Page 20 - GBG Customer Engagement Book v1.06
P. 20
“WE USE A SECURE CONTAINER
TO STORE ALL OUR DATA”
- Secure containers are designed to prevent unauthorized access or data leakage, they do not protect against all mobile threats.
That said a secure encrypted container, such as Check Point Capsule, is a vital part of a layered mobile security, as is an MDM.
- Containers are a tool for separating business data from personal data on your mobile device, but this is not considered as
mobile security. Containers do not proactively look for risk on the device, they will not prevent: Zero-day malware, Man In
the Middle Attacks, they do not prevent Phishing attacks and malicious URLs.
A compromised device will expose your data even if stored on a state of the art container.
20
TO STORE ALL OUR DATA”
- Secure containers are designed to prevent unauthorized access or data leakage, they do not protect against all mobile threats.
That said a secure encrypted container, such as Check Point Capsule, is a vital part of a layered mobile security, as is an MDM.
- Containers are a tool for separating business data from personal data on your mobile device, but this is not considered as
mobile security. Containers do not proactively look for risk on the device, they will not prevent: Zero-day malware, Man In
the Middle Attacks, they do not prevent Phishing attacks and malicious URLs.
A compromised device will expose your data even if stored on a state of the art container.
20