Top
Stories
Blog: The Practical Employer Employee vs. Independent Contractor: Do You Know the Difference? May 15, 2013
Blog: The Practical Employer How Much Does it Cost to Defend an Employment Lawsuit? May 14, 2013
Blog: The Practical Employer EEOC Sues Company for Forced Practice of Scientology May 13, 2013
Blog: Work in Progress Happy Talk? Keep Talkin' but Start Doin' May 9, 2013
Blog: The Practical Employer Debunking Myths of a Pro-Business Supreme Court May 9, 2013
Featured Article Employee Health Incentives: Myth or Miracle? May 8, 2013
Blog: The Practical Employer You'd Think We'd All Know the Dangers of 'Reply All' by Now May 8, 2013
Blog: The Practical Employer Taking Issue With the Term “Wage Theft” May 7, 2013
Blog: The Ethical Workplace Restoring Workplace Trust May 6, 2013

Featured Article

Creating a Secure 'Sandbox' on Employee Devices

Companies are tackling questions of security on worker mobile phones and tablets by creating special compartments in the devices.

  • Comments (0)
Related Topics:

Instead of banning risky apps, many companies create password-encrypted environments on users' mobile devices. These isolated virtual workspaces, sometimes called "containers" or "sandboxes," allow users to manage corporate data and run business apps including their corporate email and meeting software, without having them intermingle with personal data.

The technique lets users have dual personas on their devices, explains Michael Suby, vice president of research for Stratecast, a division of consulting firm Frost & Sullivan.

BYOD Brings Security Risks for Companies

To read how bring-your-own-device policies could be problematic, please click here.

The business apps in the container can communicate with each other, but cannot exchange data with external apps. The information technology team is also able to monitor and control all the data that goes in and out of the container, and can remote-wipe that section of the device, while leaving the rest of it intact.

"It's an evolution in mobile device management," Suby says. And adoption of so-called "containerization" is on the rise.

Young Workers Often Breach Electronic-Device Policies: Survey

To read about a survey that shows how millennials might not be securing their data on their devices, please click here.

Just two years ago, containerization was in its infancy, Suby says. But today, 20 percent of companies use some form of containerization on their mobile devices, according to a 2012 survey conducted by Frost and the International Information Systems Security Certification Consortium, a professional group. And that number of organizations tapping container technology is expected to rise as more companies adopt BYOD policies.

"Companies needed to find a way to exert control over their data," Suby says. "Creating pockets of control on end-user devices is one way to achieve that."

Sarah Fister Gale is a freelance writer based in the Chicago area. To comment, email editors@workforce.com. Follow Workforce on Twitter at @workforcenews.

Leave A Comment

Guidelines: Comments that include profanity or personal attacks or other inappropriate comments or material will be removed from the site. We will take steps to block users who violate any of our posting standards, terms of use or privacy policies or any other policies governing this site. You are fully responsible for the content you post.

Stay Connected

Join our community for unlimited access to the latest tips, news and information in the HR world.

Follow Workforce on Twitter
HR Jobs
View All Job Listings

Search