Find videos, customer case studies, datasheets, whitepapers and more to learn how Commvault can help you make your data work for you.
Protecting your companyâ€™s mobile data is a business imperative. Itâ€™s also a multi-functional process including backup and restore, safe file sharing, compliance and eDiscovery, analytics â€“ and strong security and data loss prevention that stops the bad guys cold.
Apply encryption, IP address tracking, remote wiping, geo-location, access control â€“ and do it all with centralized, policy-based management and auto-discovery.
Mobile devices are inherently at risk for loss and theft. Managing that risk is the heart of mobile security, but without the right tools itâ€™s a losing game.
Look at the sheer number of remote and mobile devices that have access to corporate data. Whether company-issued or BYOD (Bring Your Own Device), employees average three mobile devices per user. Thatâ€™s a lot of traveling devices and a lot of insecurity. Laptops are the worst security offenders: users commonly keep work files on the hard drive, and losing a laptop is an invitation to anyone who cares to take a look at the data.
The result is a growing number of data breaches throughout the world, many of them thanks to lost or stolen laptops. A 2014 study by the Ponemon Institute surveyed enterprises located all over the world, revealing that the average cost to a company was $3.5 million in US dollars â€“ 15% higher than in 2013. The 2015 version of the study reported that in the United States, the average cost for each breached confidential record averaged $217 â€“ and the average cost per breach soared to $6.5 million. Not all of these data breaches occurred on mobile devices but many of them did.
Serious data breaches can happen to anyone, anywhere. In 2014, a disgruntled employee stole laptops from Coca-Colaâ€™s Atlanta headquarters. Among other data, the laptops contained unencrypted HR records containing personal information on over 70,000 people â€“ suppliers, workers and contractors.
The level of the breach was devastating. The records listed Social Security numbers, addresses, names, driverâ€™s license numbers, and many other details; all there for the taking.
Simply telling employees to keep tabs on their mobile devices in airports, hotels, homes and HQ is never going to be enough. Your company needs a way to let your employees do their work while you transparently protect their device against the bad guys.
Fortunately the technology is out there. Hereâ€™s how to find it.