Create a Gartner Account

Data Can Move Without Leaking — Eliminate Four Flaws in Your Mobile Information Protection Strategy


Sign In

Already have a Gartner account?

Summary

CISOs must remember that the ultimate goal of attacks is to obtain information. Typical security defenses fail in mobile settings because they protect boundaries rather than the information itself, and mobile users do not respect traditional boundaries. The information itself must be protected.

Pricing

Order Amount: $195.00

Help

For help or information on purchasing documents contact us.

Please provide your profile information.



By clicking the "Submit" button, you are agreeing to the Gartner Terms of use and Privacy Policy.

Call +1 855-515-4486 or contact us

to become a Gartner client.