Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Smartphone Security: How To Manage Rogue Mobile Devices: Page 7 of 7

"Because there is growing prosumer use of smart phones," said Matthews, "the whole strategy behind policy control is so you can identify users. You'll need to be scanning to see if a rogue mobile device is being used on your network."

Odyssey's product does these things, but also collects network information. "When you have hard data, that helps the mobile operator find problems faster and in turn helps the enterprise customer," said Mark Gentile, President & CEO of Odyssey. Odyssey's Athena software makes sure companies have appropriate licensing. This way, from a support perspective, they know what versions of applications are on the smart phones. It also helps provision software updates, certifications, and policies all over the air.

Endgame

With the proper tools in place, securing your enterprise from the threat of mobile devices is manageable. Combined with the right set of policies, employee education, and software controls, there's no reason why smartphones should leave the back door open to the whimsy of hackers and ne'er-do-wells.