Потребителски вход

Запомни ме | Регистрация
Постинг
27.10.2011 18:15 - Pocket Guide To Securing Mobile Devices
Автор: gorokhan Категория: Технологии   
Прочетен: 664 Коментари: 0 Гласове:
0



With workers more likely to use a personal device for work, companies are less likely to be able to specifically configure the mobile devices that have access to the corporate network. Add to that the fact the software ecosystem surrounding mobile devices is, to a large degree and depending on platform, closed. Less access means attackers have a harder time hacking the devices, but that also means third-party firms are harder pressed to provide solutions to the problems mobile devices do have.


imageFor those reasons, the recommendations are that, rather than focus on securing each device, IT groups should look to educate users, set good security policies, secure access, and help manage the devices, said John Engels, principal product management for Symantec’s enterprise mobility group.


“We are trying to surround the devices with security and protect and control what goes into the device and what comes out of it,” Engels said.


A key component to the approach is mobile device management (MDM), which initially took off as a way to keep track of all the costs associated with a company’s gaggle of cell phones, but increasingly has a security role as well.


The four major threats to mobile devices are device theft (or forgetful employees), wireless network sniffing of communications, malicious software, and the infrequent direct attack. Of those four major threats, however, MDM mainly solves only one: lost and stolen devices, said Dan Hoffman, chief mobile security analyst for Juniper Networks.


“When you look at mobile device management, it does nothing for malware, nothing for a direct attack, and nothing for data communication interception,” Hoffman said.


For that reason, companies have to look beyond just adopting MDM solutions, he said. Here are four recommendations:


Copyright © 2011 UBM TechWeb, All rights reserved.


Technewsportal.org



Източник: http://www.technewsportal.org/?p=5909


Тагове:   Pocket,   Mobile,   To,   guide,   devices,   Securing,


Гласувай:
0



Следващ постинг
Предишен постинг

Няма коментари
Търсене

За този блог
Автор: gorokhan
Категория: Технологии
Прочетен: 1113077
Постинги: 703
Коментари: 457
Гласове: 44
Архив
Календар
«  Април, 2024  
ПВСЧПСН
1234567
891011121314
15161718192021
22232425262728
2930