BYOD
Crypto security of personal information in mobile devices.
Mobile telephones are used for business and personal purposes in most government and commercial organizations (the BYOD - Bring Your Own Device - principle). Internal memory of mobile phones and tablets accumulates a huge number of confidential corporate information that can be easily stolen. According to the study, conducted by Ponemon Institute in 2012, 60% of smartphones, lost or stolen in the United States each year, contain important sensitive information.
That’s why BYOD (Bring Your Own Device) solution is the most urgent problem for the security of mobile phone information.
The possibility to distinguish personal and corporate information (BYOD) is implemented in the Stealthphone information security system using a hardware method. It significantly reduces the risk of covert interception and disclosure of sensitive corporate information: financial, technological, official, intellectual, personal information about company managers and shareholders
.