CSO: Five myths about mobile security and their realities
Amtel CEO and founder Pankaj Gupta sheds some light on five common misconceptions about mobile security

By Steve Ragan
September 04, 2013

Earlier this summer, Aaron Rhodes of Neohapsis talked to CSO about five things to consider when developing mobile security policies. Today, moving that discussion forward, Pankaj Gupta of Amtel talks to us about five myths in mobile security.

In business both large and small, mobile devices are being used to access mission-critical data that must be protected. As mentioned in our previous article, mobile is the new endpoint when it comes to security.

The most common use for mobile in the business world is access to corporate email, which contains sensitive information and is often subject to regulatory compliance. However, Pankaj Gupta, the CEO and founder of Amtel adds that mobile users routinely share and access sensitive business files and documents for collaborative problem solving, and proprietary transaction data is captured by new mobile payment methods.

Despite these known usage patterns, some organizations struggle with their BYOD policies and their mobile planning. Some of those struggles center on a few false notions, which Gupta addressed in an email to CSO. With that said, here are his thoughts on five myths about mobile security and their actual realities.

Click the URL above to read the full article
Comments: 0
Votes:8