Create a Gartner Account

Data Can Move Without Leaking — Eliminate Four Flaws in Your Mobile Information Protection Strategy

Sign In

Already have a Gartner account?


CISOs must remember that the ultimate goal of attacks is to obtain information. Typical security defenses fail in mobile settings because they protect boundaries rather than the information itself, and mobile users do not respect traditional boundaries. The information itself must be protected.


Order Amount: $195.00


For help or information on purchasing documents contact us.

Please provide your profile information.

By clicking the "Submit" button, you are agreeing to the Gartner Terms of use and Privacy Policy.

Call +1 855-515-4486 or contact us

to become a Gartner client.