PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
April 2006

Get a Grip!

Enterprises need to take control of PDAs, smart phones and other mobile wireless devices to ensure corporate security. Mobile devices--from PDAs and smart phones to wireless handsets and printers--are exploding into the workplace. While these IP-enabled devices are improving productivity by giving employees increased access to corporate applications, they're opening the enterprise to a host of risks. Focused on locking down networks and laptops, organizations often overlook the need to take control of mobile wireless devices. Left unchecked, these gadgets--which store an increasing amount of sensitive data, including customer and pricing information--can easily open gaping holes in enterprise network defenses. But organizations can get control over these powerful, well-connected devices by adopting a systematic approach to device detection, assessment, protection and enforcement. There are a number of strategies for discovering and fingerprinting mobile systems, plus scalable methods for finding and fixing the vulnerabilities ...

Access this PRO+ Content for Free!

Features in this issue

  • Get a Grip!

    MOBILE SECURITY Enterprises need to take control of PDAs, smart phones and other mobile devices to ensure corporate security.

  • Transit Safety

    BITS & BOLTS SSL-encrypted tunnels protect sensitive data traveling the Information Superhighway.

  • E-mail Security

    Tumbleweed's MailGate 5500

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

-ADS BY GOOGLE

Close