News Vulnerability Management
Tech Insight: After The Holidays, It's Time To Re-Examine Smartphone Policies
With new portable devices coming out of the wrapping paper, how can enterprise security keep up?
For example, you should define testing procedures that put the technology in real-world scenarios to determine whether features work as promised -- and whether network protocols and data storage meet your enterprise security requirements.
The policy should also dictate the level of support for personally owned smartphones. Many enterprises will not support personal devices of any sort because of the security and legal complications that arise when corporate data is stored on those devices. There simply is no definitive way to ensure the data on such devices is removed when the employee leaves the company.
More Security Insights
- Remote Data Replication: Combat Disasters And Optimize Business Operations
- Check Point 2013 Internet Security Report
- Strengthening Enterprise Defenses With Threat Intelligence
- Strategy: Advanced Persistent Threats: The New Reality
Sure, you can have the employee sign a contract stating he will erase all information, but you won't know what he does with the data on the device before he leaves. Building a technical solution for this problem might mean doing more to support the device than your company might otherwise have planned to do.
The support issue is key. If you've ever rolled out new software, you know that virtually any IT problems that follow are immediately attributed to the new software. The same goes for forcing corporate software or policy configurations onto personal devices. As soon as anything goes wrong, your help desk will be fielding calls -- and trying to explain corporate policy on why they can't fix that solitaire app.
These issues are often deal-breakers that discourage enterprises from adopting new smartphones. But even if they weren't, the technical problems of managing and securing devices from multiple vendors often causes adoption of new devices to grind quickly to a halt. With the possible exception of Research In Motion, most smartphone vendors don't seem to have an eye for what's needed to get their products into the enterprise.
Vendors shipping smartphones with Windows Mobile have the obvious support of Microsoft ActiveSync for management, but it wasn't until July 2008 that Apple updated the iPhone to offer some basic management features (including remote wiping of the device) through ActiveSync. The release of the iPhone Configuration Utility 2.0 and additional security features in OS 3.0 have increased the level of adoption of the iPhone within the enterprise, according to a recent news report.
Unless your organization has an operational need to support more than one, the obvious choice is to ask employees to stick with one platform. However, solutions are available to manage multiple smartphone platforms: Two examples are Zenprise and BoxTone, which support a diverse group of platforms, including BlackBerry, iPhone, Windows Mobile, and Palm.
The decision to support smartphones within your enterprise is often one made at the executive level, but it's essential to ensure the security department has a seat at the table and is included in all testing.
You should also update your policies to specify proper usage of mobile devices -- and what your organization will do to render the data on these devices useless if they should be lost or stolen.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.