Securing Data at Rest Quick Start

Protecting data at the perimeter of a mobile enterprise is insufficieint and ignore a crucial vulnerability — sensitive data stored either on the device or on the runtime data tier are at risk from attackers who only need to find one way inside the network to access this confidential information.

Because perimeter defenses like firewalls and Relay Servers cannot protect stored sensitive data from this threat, you must use alternative means to prevent this type of exploitation.