This article can also be found in the Premium Editorial Download "Information Security magazine: Security survivor all stars explain their worst data breaches."
Download it now to read this article plus other related content.
Enterprises need to take control of PDAs, smart phones and other mobile wireless devices to ensure corporate security.
Mobile devices--from PDAs and smart phones to wireless handsets and printers--are exploding into the workplace. While these IP-enabled devices are improving productivity by giving employees increased access to corporate applications, they're opening the enterprise to a host of risks.
Focused on locking down networks and laptops, organizations often overlook the need to take control of mobile wireless devices. Left unchecked, these gadgets--which store an increasing amount of sensitive data, including customer and pricing information--can easily open gaping holes in enterprise network defenses.
But organizations can get control over these powerful, well-connected devices by adopting a systematic approach to device detection, assessment, protection and enforcement. There are a number of strategies for discovering and fingerprinting mobile systems, plus scalable methods for finding and fixing the vulnerabilities associated with them.
By taking hold of these devices and controlling their use in the enterprise, companies can reap the benefits of mobility without putting sensitive data at risk.
This was first published in April 2006