SHARE
Facebook X Pinterest WhatsApp

Smartphones Present Network Security Challenges

thumbnail Smartphones Present Network Security Challenges

In an article contributed by Shubhomoy Biswas, Country Director – India, SonicWALL and presented on Voice & Data, Biswas writes that all smartphones are uncontrolled endpoints and the high usage of smartphones in the corporate world demands a universal, platform-agnostic approach to security best practices. Allowing personal smartphone devices to be used as corporate network […]

Sep 30, 2010
Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In an article contributed by Shubhomoy Biswas, Country Director – India, SonicWALL and presented on Voice & Data, Biswas writes that all smartphones are uncontrolled endpoints and the high usage of smartphones in the corporate world demands a universal, platform-agnostic approach to security best practices. Allowing personal smartphone devices to be used as corporate network endpoints creates
a number of security issues. In the article, Biswas suggests the implementation by organizations of security practices is simple
when using technologies such as SSL VPNs and next generation firewalls with application intelligence and control.


“Smartphones have shifted their primary focus from being primarily a cell phone to becoming an evolving Web-enabled computing platform. Ultimately, telephony is just another smartphone application. Today’s smartphones have much the same functionality and, unfortunately, vulnerabilities as yesterday’s laptops.
Acting as mobile network endpoint devices connected to the Internet, smartphone platforms are inherently insecure. Whether corporate-issued or personally owned, smartphones easily move in and out of the network, traversing internal and external firewalls. Of particular concern, it is harder for IT to control what users do with their smartphone devices, and how these devices expose business data to security threats.

Read the Full Story at Voice & Data

Recommended for you...

4 Phishing Examples: Spot and Avoid Fraudulent Attacks
Examples of Ransomware: A Cautionary Tale
Juniper, Cato Build Out SASE Platform Offerings
Jeff Burt
Feb 4, 2022
Pandemic Leads to Permanent Changes in Workforce, WAN: Aryaka
Jeff Burt
Jan 20, 2022
Enterprise Networking Planet Logo

Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.