Klevtsov points Mr. Klevtsov sees the main task in protecting against leaks through mobile devices in the ability to correctly differentiate corporate and personal information on devices. Companies should implement rules for handling corporate information on mobile access devices. In relation to official mobile devices, this is largely cover by the functionality of other than DLP, information security solutions present on the market that allow you to control corporate information on mobile devices.
If the company uses personal mobile devices for work Klevtsov points
The DLP system must be able phone number library to separate personal and corporate data. there are several options for this, depending on the content or the staffing schule (for example, data movement during working hours from 9:00 to 18:00 is under control, and other times are not controll, since they are already personal).
The issue of monitoring mobile employees, notes Mr. Vakhonin, should be link to some important aspects: under what conditions mobile access to corporate data is us, where it is stor.
If access to official information is requir
By an employee who is in conditions of limit connection to the corporate network (say, on an airplane or in an area with weak data transmission channels), then the problem of reliable storage of corporate data on the mobile devices themselves in combination with control of peripheral devices should be solv.
If an employee has full remote access to
corporate data in real time, then how to write an exceptional outreach email? there is no practical sense in allowing corporate data to be mov to a personal or mobile device and then combating the resulting risks of leaks. It is more than enough to provide access via a terminal session, when corporate data, regardless afb directory of the physical location of terminal clients (in the office, at home, in other places), is stor and process strictly on the corporate environment side, and the user in the terminal session is provid only with the result of processing.