Solving the compliance vs. mobile dilemma

14.09.2006

In general, however, Palma said there are three types of tangible security procedures that can bring mobile devices, and the data they carry, into compliance:

1. Authentication of devices and users.

2. Encryption of data.

3. The "remote kill." This enables IT personnel to remotely delete data on wireless devices such as smartphones once they are known to be missing. Such capabilities typically are provided by mobile device management software.

These broad elements are closely related to central management of mobile devices, another key aspect of mobile compliance efforts, Palma added.