Druva Blog > Industry Insights

BYOD & Security: It’s Not the Device, But the Data

Overall MDM is great for over-the-air app, data and config distribution. However the big question enterprises have to answer is if managing mobile devices would be enough to prevent information leakage. MDM profiles can create a content firewall between corporate and personal apps, but selective blocking is usually not enough to protect corporate information.

Statistics reveal that over 70% of information leakage is actually unintentional and often occurs when information is left unattended. More devices and more apps simply create more opportunities for information leakage.

Rather than putting more gates and firewalls around the data, the key to the solution is to focus on making the data inherently secure.

If the information can self-control who can access it, when they can be access it, and from where, it makes MDM security redundant and the information completely secure. Think about it, if the data itself can control who, when and where, it would solve common security use cases like:

  1. Disallow access of any information beyond corporate devices
  2. Auto-expire a document sent to contractors
  3. Limit the access of data created by the finance group to within finance group itself

The key to security in the BYOD world will be about managing the data and not the devices. Stay tuned for more updates on this.


  1. Arun Krishnaswamy 7 years ago

    Makes sense Jaspreet. What happens when the device is stolen or gets onto the wrong hands, or eyes. In that case, isn’t device security necessary and complementary to mobile data security? While data access will be shut off, there will be some data persistent and resident in the device that needs device security to wipe clean the corporate data on the device.

  2. Sarah 6 years ago

    Thanks for the question, Arun. You raise a good point about the data on the device. Any data protection plan needs to consider how to keep data safe if the device falls into the wrong hands. Removing access is just one important step. Additional measures such as device-level encryption and remote wipe will help protect the data that remains on the device.

  3. Author
    Jaspreet 6 years ago

    @Arun, once you have wiped the data-container cleaned or stopped the access, all the device has are bunch of settings and personal apps. Although an MDM like DLP may be important, but from a corporate responsibility point of you, protection data should cover the most.

    BTW: A lot of countries like Germany etc. don’t even allow wiping off personal/BYOD devices.

Leave a reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.