Protecting Data in the Post-PC World

No ratings

Presented at CSO40 2014 by

As the use of tablets and mobile devices has proliferated in enterprises, the issue of protecting sensitive data has jumped to the forefront of many CIOs’ minds. Whether sanctioned by IT or not, employees have begun to access and share their data on post-PC devices, often via file-syncing applications like Dropbox and as email attachments. There are a variety of approaches to protecting this data, including mobile device management (MDM), mobile application management (MAM), application containerization, virtual desktops, backhauling traffic, and building security into the data itself. Join us as we facilitate a discussion of the pros and cons of the various approaches, including case studies featuring organizations that have met challenges around file sharing, collaboration and data protection.