Ezine

This article can also be found in the Premium Editorial Download "Information Security magazine: Security survivor all stars explain their worst data breaches."

Download it now to read this article plus other related content.

Enterprises need to take control of PDAs, smart phones and other mobile wireless devices to ensure corporate security.

Mobile devices--from PDAs and smart phones to wireless handsets and printers--are exploding into the workplace. While these IP-enabled devices are improving productivity by giving employees increased access to corporate applications, they're opening the enterprise to a host of risks.

Focused on locking down networks and laptops, organizations often overlook the need to take control of mobile wireless devices. Left unchecked, these gadgets--which store an increasing amount of sensitive data, including customer and pricing information--can easily open gaping holes in enterprise network defenses.

But organizations can get control over these powerful, well-connected devices by adopting a systematic approach to device detection, assessment, protection and enforcement. There are a number of strategies for discovering and fingerprinting mobile systems, plus scalable methods for finding and fixing the vulnerabilities associated with them.

By taking hold of these devices and controlling their use in the enterprise, companies can reap the benefits of mobility without putting sensitive data at risk.

    Requires Free Membership to View

This was first published in April 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: