Feeds

Smarter security for smartphones

Getting that balance with ease of use

High performance access to file storage

Mobile phones are emotive devices. They have your kids as the wallpaper, texts saying who loves you and both your work and personal lives in one.

Even if it’s a company device there is an emotional bond between the user and the device that is unlike any other. Very few people feel precious about their laptop. Mobile phones are also a status symbol, male jewellery.

It’s why an 80kg sales manager decides that his 100g phone is “too heavy”. Staff want to choose their own device. Often to the extent of buying it.

This makes managing their pocket computer a challenge for IT departments. While you can, usually, dictate that your workplace is a Windows environment it’s much harder to do the same with the raging religious wars of BlackBerry, iPhone, Symbian and Windows 7.

Just as you get some exec wanting a Mac as their laptop and upsetting your plans for VPNs, managed builds and security, on the basis that they paid for it, so you must support it, you’ll get the same with handsets.

As the vagaries of phone fashion change you can soon be running to keep still. If you are spread between Europe and the US you are likely to have users who want Nokia and Palm devices because that’s what they’ve always used.

The biggest problem is security.

Inside the building, outside the firewall

One threat that is rarely worried about with mobile phones is the hole they provide to carefully built firewall policies. While you may have crafted a security policy which prevents users from getting to sites and exporting data over the corporate network there is nothing to stop them from sitting at their desk, disconnected from your network, with a tethered phone, using webmail to send whatever they like to whoever they like.

You have a device which contains confidential information, is highly portable and often in the position where it might get left in a taxi. Worse it has VPN access to a network you’ve worked hard to keep secure, and runs through networks where you have no control over the security.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.