Issue link: https://epubs.iltanet.org/i/50188
today, the situation has escalated out of control. On one hand, you have an insatiable appetite on the part of end users for more access to information and applications. On the other hand, the IT managers are trying to impose limits to protect sensitive data. These two factors seem to be deadlocked in an ongoing tug- of-war. As mentioned earlier, piecemeal solutions do exist, such as remote "wiping" of content from lost or stolen devices, disabling services or applying encryption tools that require complex authentication procedures. These only resolve a limited portion of the overall threat. What is needed to manage the chaos is an entirely new perspective for mobile security. In fact, the best approach is perhaps the simplest: using the cloud to manage credentials, and using the mobile device to store encrypted email data. Encrypted email messages are quickly becoming a requirement for law firms and businesses, and their IT managers are inundated with firmware resources for the hacking community." "There are countless off-the- shelf, publicly available, free software and the "bring your own device" (BYOD) phenomenon. Firms need a powerful enterprise solution to manage the email infrastructure and an easy-to-use solution for staff. If IT can have an over-the-air solution to manage these devices, where they can revoke or suspend the user's credentials and issue keys and digital IDs through a centrally managed console, they will have more time to focus on other IT issues. At the same time, employee data will be protected as on-the-device encryption addresses 56 Tech Potpourri ILTA White Paper IMPACTING YOUR APPROACH TO SECURITY When choosing a mobile encryption solution, be sure to choose one that is backed by a comprehensive public key infrastructure (PKI) credential-management platform and a globally recognized certificate authority. While smartphone and tablet technology has been an incredible enabler for business communications, there is no question that the proliferation in usage is challenging a law firm's ability to put the appropriate security measures in place to protect sensitive information. A secure on-the-device encryption solution, however, promises to have a significant impact on how IT managers approach email messaging security on mobile devices. ILTA the lack of comprehensive security on smartphones and tablets. This on-the-device solution is a native email messaging experience that lets the user compose, send, download and read messages directly on the device. It doesn't require any additional components because it works with an existing business email address.