Beyond the Network: Encrypting Mobile Data

By Laura Taylor

February 08, 2010

With 12,000 laptops going missing in airports each week, the security of mobile device storage is almost as critical as the security of mobile device connectivity. Full-disk encryption is one way to get that extra layer of security for those times a mobile device is physically compromised.

With 12,000 laptops going missing in airports each week, the security of mobile device storage is almost as critical as the security of mobile device connectivity. Full-disk encryption is one way to get that extra layer of security for those times a mobile device is physically compromised.


Mobile computing brings increased productivity to the enterprise, but it also opens up businesses to mobile security risks. One of the biggest problems mobile IT departments face is figuring out how to secure confidential information stored on laptops and netbooks. These mobile devices are often stolen or lost no matter how careful the owner, and it's safe to say that laptop theft and loss will continue to be an ongoing challenge for mobile device managers.

There are different security controls mobile IT can put in place to secure the private information on laptops, including personal firewalls, passwords, recovery software (e.g. LoJack for Laptops) and end-user "Rules of Behavior" explained in corporate policy. However, none of these security controls come close to providing the security that self-encrypting drives offer.

The hardware-based, self-encrypting drive solution is so effective, that I'm fairly confident that this nascent market will become a huge trend and be widely adopted in the enterprise. Here I'll outline the reasons why this strategy is so sound -- and why software-based disk encryption is not -- and will also provide an overview of the top vendors in this sector. Finally, I'll also list the types of businesses and agencies that can benefit from this mobile security approach.

Read "Mobile Security: A Surefire Laptop Encryption Strategy" at Enterprise Mobile Today



Comment and Contribute
(Maximum characters: 1200). You have
characters left.