Containerization moves beyond the full erase

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

The latest containerization technologies enable IT to create separate, protected areas for work apps and data on employees’ personal devices. The challenge is to maintain security

What a difference three years makes. In 2012, when Computerworld first looked at containerization technologies that help organizations manage their bring-your-own-device programs, the landscape was quite different from what it is today. Now, all the issues about information security, app wrapping and data wiping have gathered under one umbrella: management.

Encryption -- as opposed to mobile hypervisors and app wrappers -- is now considered the most viable option for keeping corporate data separate from personal data. The primary goal, of course, is to keep confidential company information away from unauthorized eyes. But another reason for separating the two types of data is to make it possible to delete corporate data on a personal phone without touching the personal data.

And vendors are adding other capabilities, such as links between enterprise mobile management software and mobile operating systems. No vendor has mastered the balancing act between the need for security and the need to give employees access to company data so they can be productive, but they're making progress.

Experts say three trends have shaped the current containerization landscape: increased mobility among workers (who don't want to carry two phones or lose personal data after a corporate wipe), advances in mobile security technology and a push toward better device management.

Here's a look at those market-shaping trends and their impact on IT departments.

To continue reading this article register now

Join the discussion
Be the first to comment on this article. Our Commenting Policies