Managing Endpoint Security for Mobile Devices

Introducing smartphones, netbooks or newer technologies to the enterprise can pose security issues.

By Enterprise Networking Planet Staff | Posted Jun 2, 2010
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

In a mobile world with a mobile workforce, it is not uncommon for smartphones, netbooks or newer technologies such as the iPad and e-readers to be introduced to the enterprise network. As reported in this Computer World article, IT managers must remember the protection of any corporate data on an employee's personal mobile device is totally up to the company.

"It's pretty clear that consumer IT in the enterprise is risky, but if banning or limiting devices isn't an option, what can you do?

"To begin managing the risks of consumer IT, Gartner Research vice president, Leslie Fiering, suggests one of the first places to start is in reassessing security policies so that when an employee-owned device attaches to the enterprise network, the security policy's assumption should be that the device is 'hostile until proved otherwise'."

Read the Full Story at Computer World

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter