of applications that extend the company’s email security, compliance and archiving products to mobile devices. The mobile product runs on Proofpoint CloudControl, a security and compliance platform, and is delivered either through native applications or mobile-optimized web-based applications.

“One of the ways to help IT secure mobile devices, email communications, and other types of communication is using a cloud platform that provides the ability to handle millions of transactions at reduced costs”, he said.

Galvin said that medical industry is one area where his company is seeing an increasing demand for mobile security, particularly in response to tightening of the Health Insurance Portability and Accountability Act (HIPAA) privacy rules.

“We are seeing more desire by doctors and patients to communicate via email. Where many users are on road, being able to view those emails in a secure fashion on your phone has become very important”, Galvin said.

“One of the areas that mobile encryption is very popular now is in the healthcare environment. Whenever there is potentially private health information in an email correspondence, that email automatically becomes encrypted [using the Proofpoint Mobile product], thereby meeting the requirements of the HIPAA regulation”, he said.

This article is featured in:
Cloud Computing  •  Compliance and Policy  •  Wireless and Mobile Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×