Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Android
    • Android
    • Applications
    • Cloud
    • Cybersecurity
    • Mobile

    Quarri Prevents Users From Copying Sensitive Data on Android Devices

    Written by

    Fahmida Y. Rashid
    Published December 19, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Quarri Technologies is extending its endpoint security platform to Android devices, calling the mobile operating system the “second-largest attack surface,” according to company executives.

      With Quarri Protect on Q Mobile for Android, enterprises can protect sensitive data from data leaks even when accessed via mobile devices, Quarri officials said Dec. 13. The security controls prevent users, whether they are malicious or careless insiders, or external adversaries, from unauthorized access and data replication, Bill Morrow, executive chairman of Quarri Technologies, told eWEEK.

      Quarri’s POQ for Android also offers certificate whitelisting and blocking of invalid certificates to prevent man-in-the-middle attacks, as well as block browser plug-ins to mitigate hostile browser extensions, according to the company. The mobile version of Quarri’s security product also has network destination controls that prevent various forms of session redirection attacks.

      “Data at rest is relatively secure, but data that’s moving needs to be protected,” Morrow said. He called the browser at the endpoint “the weakest point on the network.”

      Employees are increasingly using various devices outside the corporate network to access company data, making it a challenge for IT departments to secure the data that is being copied onto, or read from, devices outside their control, according to Morrow. Organizations can lock down devices so that nothing can be accessed and “not take advantage of the latest technology,” or look for ways to protect data while being up-to-date with new products, he said.

      However, Morrow was quick to point out that “not all threats are external,” as insiders are responsible for about 60 percent to 65 percent of data leaks. Insiders whom Morrow called “careless,” rather than malicious, cause about half the data leaks. Only about 20 percent of data leaks could be attributed to external hackers, according to Morrow.

      “Quarri’s Protect On Q product suite helps corporations mitigate data replication by controlling both malicious and careless end-user behavior to prevent sensitive information from being stolen, leaked or shared,” he said.

      IT administrators can designate certain pieces of data as being highly sensitive and require users to employ a protected browser on their devices to be able to access it. POQ “wraps data” and keeps it secure from all threats, according to Morrow, noting that Quarri is not trying to protect all the data in the enterprise. The goal is to identify the most important pieces of data and critical intellectual property and just protect that, he said.

      Visual cues show users that the data they are trying to access is protected, which is often enough to make users think twice about being careful with the information, according to Morrow. It’s a form of education, since users can’t claim to not know what they were trying to view, or copy, was sensitive, but POQ also enforces the restriction by blocking user actions, he said. If the administrator has designated the item in question as something that can’t be replicated, when the user tries to print the screen, copy it onto an external drive or any other action, they are shown a message that informs them the action is not authorized and cannot be performed.

      The company initially worked on the Windows platform because it was the most targeted environment. The latest product focused on the Android platform because it was the second-largest platform under attack, Morrow said. Apple is the third-largest platform, and Quarri has plans for securing Apple’s devices in early 2012, Morrow said.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×