SlideShare uma empresa Scribd logo
1 de 15
Simon Cuthbert, Director
Introducing Security Guardian
• ‘Enterprise Level’ USB solutions
• All very good but all very similar solutions
• Most are encrypted
• Some have central management capability
• BUT…What Happens When the Device is Lost or Stolen?
• All these solutions rely on being plugged into a 3rd party
internet connect PC/Laptop to be managed
• If the device is not plugged in it…
• Can not be traced
• Can not be managed
• No verifiable audit trail
INTRODUCTION - USB Technology in use Today
3
• 561 Million USB Flash Drives will be sold between 2014 and 2018
• Forrsights Survey 2014
• More than 30% have lost a USB drive containing confidential
information
• 77% have lost a laptop, tablet or mobile with sensitive data
• 63% of IT managers lack visibility of mobile data within their
organisation
• 84% use personal emails to send sensitive information
• 50% use public cloud services to send sensitive files
• Wall Street Journal Aug 2014 5000 interviews
INTRODUCTION - Don’t Forget the Insider Threat!
4
People Lose Stuff!
More than 30% have lost a USB drive containing confidential information
77% have lost a laptop, tablet or mobile with sensitive data
* Wall Street Journal Aug 2014 5000 interviews
5
THE DETAILS - Human Error!
6
THE DETAILS - Human Error!
7
THE DETAILS - Human Error!
8
• Encryption
• Many end users turn off encryption on their device due to it
slowing down operation
• Data Stored in Cloud
• Many users will download a piece of sensitive information from
the Cloud but then store it locally to save time when it is
needed again
• Responsibility for security management should to be
taken away from the End User
THE DETAILS - People Just Want to Get On With Life!
9
Proposed EU Data Protection 2016
10
Have to be able to prove:
Network security procedures
Device encryption
THE DETAILS - Proposed EU Data Protection 2016
11
Remote delete requests
Recovered % deleted
• iOS 317 43%
• Android 193 57%
• Blackberry 170 61%
THE DETAILS - Deleting/Overwriting Data
12
• Mobile Data Tracking &
Management Specialist
• Manufactures of Security Guardian
SOLUTIONS - What is Security Guardian?
13
15
• Cloud based or On-Premise
Management & user interface
• Location via GPS, GSM & RFID
• Geofencing
• Time controlled access
• Over The Air configuration
• Remote turn On and Off
• Remote data destruct
• Verifiable audit trail and
reporting
SOLUTIONS - Management console
16
Thank you
Simon Cuthbert, Director – ExactTrak Ltd
Simon.cuthbert@exactTrak.com
LinkedIn: Simon Cuthbert +44 (0) 7710 253340 Twitter: @exactTrak

Mais conteúdo relacionado

Mais procurados

Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
AugmentedWorldExpo
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bb
technosyah
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
Moldova ICT Summit
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Indus Khaitan
 

Mais procurados (20)

Primend praktiline konverents - Samsung Cloud. Management. Security
Primend praktiline konverents - Samsung Cloud. Management. SecurityPrimend praktiline konverents - Samsung Cloud. Management. Security
Primend praktiline konverents - Samsung Cloud. Management. Security
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Privacy and technology
Privacy and technologyPrivacy and technology
Privacy and technology
 
Profile securitarian
Profile   securitarianProfile   securitarian
Profile securitarian
 
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
Gary Davis (Intel) Wearables: Panacea or Pandora's Box? A Security Perspective
 
Cs tations-pps xversion
Cs tations-pps xversionCs tations-pps xversion
Cs tations-pps xversion
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate InformationTop 10 Things to Secure on iOS and Android to Protect Corporate Information
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
 
Mobile security and what it means to you bb
Mobile security and what it means to you bbMobile security and what it means to you bb
Mobile security and what it means to you bb
 
Seven Simple Steps to Online Security
Seven Simple Steps to Online SecuritySeven Simple Steps to Online Security
Seven Simple Steps to Online Security
 
