Last night, according to an exclusive media report, the after-sales service of a well-known domestic cell phone maker exploded with loopholes, and after the owner sent his cell phone to a designated repair store, the staff swapped the used motherboard into the repaired cell phone, while the owner opened the phone to see all the identities of the original owner of the motherboard, his bank card information, and all his personal photos, among other things.
While we don't know if this contains more private data and corporate business data, there is no doubt that this incident is not an isolated case in China. And most of the owners encountered this situation, in addition to the trouble directly delete, ask the manufacturer to give an account and statement of the individual, the enterprise did not make any effective measures to avoid the leakage of confidential business data. However, for enterprises, the threat posed by the user's stolen data is far more serious than malware! Therefore, businesses should always be on the alert for this situation as well.
In the wave of mobility, more and more companies are beginning to support the BYOD office model, and the user device once lost, or appeared above the second sale of the old motherboard and other abnormalities, the enterprise will need to ensure that the cell phone on the security of enterprise applications and data. After all, the data is the core of security, the current employees in the cell phone to deal with customers, product planning, design, strategic development and other confidential information more and more, but the phone still belongs to the personal equipment, how to prevent cell phone maintenance, theft, elimination, sale and other cases of data leakage should become the top priority of the enterprise mobile office security ideas.
To address this, PalmPro has developed a complete security office suite, the core function of which is: mobile data leakage prevention.
Application access control
(1) Ensure that only security-enhanced mobile applications can access internal resources;
(2) and all work application-related files and data are stored through encryption, so that the data packets can not be read even if they are stolen;
(3) Enable dynamic watermarking and disable taking pictures, videotaping, and taking screenshots in work applications, Bluetooth, copy and paste and other system functions.
Compliance Policy Settings
(1) Administrators can set DLP security policies for all work apps, such as whether to allow offline or not, and alarm if offline for more than a certain period of time;
(2) In addition, administrators can set up the handling of triggering the compliance conditions, such as disabling the device, disabling apps, and marking it as a blacklisted device if the device is lost or obsolete, with no way to enable related apps, view data, and so on. It is not possible to enable related applications, view data, etc.
Compliance Detection
(1) When a user uses a device normally, information such as device status, application status, and last use time is collected.
(2) If the device is not allowed to go offline, compliance checking is performed every time the business application is accessed.
(3) If the device is missing for a period of time or the application is not used for a long period of time, an alert is generated.
Automatic processing of violations
(1) To access a work application on a device again, in addition to device-level authentication (fingerprints, gestures), networking is required to perform strong user and device verification;
(2) If networking is not possible and compliance requirements do not allow offline or offline timeout, violation processing is performed;
(3) If networking detects that the current device is a non-permitted device, the backend automatically wipes the data. device, the background will automatically erase the data, such as enterprises to replace the CYOD device, eliminating the old device does not have to delete the data one by one, and the latter there is a risk of being recovered.
As the industry's most complete and leading mobile DLP solution, PalmTech enables organizations to avoid unintentional data leakage and other security risks caused by individual employees through flexible policy settings, application data encryption, and independent policies for each application version on iOS and Android systems without the need for third-party application code modification.
From a practical point of view, all the repair points on the market, will not make it clear to customers how to subsequently deal with the recycled cell phone data, but it is rumored that ordinary people who know a little bit of computer technology, download some tools on the Internet, will be able to collect and repackage these data to sell for profiteering. Therefore, in order to prevent corporate data leakage, enterprises should consider safeguarding work applications and data security from the application level to realize the perfect unity of user experience and corporate information security.
Aiming at the security crisis in BYOD scenarios, such as multiple models, difficult to manage, complex scenarios, big hidden dangers, poor experience of security products, and difficult to implement many obstacles, PalmTech has also developed a complete set of mobile security solutions based on respecting end-users' habits to safeguard the security of enterprise data in multiple dimensions such as counting, storing, transmitting, and tracing enterprise applications and data, and has already provided a series of solutions to financial, manufacturing, political, and governmental organizations to ensure the security of work applications and data. And it has already escorted the digital transformation of many industries, including finance, manufacturing, government affairs, military, public security, healthcare, and education.
Click
Read the original article
Learn about PalmSoft
This is the first time I've read about PalmSoft.