Creating a Secure ‘Sandbox’ on Employee Devices

By Sarah Fister Gale

Apr. 2, 2013

Just two years ago, containerization was in its infancy, Suby says. But today, 20 percent of companies use some form of containerization on their mobile devices, according to a 2012 survey conducted by Frost and the International Information Systems Security Certification Consortium, a professional group. And that number of organizations tapping container technology is expected to rise as more companies adopt BYOD policies.

“Companies needed to find a way to exert control over their data,” Suby says. “Creating pockets of control on end-user devices is one way to achieve that.”

Sarah Fister Gale is a freelance writer based in the Chicago area. To comment, email Follow Workforce on Twitter at @workforcenews.

Instead of banning risky apps, many companies create password-encrypted environments on users’ mobile devices. These isolated virtual workspaces, sometimes called “containers” or “sandboxes,” allow users to manage corporate data and run business apps including their corporate email and meeting software, without having them intermingle with personal data.

The technique lets users have dual personas on their devices, explains Michael Suby, vice president of research for Stratecast, a division of consulting firm Frost & Sullivan.

The business apps in the container can communicate with each other, but cannot exchange data with external apps. The information technology team is also able to monitor and control all the data that goes in and out of the container, and can remote-wipe that section of the device, while leaving the rest of it intact.

“It’s an evolution in mobile device management,” Suby says. And adoption of so-called “containerization” is on the rise.

Sarah Fister Gale is a writer in Chicago.


blog workforce

We build robust scheduling & attendance software for businesses with 500+ frontline workers. With custom BI reporting and demand-driven scheduling, we help our customers reduce labor spend and increase profitability across their business. It's as simple as that.

Book a call
See the software

Related Articles

workforce blog


4 Ways to Maximize HR and WFM Data

Technology and cloud-based applications and platforms enable companies to gather more data, but can the...

workforce blog


How to prevent workforce management system outages: mitigation through redundancy

Summary Workforce management data breaches and outages are a very real threat Businesses should build r...

data breach, network security, payroll system, system outage, workforce management

workforce blog


Kronos (UKG) data breach leaves businesses in the dark for “several weeks”

Summary Workforce management company Kronos (UKG) suffers ransomware data breach Kronos Private Cloud a...

data breach, Kronos, ransomware, security, UKG