Developing secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov EndavaDeveloping secure mobile apps by Alexandru Catariov Endava
Developing secure mobile apps by Alexandru Catariov Endava
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Challenges posed by iot
Challenges posed by iotChallenges posed by iot
Challenges posed by iot
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Trends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and ArtifactsTrends in Mobile Device Data and Artifacts
Trends in Mobile Device Data and Artifacts
 
Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011Adam w. mosher - geo tagging - atlseccon2011
Adam w. mosher - geo tagging - atlseccon2011
 
Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT Hack the World: IT/IOT/ICS SCADA OSINT
Hack the World: IT/IOT/ICS SCADA OSINT
 

Destaque

DM_CLUB_MEMBER
DM_CLUB_MEMBERDM_CLUB_MEMBER
DM_CLUB_MEMBER
Parag Shah
 
You n me debby puspita sari
You n me debby puspita sariYou n me debby puspita sari
You n me debby puspita sari
debbypuspitasari
 
Project 2_Design Process_Research Analysis.pdf
Project 2_Design Process_Research  Analysis.pdfProject 2_Design Process_Research  Analysis.pdf
Project 2_Design Process_Research Analysis.pdf
Foo Zhi Fung
 
екологічний урок маденов1
екологічний урок маденов1екологічний урок маденов1
екологічний урок маденов1
Gymnasiya10
 
Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013
Kalle Virtapohja
 
MAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEWMAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEW
RAKESH SINGH
 
convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03
Kevin Parrish
 
Nodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiemNodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiem
Zane Ruģēna
 

Destaque (20)

мбоу ооп ооо
мбоу ооп  ооомбоу ооп  ооо
мбоу ооп ооо
 
Beykoz belediyesi sunum
Beykoz belediyesi sunumBeykoz belediyesi sunum
Beykoz belediyesi sunum
 
DM_CLUB_MEMBER
DM_CLUB_MEMBERDM_CLUB_MEMBER
DM_CLUB_MEMBER
 
You n me debby puspita sari
You n me debby puspita sariYou n me debby puspita sari
You n me debby puspita sari
 
Project 2_Design Process_Research Analysis.pdf
Project 2_Design Process_Research  Analysis.pdfProject 2_Design Process_Research  Analysis.pdf
Project 2_Design Process_Research Analysis.pdf
 
50 erros de português
50 erros de português50 erros de português
50 erros de português
 
л. н. толстой
л. н. толстойл. н. толстой
л. н. толстой
 
екологічний урок маденов1
екологічний урок маденов1екологічний урок маденов1
екологічний урок маденов1
 
Xoxo ir presentation may 7 2015
Xoxo ir presentation may 7 2015Xoxo ir presentation may 7 2015
Xoxo ir presentation may 7 2015
 
Вивчення шляхів реалізації самоосвітньої компетенції вчителів
Вивчення шляхів реалізації самоосвітньої компетенції вчителівВивчення шляхів реалізації самоосвітньої компетенції вчителів
Вивчення шляхів реалізації самоосвітньої компетенції вчителів
 
Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013Vuoden urheilija 1947 2013
Vuoden urheilija 1947 2013
 
Comm tech final project
Comm tech final projectComm tech final project
Comm tech final project
 
MAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEWMAXIMO 6.2 BASICS OVERVIEW
MAXIMO 6.2 BASICS OVERVIEW
 
convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03convoy-leader-training-handbook_8aug03
convoy-leader-training-handbook_8aug03
 
The Shocking True Cost Of A Bad Hire
The Shocking True Cost Of A Bad HireThe Shocking True Cost Of A Bad Hire
The Shocking True Cost Of A Bad Hire
 
оноре де бальзак
оноре де бальзаконоре де бальзак
оноре де бальзак
 
ქანდაკება
ქანდაკებაქანდაკება
ქანდაკება
 
З досвіду роботи Галич Н.В.
З досвіду роботи Галич Н.В.З досвіду роботи Галич Н.В.
З досвіду роботи Галич Н.В.
 
