Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Smartphone Security: How To Manage Rogue Mobile Devices: Page 5 of 7

Educate IT: "The learning curve is getting better," said Sybase's Freeman. "The awareness of the security issues really started with laptops, especially with all the press stolen laptops gets. Companies are paying more attention to smart phones and are realizing the smart phones can have the same data and need to secure them in the same way."

Encryption is Key: Device encryption is easy with mobile device management tools such as Sybase's iAnywhere Afaria or Odyssey Software'sAthena. You can also choose to encrypt individual files to make it even harder for people to break in.

The key is to require that all smartphones go through IT.

Better Security Through Software

There should always be a clearly defined plan, or a goal when it comes to mobile security. The idea is to give the help desk and IT staff the tools they need to support the mobile workers, whether it is a line of business deployment or it is just mobile email. Having online remote control so IT can peek under the covers to see what's going on and solve issues is key. This way, you won't end up with a frustrated user and a frustrated IT team.

"The number one thing companies are looking for is security and encryption because they are worried about lost or stolen devices," said Sybase's Freeman. It's a good thing the number of tools IT can use to secure smart phones seems to grow every day. One long-time contender is Sybase's iAnywhere Afaria product. Afaria focuses on mobile device management and security.