Cybersecurity , Data Breach , Incident & Breach Response

The Levels of Mobile Security

Good Technology CTO on Ensuring Data Privacy, Security
The Levels of Mobile Security
Nicko van Someren, Good Technology

Mobility has quickly evolved from being a "project" to an enterprise platform. What are the key security and privacy considerations when managing enterprise mobility? Good Technology CTO Nicko van Someren shares insight.

To start with, van Someren says, security leaders must understand today's evolved enterprise mobility environment. Mobile devices are ubiquitous, and whether they are employee-owned or enterprise-issued, they all contain data that is owned by different constituents. And each of these constituents has unique security and privacy needs.

"In the past, mobility has meant getting email while you're on the move," van Someren says. "But, increasingly, users within enterprises don't want to just get email; they want to carry out an entire workflow on their mobile devices."

It's a whole new challenge to secure entire business processes, van Someren says, as well as provide appropriate security levels for the data on those devices.

"The enterprise doesn't have as much control over the system, the device and the network," van Someren says. "So they need to find a way to control the data without necessarily controlling the device."

In an interview about enterprise mobility, van Someren discusses:

  • The evolution of enterprise mobility;
  • The distinct security levels to be serviced;
  • The tools and skills needed to ensure security and privacy.

van Someren is the Chief Technology Officer of Good Technology where he is in charge of future technology strategy and research. He has extensive experience in the security industry. Prior to joining Good he served as Chief Security Architect at Juniper Networks, responsible for leading the technology direction for the company's Network Security products. Before joining Juniper, he was founder and CTO of the security technology company nCipher Plc. where he led the research team and directed the technical development. He holds a doctorate and First Class degree in computer science from Cambridge University in the UK. He is a fellow of both the Royal Academy of Engineering and the British Computer Society.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.