Smartphone Security Gaps
Employees are at risk for viruses and other security breaches, so IT staff need to be just as vigilant with company-issued phones accessing the network as they are with computers.
When it comes to mobile computing in the enterprise, we hear all the time that security is a major crisis waiting to happen. After all, no one can be quite sure where these devices have been online and the security apparatus surrounding them is still in its infancy.
In the meantime, IT organizations are being asked to manage fleets of these devices that all come from different manufacturers, which, in turn, only serves to exacerbate the security situation. That situation, of course, gets worse with the passing of every holiday as more end users decide to bring some new mobile computing device into the workplace.
Zenprise this week moved to close the mobile security gap with an update to its mobile device management service. According to Zenprise Chief Marketing Officer Ahmed Datoo, version 6.0 of MobileManager provides the ability to encrypt files, detect security threats and automate the responses to those threats, and limit access to certain enterprise applications.
The issue that many IT organizations are struggling with is how to efficiently manage smartphones and tablets in an age where end users are accessing websites and corporate files over not only telecommunications services, but also via any number of public Wi-Fi locations. This latter issue has become especially problematic because telecommunication providers are trying to push users of large files and video onto 802.11n wireless networks in order to minimize bandwidth consumption of 3G and 4G wireless networks.
In the Zenprise model, says Datoo, the company provides an "immune system on the client" that is augmented by additional security at the network and enterprise application levels.
It's clear that enterprise mobility isn't going to get simpler anytime soon, and when you think of all the things that an enterprise IT organization needs to do these days, babysitting mobile computing devices might not bring a high level of value to the organization as a whole. If that's the case, then maybe it's time to find a more efficient way to get the job done so that IT folks can go about adding real value to the business.