Putting the bulk of computing and storage in the data center has other perks for IT management: It creates a centralized location for software upgrades across an entire organization and puts a layer of network security between users and sensitive data--a lost thin client laptop, for instance, doesn't contain private information, and so doesn't pose a threat of causing a data breach.
In June, the Hartford Group released a white paper identifying eight ways small business owners can reduce the likelihood of a data breach, including secure remote access through the deployment of a virtual private network (VPN) and regular review of data security practices.
FORBES: Why Investing In Online Security Makes Sense For Small To Medium-Size Businesses
All of this technological progress creates a more flexible work environment and contributes to a healthy work-life balance, but it poses a serious challenge to IT professionals, who face a new set of threats to data and network security.
FORBES: Securing Corporate Data In An Increasingly Mobile World
There are four segments of the security industry: network, end point, data, and users.
Verizon Wireless has always taken great strides to protect the security of its customers and its network using sophisticated network intrusion and data analysis tools.
ENGADGET: Verizon intros Mobile Security app for Android, wants to keep you safe
With support for encryption, the solution is especially convenient for users who want to ensure the security of this data when they connect to an open, unsecured network.
ENGADGET: Intel launches Atom CE5300-based storage platform with multiple streams, smart scaling
Issues to consider include ease of deployment, managing backup and data access, support, security, network complexity, device management, operating system diversity, total cost of ownership and integration of various tablet platforms at the application, mobile device management process and system level.
More troubling are security issues, since most safeguards work in a different layer of a network from the data-hauling Ethernet layer of 802.11.
All of this means that opening up your company to Facebook access could lead to increased phishing and malware threats, which could further cause data breaches and other more serious forms of security incidents within your corporate network.
On the other hand, these applications can present security risks, such as an unintended transfer of information and data on the smartphone via the network.
ENGADGET: Panasonic and Red Bend Software announce Android security partnership at MWC
By enabling a security architecture centered on data control, IT solves longstanding security problems through empowering the environment to protect sensitive data regardless of access method, device, network, ownership or location.
FORBES: Virtualization: A Solution For The Tablet Security Conundrum
Unfortunately, people operate on human time scales and are simply incapable of discovering all of the information about a network that changes from hour to hour and turning that data into changes in the configuration of security devices.
应用推荐