Wireless Infrastructure

11:42 AM
Connect Directly
RSS
E-Mail
50%
50%

The BYOD Security Dilemma

The Information Security Forum this week released a report titled 'Threat Horizon 2014' that looks at the continued global threat to computer networks, businesses and individuals from cybercrime. But one section of the report also looks at 'Internal Threats', which at first glance would seem like another discussion about malicious insiders who attack the network because they’re disgruntled. In fact, the Internal Threats identified in this report are from new technology that comes into an o

A summary of the report lists several questions IT should ask when formulating their policy:

•How do you comply with regulations on records retention and destruction in a BYOD environment?

•How should a device be configured to receive and transmit corporate data?

•What happens to data and its audit trail when an employee leaves the company?

•What type of passwords should be used?

•What kind of encryption standard should be required?

There are security tools out on the market that address some of these concerns, such as the capability to connect a smartphone to the corporate network using virtual private network (VPN) technology.

Also, VMware introduced a technology called Horizon Mobile, which essentially runs a smartphone as a virtual instance within an employee’s personal smartphone. The product is going to become available in the second quarter of 2012, says Steve Herrod, chief technology officer at VMware.

Learn more about Fundamentals: 5 Options for Mobile App Development by subscribing to Network Computing Pro Reports (free, registration required).

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
Video
Slideshows
Twitter Feed