Skip to main content

We often get asked this question that "How secure is my data on Nintex Mobile?" or " What kind of encryption does Nintex Mobile use?"

So I thought, I create a blog post to explain data security in Nintex Mobile.

 

In a nutshell Nintex Mobile relies on the host operating system for data encryption. That means if your OS is configured to encrypt it's storage, Nintex Mobile will respect and follow that.

 

Normally in order to enforce data encryption on mobile platform, you have to have a pin code or password configured for your device.

For iOS and Windows Phone we could enforce encryption at application level. This means your Nintex Mobile data gets encrypted as soon as the lock screen (pin/password screen) appears is encrypted until the user has put the passcode for the first time after the device has been booted.

 

For Android this could not be achieved at application level. You either need to enforce device encryption using your MDM or to manually enable device encryption under lock screen. This setting is unfortunately different in different Android versions. Windows Platform (Windows 😎 utilizes BitLocker technology for encrypting data. (BitLocker Drive Encryption is only available in Windows 8.1 Pro and Windows 8.1 Enterprise editions.). While BitLocker is normally enabled by default in corporate devices, you sometime may need to enable it through your company's policy.

 

Here are a few links which will give you more information about encryption in Mobile Operating Systems.

it's fair to say that Nintex Mobile data as secure as your mobile phone.

However we tend to use the maximum security where possible. for example in iOS it's up to the application to decide whether it wants it's data encrypted under lock screen(unless explicitly forced by MDM). iOS gives us few options out of which Nintex Mobile uses the most secure setting. It means Nintex Mobile data gets encrypted as soon as device is locked. (does not have any delays)


How secure is the mobile data in the cloud? Can I hack a URL and get to it? What''s the authentication model?

Who actually has access to the data? Should I be concerned about PHI, HIPAA, PCI, ITAR data going out to the cloud?


Reply