Feeds

Don't let your networks speak to strangers

Devices are invading the workplace

Boost IT visibility and business value

Desktop Run a scan over any company network and you will probably be surprised by what has been connected to it. Staff can be very creative, plugging in everything from printers to tablet devices to departmental servers and network-attached storage devices.

They are not circumventing IT policies either, or so they think – just deploying the tools they need to do their jobs. Tablets and smartphones in particular are frequently connected to intranets and document stores.

It is not a new trend. This has been happening since the first desktop PC sneaked into an office on a departmental purchase order, ready to run Lotus 123 and save time delivering those pesky TPS reports to avoid the boss leaning over a cubicle wall and asking someone to come in over the weekend.

Leaky vessels

There are risks. User-provided hardware could easily be a route for data to leak out of a network. That’s why system administrators run regular audits to track down rogue hardware or use tools such as network access protection to quarantine it.

Active Directory helps police computer connections, but phones and other devices are harder to control.

At home they are using the latest MacBook or a Windows 7 multimedia gaming PC

Today’s users are increasingly likely to bring in their own hardware. After all, extended desktop lifecycles often leave them working on Pentium 4 hardware running Windows XP, while at home they are using the latest MacBook or a Windows 7 multimedia gaming PC with one of Intel’s latest Core i7 processors.

They want something more capable, even if budgets offer no prospect of getting new hardware soon. Technologies such as Windows Thin PC and RemoteFX can give them the Windows 7 experience on older hardware, and are well worth considering if you want to eke out PC lifespans.

Isolation ward

So how can businesses manage user expectations and how can they control the hardware being added to their networks? It’s something that today's convergence of several IT industry trends has made a lot easier to deal with.

First, the shift from device-centric to information-centric security models makes it easier to partition data so it doesn’t leak from your servers.

Policy-based security models prevent unmanaged devices from connecting to data sources (which also makes it less attractive for users to bring them into the office), and encrypted storage can prevent unauthorised connections.

That means user-provided hardware can’t connect to sensitive data. Security is still a problem, however, so divert all machines into quarantined network-attached storage until they are running anti-malware software and meet a baseline standard for system updates.

If users persist in connecting their own PCs to your network, you can take advantage of the same managed desktop techniques used to support home workers and temporary staff: virtual desktops with access to separate virtual LANs.

Tools like Microsoft’s System Center Configuration Manager are an important part of the equation, as they allow you to audit systems connected to your network – especially to wireless devices that support Exchange ActiveSync (EAS).

Nothing personal

Managing other devices is harder but enforcing EAS policies can reduce risk, as long as the devices in question support the policies they are accepting.

Users will be able to access secure IT infrastructure from their virtual desktops, while their personal applications and internet browsing are done on a low-security virtual network not connected to core business systems.

It’s an approach that requires more thought but it means that staff bringing in tablet devices or WiFi smartphones can use their untrusted devices alongside trusted hardware and trusted virtual desktops. ®

Application security programs and practises

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.