Mobile Computing.com

remote wipe

By Alexander S. Gillis

What is a remote wipe?

Remote wipe is a security feature that allows a network administrator or device owner to send a command that remotely deletes data from a computing device. It's primarily used to erase data on a device that has been lost or stolen, so the data won't be compromised if it falls into the wrong hands. It's also used to remove data from a device that has changed owners or administrators and can't be accessed physically to remove data.

Remote wipes are mainly used for mobile devices such as smartphones or laptops. Remote wipes can help a user keep data out of the hands of others if they lose their device, or as a mobile device management (MDM) precaution in an organization.

Remote wipe contrasts with local wipe -- also called auto wipe -- a data security feature that deletes all data on a mobile device after a pre-specified number of failed login attempts or after a device moves outside of a defined physical boundary.

How does a remote wipe work?

Once a device is known to be lost or stolen, the device user or administrator has options for wiping the device. What remote wipe specifically accomplishes depends on the device, its specific operating system version and the third-party MDM software installed on it.

A remote wipe can delete data in selected folders, repeatedly overwrite stored data to prevent recovery using a forensic image, return the device to factory settings or remove all programming on the device -- meaning that it's no longer of any use to anyone.

For a remote wipe to work, a device needs to be powered on and connected to a network so it can receive the communication from the software commanding it to be wiped. A user attempting to remotely wipe their missing device can run into problems if the device is rebooted during the process, if the device is on airplane mode or if connectivity to the device is somehow otherwise impeded.

A remote wipe is used in both enterprise devices that contain company data and personal devices that hold personal data. Ideal software and methods of remote wipe vary depending on whether the device is for personal or enterprise use. For example, if an organization has a bring your own device (BYOD) policy, some MDM software has an enterprise wipe setting that only deletes the associated data installed by the organization -- meaning the user's personal data is kept intact. This method can be used if an employee loses their device, or if they end their employment with the company.

Who offers remote wipe?

In the enterprise, remote wipe capabilities are available natively on most smartphones and tablets through Exchange ActiveSync, which synchronizes access to email, calendar, contacts and tasks from the organization's Microsoft Exchange Server. Other enterprise-centric MDM applications -- also known as enterprise mobility management (EMM) software -- that offer remote wipe include the following:

MDM products also offer this technology as consumer-focused apps. Examples include the following:

Aside from MDM applications, there are also consumer-focused cloud applications that offer their own built-in wipe feature. For example, Dropbox allows users to wipe any Dropbox-related data from a compromised device with one click. This remote wipe option focuses on wiping the data provided by one application, as opposed to wiping data based on its location in the phone. Users who wipe data using a cloud-based application like Dropbox still have that data in their account, but it's removed from the device they've chosen to wipe.

Pros and cons of remote wiping

Benefits of remote wiping include the following:

Remote wipes do have some drawbacks as well. These typically include the following:

Remote wipe best practices for businesses

The following best practices can help ensure an organization correctly manages the remote wipe process:

Learn about other methods of mobile device security for businesses.

15 May 2023

All Rights Reserved, Copyright 2003 - 2024, TechTarget | Read our Privacy Statement