Going Mobile, Going Perilous

Willett, Andy
April 2006
Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p22
Trade Publication
The article examines security issues confronting the mobile workforce in the United States. Some key solutions are needed to empower and manage a productive mobile workforce. These include a mobile virtual private network and some form of policy management. The policy management solution should permit for controlled access to information and applications based on several conditions, including network speed, time of day, mobile worker credentials and mobile device or device class. INSET: Cell Phones, Cameras and Threats.


Related Articles

  • Amman vows to protect virtual operators.  // MEED: Middle East Economic Digest;10/5/2007, Vol. 51 Issue 40, p33 

    The article reports on the decision of the Telecommunications Regulatory Commission to license an unlimited number of virtual network operators (VNOs) to sell branded mobile phone services in Amman, Jordan using an existing operator's network. If incumbent operators try to stall negotiations...

  • VARs ANSWER THE CALL FOR SECURITY IN THE MIDMARKET. Lawinski, Jennifer // CRN;11/21/2005, Issue 1172, p42 

    The article focuses on the role of value-added resellers in the computer security business. From implementing firewalls and antivirus solutions to finding ways to keep an increasingly mobile workforce secure, many midmarket companies, with 100 to 1,000 employees, are turning to solution...

  • Be Prepared. Snyder, Joel // Information Security;Jun2006, Vol. 9 Issue 6, p34 

    This article examines arguments in favor of unified threat management (UTM). Its benefits include reduction of costs, improvement of performance, reduction of complexity, simplification of management and increase in flexibility. UTM signifies a security feature that is added to the...

  • Smartphone Growth Prompts Concerns and Speculation. Rapport, Marc // Credit Union Times;1/12/2011, Vol. 22 Issue 1, p21 

    The article offers the author's insights on the use of smartphones to access security systems in a company particularly credit unions. The author states that even high-level executives can potentially damage data in a company's corporate systems. The author adds that security policies should be...

  • SSL VPN first allows clientless mobile access. Adshead, Antony // Computer Weekly;9/9/2003, p20 

    Network provider Neoteris Inc. has improved support for mobile users in the latest version of its Access Series secure virtual private network. The company said it was the first Secure Sockets Layer VPN product for mobiles that did not require client software to be installed on the device. The...

  • Control freaks need apply. Snyder, Joel // Network World;12/19/2005, Vol. 22 Issue 50, p42 

    The article reports that Secure Socket Layer (SSL) products serve up various degrees of access control. SonicWall Inc. approach with its SSL-Virtual private networks (VPN) which defaults to an allow policy for the entire system. One of the main arguments in favor of SSL VPN technology is that it...

  • VPN-1 Edge X industrial model.  // Database & Network Journal;Jun2006, Vol. 36 Issue 3, p22 

    The article reports on the launch of the VPN-1 Edge X industrial model, the first unified threat management appliance developed specifically to protect factory floors in Great Britain from cyber attack. The appliance features high levels of security through unified threat management appliances,...

  • The devil's in the details of this virtual reality switch. Snyder, Joel // Network World;4/5/2004, Vol. 21 Issue 14, p51 

    This article details the results of the tests conducted on the Inkra 1518 TX Virtual Service Switch of Inkra Networks Corp. The high-performance security switch is intended for virtualizing security operations for the data center. Inkra has built firewall, global server balancer, local server...

  • Ground forces.  // Business Travel World;Jun2003 Supplement, p20 

    Presents information on the security systems employed at airports in the U.S. and Great Britain. Function of the virtual private networks; Plans of the U.S. government to use biometrics in the country; Description of a cutting-edge security technology.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics