Feeds

Making life easier for the road warrior

Delivering stability for the movers

  • alert
  • submit to reddit

SANS - Survey on application security programs

Workshop In the past decade we have witnessed the use of laptops in organisations reaching similar levels to those of desktops. All the signs are that the penetration of such machines will soon exceed that of their immobile siblings. Today, they are more than status symbols. They are established as essential business devices, without which many users would find their jobs difficult, if not impossible, to perform adequately.

As the volume of mobile users is growing in many businesses, what can be done to make their lives easier? Is it possible to deliver more stable services to staff and to better protect the devices and the company information they hold as users travel from airport to hotel to customer, and maybe even home?

We know from previous feedback supplied by Reg readers that supporting remote and mobile workers poses more than a few challenges. Indeed, from some of the reports that you have sent in, helping users who are not close by for a quick desk-side visit can be extremely stressful for all parties.

How can the devices that such users rely on be managed most effectively? The basics appear to be clear, although having the ability to deliver on them can be subject to considerable constraints in access to suitable budget availability, time and human resources.

The key stages can be summarised as:

  1. Know what kit you have ‘out there’, and who is using it and why. (How else can you ensure that they are well supported and that appropriate management/service delivery and protection solutions are in place?)
  2. Deploy suitable management tools and service solutions to support the users.
  3. Ensure that the support processes employed by the help desk have been crafted with remote and mobile users in mind.
  4. Train everyone - the help desk, support professionals and the users.
  5. Try to manage the service expectations of remote users.

Each of these steps, individually, is not steeped in rocket science. But we do know that few organisations have the ability to undertake even step one with any degree of accuracy or regularity. We also have your acknowledgement that getting company acceptance of the need for investment in any management tool technology is by no means straightforward, and it's well known how infrequently training budgets actually create trained users.

The failure of organisations to understand the benefits achievable through good investments in these areas is difficult to comprehend, especially as the tools available to support these areas are getting easier to implement all the time.

The last step, trying to manage the expectations of users, is extremely difficult, especially in an organisation where IT and users only communicate regularly via the help desk. But this step is probably the cheapest to take, in terms of capital spend and can, when well executed, have a considerable impact on how well IT support, and almost by definition, IT itself is regarded.

What we do know is that the users’ expectations of service levels get ever higher. It is also clear that more users wish to work remotely, and ‘expect’ to do so using an ever expanding portfolio of PCs, laptops, netbooks and smart phones, company ratified or not. The pressure on help desk and IT support staff will mount.

So, while all is not doom and gloom, we would like to know how you are tackling these matters. Do your remote and mobile users cause you more problems than those in the office? And how do you help them? We’d like to hear about the ways you have discovered to make supporting remote users more effective and less disruptive. What roles do desktop virtualisation and encryption hold as we move forward? Whether your salvation has been found in the tools you use or the processes you have established, please give us your feedback in the comments area below. ®

SANS - Survey on application security programs

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.