Skip to content


In the Age of the Cloud, 5 Tips for Enterprise Smartphone Management

samsungmobile.jpg The data that extends to a smartphone points to the need for more focused ways to protect networks from security breaches.

At IBM Pulse this past week, IBM Threat Intelligence Manager Tom Cross said the need for enterprise management is a hot topic for IT managers. Citing IBM’s own research, Cross said IBM surveys show that 90% of IT managers are investing to secure end points in the enterprise.

Sponsor

Data that people have access to and can store on the device is the greatest concern among IT managers. Cross said vulnerabilities and attacks exist but exploitation is not prevalent. This concern stretches into how people use devices for personal purposes. Right now, the enterprise is pretty wide open. About 73% of those surveyed by IBM allow nontraditional endpoints such as smartphones and tablets to connect to corporate networks.

Considering this, enterprises have to set policies for how data is managed on the tablet or the smartphone.

He makes five recommendations:

  1. Contain Smartphone VPN Access: Set a firewall policy. Smartphones only need access to certain sites.
  2. Control the installation of 3rd Party Applications: Do you allow unsigned apps?
  3. Establish screen lock password policies: Did you lose a $400 phone or a million dollar contract?
  4. Procedures: Establish procedures for employees to follow in the event that phones are lost or stolen: Can you wipe the phones remotely?
  5. Protection: Evaluate smartphone anti-virus solutions.

Exploitations are rare but it’s more of a concern how the data flows and the ways it can be at least monitored to prevent unnecessary intrusions.

Discuss


Posted in General, Technology, Web.

Tagged with .


0 Responses

Stay in touch with the conversation, subscribe to the RSS feed for comments on this post.



Some HTML is OK

or, reply to this post via trackback.