Case Studies

Businesses Lock Down Mobile Devices

Companies deploy mobile security to safeguard data.
Businesses Lock Down Mobile Devices

With so many cloud services on the market today, providers need something different to rise above the fray. That’s what Trend Micro’s Mobile Security offered AlertBoot, a cloud-based disk encryption service.

“It allowed us to offer customers our full-disk encryption service as well as mobile management of smartphones and tablets,” says Tim Maliyil, founder and CEO of AlertBoot in Las Vegas. “People saw the difference, and we’ve done very well, especially in healthcare fields where people are concerned with meeting HIPAA security requirements.”

Maliyil says Trend Micro’s mobile product was so effective that AlertBoot also migrated to Trend Micro’s full-disk encryption last summer. The Trend Micro security infrastructure can scale well as AlertBoot’s enterprise and government customers add users.

The company evaluated several mobile security products but found Trend Micro’s the most stable. “Plus, we found it to be better in terms of reporting and the way it confirmed or denied policies,” Maliyil says. “It’s also easy to use, which is important to our customers, many of whom are small business owners or sole proprietors with minimal IT staff.”

Phil Hochmuth, security products program manager for IDC, says AlertBoot’s approach jibes with some of IDC’s research on mobile security. “We found that the vast majority of organizations try to find extensions to traditional security products,” he says. “Sometimes, it’s a matter of going with the security tools you have in the wireless LANs, firewalls or VPN, while in other cases organizations don’t want to train their limited IT staffs on multiple technologies.”

A Total Package

Meadville Medical Center, a private hospital in Meadville, Pa., with roughly 1,200 users, uses Sophos Mobile Control as part of a suite of security products.


The percentage of IT managers who say they have experienced a breach or data loss in which a mobile device was a factor

SOURCE: “U.S. Mobile Security Survey, 2013” (IDC, April 2013)

Systems Administrator Jeri Sample added the mobile management capability last year, following the deployment of Sophos antivirus, data loss prevention and web filtering. “We deployed a spam filter for our email, and the mobile management came with it,” she says. “But we were moving in that direction anyway because we sought better control of our devices.”

Sample says the Sophos mobility software lets the medical center remotely wipe a lost phone and lock the screen if the device isn’t used after 15 minutes. And when an employee leaves the hospital, Sample can remotely wipe the Sophos interface to ensure the former worker can’t access the network.

Sign up for our e-newsletter

About the Author

Steve Zurier

Steve has more than 30 years of journalism and publishing experience, most of the last 20 of which were spent covering technology. He has covered networking and telecommunications in corporate computing, government and small business environments.

Follow him on Google+ and Twitter:


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.