What is secure container? - Definition from WhatIs.com
Part of the Wireless and mobile glossary:

A secure container, in a mobile security context, is an authenticated and encrypted area of an employee's device that separates sensitive corporate information from the owner's personal data and apps.

The purpose of containerization (also known as sandboxing) is to prevent malware, intruders, system resources or other applications from interacting with the secured application and associated corporate data. 

Secure data containers are third-party mobile apps.The container acts as a storage area that is authenticated and encrypted by software and governed by corporate IT security policies. Some containers are designed for a single mobile OS, but many vendors offer variations of the same data container application for Android, iOS and Windows Phone. Such apps let IT enforce security policies on the same sensitive business data across different devices, which is especially useful because native device security capabilities vary.

As BYOD (bring your own device) and consumerization trends have grown, the challenges involved in protecting both corporate data and user privacy have also increased. Containerization is one means of providing administrators with full control over corporate applications and data without affecting those of the user. 

This was last updated in June 2014
Contributor(s): Lisa Phifer
Posted by: Margaret Rouse

Related Terms

Definitions

  • mobile governance

    - Mobile governance refers to the processes and policies used to manage mobile device access to an organization's network or its data. (SearchCompliance.com)

  • Intel Curie

    - Intel’s Curie module is a tiny system-on a-chip (SoC) based on the Intel Quark SE. The SoC is the size of a shirt button but includes everything required to provide compute power for wearable devi... (WhatIs.com)

  • full-disk encryption (FDE)

    - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryption at the hardware level. (WhatIs.com)

Glossaries

  • Wireless and mobile

    - Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question
  • Do mobile networks use encryption on SMS when used for two-factor authentication?

    No there's no encryption on normal SMS messages.

  • Dropbox Folders

    Dropbox folders can be considered secure for free, Business, and Pro users. The initial setup keeps files invisible to anyone without the direct link from the owner of the content or someone alread...

  • Physical Security

    i do not see any threats in having one key to open all doors in an IT office(and please correct me if I'm wrong) with the exception of the data/network/server room of course.  May I suggest to...

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.