By Sarah Fister Gale
Apr. 2, 2013
Just two years ago, containerization was in its infancy, Suby says. But today, 20 percent of companies use some form of containerization on their mobile devices, according to a 2012 survey conducted by Frost and the International Information Systems Security Certification Consortium, a professional group. And that number of organizations tapping container technology is expected to rise as more companies adopt BYOD policies.
“Companies needed to find a way to exert control over their data,” Suby says. “Creating pockets of control on end-user devices is one way to achieve that.”
Instead of banning risky apps, many companies create password-encrypted environments on users’ mobile devices. These isolated virtual workspaces, sometimes called “containers” or “sandboxes,” allow users to manage corporate data and run business apps including their corporate email and meeting software, without having them intermingle with personal data.
The technique lets users have dual personas on their devices, explains Michael Suby, vice president of research for Stratecast, a division of consulting firm Frost & Sullivan.
The business apps in the container can communicate with each other, but cannot exchange data with external apps. The information technology team is also able to monitor and control all the data that goes in and out of the container, and can remote-wipe that section of the device, while leaving the rest of it intact.
“It’s an evolution in mobile device management,” Suby says. And adoption of so-called “containerization” is on the rise.
We build robust scheduling & attendance software for businesses with 500+ frontline workers. With custom BI reporting and demand-driven scheduling, we help our customers reduce labor spend and increase profitability across their business. It's as simple as that.
Technology4 Ways to Maximize HR and WFM Data
Technology and cloud-based applications and platforms enable companies to gather more data, but can the...
TechnologyHow to prevent workforce management system outages: mitigation through redundancy
Summary Workforce management data breaches and outages are a very real threat Businesses should build r...
data breach, network security, payroll system, system outage, workforce management
TechnologyKronos (UKG) data breach leaves businesses in the dark for “several weeks”
Summary Workforce management company Kronos (UKG) suffers ransomware data breach Kronos Private Cloud a...
data breach, Kronos, ransomware, security, UKG