SHARE
Facebook X Pinterest WhatsApp

Keeping Mobile Cloud Data Secure

As the use of mobile devices continues to soar, enterprise cloud applications are now resident in the palm of your hand, like your ordinary e-mail and mobile Web browsing. And with mobility comes ever greater responsibility to keep enterprise data safe. “The power of these devices in consumers’ hands is now equal to that of […]

Feb 4, 2010
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

As the use of mobile devices continues to soar, enterprise cloud applications are now resident in the palm of your hand, like your ordinary e-mail and mobile Web browsing. And with mobility comes ever greater responsibility to keep enterprise data safe.

“The power of these devices in consumers’ hands is now equal to that of what people have in their hands to access their enterprise data, and the two things are all getting smashed together,” said Tom Barber, vice president of marketing for DecisionPoint Systems, provider and consultant for enterprise cloud and mobile applications.

Kendall Collins, chief marketing officer at Salesforce.com, acknowledges that security is an area of concern for mobile devices. “Security on mobile devices is an area where we’ve invested a lot of time to make this world class,” he said. “We’ve seen a lot of custom applications being employed in mobile devices.”

Here’s what you need to know to keep your mobile cloud data safe.

“Security is an end-to-end problem between the end user and where the data lives,” Barber said. Overseeing the entire chain in your cloud operation is essential, from the technical infrastructure to the SaaS application to the mobile device. “To be able to manage and oversee the whole technical infrastructure — that is the mobile devices themselves and how they connect to the wireless network — is key to being able to keep it secure,” Barber explained. The mobile device is the weakest link in this chain and needs to be secured, he said.

“If you tackle the security for the mobile infrastructure, but you don’t tackle the security for the SaaS application, you’re still vulnerable,” Barber added. “You have to tackle both pieces of it, so you’re assured it’s end to end.”

Read the rest at Enterprise IT Planet.

  SEE ALL
ARTICLES
 

Recommended for you...

AI in Cybersecurity: The Comprehensive Guide to Modern Security
Liz Ticong
Apr 29, 2024
What Is Cybersecurity? Definitions, Practices, Threats
Liz Ticong
Apr 8, 2024
How to Secure a Network: 9 Key Actions to Secure Your Data
Liz Ticong
Mar 21, 2024
7 Best Data Security Software: Solutions For 2024
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.