Securing Data at Rest Quick Start

Protecting data at the perimeter of a mobile enterprise is insufficieint and ignore a crucial vulnerability — sensitive data stored either on the device or on the runtime data tier are at risk from attackers who only need to find one way inside the network to access this confidential information.

Because, perimeter defenses like firewalls and Relay Servers cannot protect stored sensitive data from this threat, you must use alternate means to prevent this type of exploitation.