XOXO IR Presentation Q3 2014
XOXO IR Presentation Q3 2014XOXO IR Presentation Q3 2014
XOXO IR Presentation Q3 2014
 
Nodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiemNodokļu atlaides ziedotājiem
Nodokļu atlaides ziedotājiem
 

Semelhante a Introducing Security Guardian from ExactTrak

Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
AugmentedWorldExpo
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 

Semelhante a Introducing Security Guardian from ExactTrak (20)

SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John PragnellSE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
SE-4060, Securing the Mobile World, by Norman Shaw and John Pragnell
 
OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
3 steps security
3 steps security3 steps security
3 steps security
 
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBsISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
ISC(2) Security Briefing Part 3 - Enabling Secure BYOD with CASBs
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Session810 ken huang
Session810 ken huangSession810 ken huang
Session810 ken huang
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD TechnologyEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptx
 
2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya2016 Public Safety Vision Strategy Direction - Avaya
2016 Public Safety Vision Strategy Direction - Avaya
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Introducing Security Guardian from ExactTrak

  • 2. • ‘Enterprise Level’ USB solutions • All very good but all very similar solutions • Most are encrypted • Some have central management capability • BUT…What Happens When the Device is Lost or Stolen? • All these solutions rely on being plugged into a 3rd party internet connect PC/Laptop to be managed • If the device is not plugged in it… • Can not be traced • Can not be managed • No verifiable audit trail INTRODUCTION - USB Technology in use Today 3
  • 3. • 561 Million USB Flash Drives will be sold between 2014 and 2018 • Forrsights Survey 2014 • More than 30% have lost a USB drive containing confidential information • 77% have lost a laptop, tablet or mobile with sensitive data • 63% of IT managers lack visibility of mobile data within their organisation • 84% use personal emails to send sensitive information • 50% use public cloud services to send sensitive files • Wall Street Journal Aug 2014 5000 interviews INTRODUCTION - Don’t Forget the Insider Threat! 4
  • 4. People Lose Stuff! More than 30% have lost a USB drive containing confidential information 77% have lost a laptop, tablet or mobile with sensitive data * Wall Street Journal Aug 2014 5000 interviews 5
  • 5. THE DETAILS - Human Error! 6
  • 6. THE DETAILS - Human Error! 7
  • 7. THE DETAILS - Human Error! 8
  • 8. • Encryption • Many end users turn off encryption on their device due to it slowing down operation • Data Stored in Cloud • Many users will download a piece of sensitive information from the Cloud but then store it locally to save time when it is needed again • Responsibility for security management should to be taken away from the End User THE DETAILS - People Just Want to Get On With Life! 9
  • 9. Proposed EU Data Protection 2016 10
  • 10. Have to be able to prove: Network security procedures Device encryption THE DETAILS - Proposed EU Data Protection 2016 11
  • 11. Remote delete requests Recovered % deleted • iOS 317 43% • Android 193 57% • Blackberry 170 61% THE DETAILS - Deleting/Overwriting Data 12
  • 12. • Mobile Data Tracking & Management Specialist • Manufactures of Security Guardian SOLUTIONS - What is Security Guardian? 13
  • 13. 15
  • 14. • Cloud based or On-Premise Management & user interface • Location via GPS, GSM & RFID • Geofencing • Time controlled access • Over The Air configuration • Remote turn On and Off • Remote data destruct • Verifiable audit trail and reporting SOLUTIONS - Management console 16
  • 15. Thank you Simon Cuthbert, Director – ExactTrak Ltd Simon.cuthbert@exactTrak.com LinkedIn: Simon Cuthbert +44 (0) 7710 253340 Twitter: @exactTrak

Notas do Editor

  1. The proposed EU Data Protection revisions for 2016 state that ‘Encryption alone is not enough’. Meaning that there needs to be greater control of mobile data in transit and a means of greater management should data be potentially lost or stolen with a full verifiable audit trail.
  2. Figures come from a global financial services company and cover two years. These figures only relate to product that were subsequently found / recovered. In essence there is only a 50% chance that remote data is detected with current technology. It has to get better.