This resource is no longer available

Put a lid on it! Protecting corporate data on employee smartphones


There's little doubt that smartphones are here to stay, so, rather than trying to keep them out of the enterprise, security pros need to learn how to secure the ones that will inevitably be accessing corporate data. This includes securing mobile devices that are user purchased and owned rather than just those supplied by the company, making it more difficult to protect against an array of malware and potential data leaks. Though this may seem like a very daunting task, it's not insurmountable. There are strategies and policies that can both allow employees and executives to utilize smartphones, as well as protect corporate data.

In this video, Lisa Phifer of Core Competence Inc. will explain:

  • How to create mobile policies that include various types of smartphones
  • How to establish access privileges based on the trustworthiness of the mobile device and the user
  • Best practices for mobile encryption and other forms of mobile device security


Lisa Phifer President, Core Competence Inc.

Session 3: Diverse Mobile Platforms, Complicated Security

Session 4: Safeguarding Mobile Applications

Lisa Phifer has been involved in the design, implementation, and evaluation of networking, security, and management products for over 25 years. Since joining Core Competence in 1995, she has advised companies large and small regarding security needs, product assessment, and the use of emerging technologies and best practices. Lisa teaches about wireless LANs and mobile device security and management, and has written extensively for numerous publications, such as enterpriseNetworkingPlanet, Information Security Magazine, SearchMobileComputing, SearchSecurity, and more.

06 Apr 2010

This resource is no longer available.