How to Choose the Right Cybersecurity Solution REGISTER >
Mobile computing brings increased productivity to the enterprise, but it also opens up businesses to mobile security risks. One of the biggest problems mobile IT departments face is figuring out how to secure confidential information stored on laptops and netbooks. These mobile devices are often stolen or lost no matter how careful the owner, and it's safe to say that laptop theft and loss will continue to be an ongoing challenge for mobile device managers.
There are different security controls mobile IT can put in place to secure the private information on laptops, including personal firewalls, passwords, recovery software (e.g. LoJack for Laptops) and end-user "Rules of Behavior" explained in corporate policy. However, none of these security controls come close to providing the security that self-encrypting drives offer.
The hardware-based, self-encrypting drive solution is so effective, that I'm fairly confident that this nascent market will become a huge trend and be widely adopted in the enterprise. Here, I'll outline the reasons why this strategy is so sound -- and why software-based disk encryption is not -- and will also provide an overview of the top vendors in this sector. Finally, I'll also list the types of businesses and agencies that can benefit from this mobile security approach.
To read the full article from our sister site, EnterpriseMobileToday.com, click here.