How to Secure Mobile Devices: Page 2
The popularity of mobile devices is creating real security headaches for IT organizations.
Identity and access - The management console allows the IT manager to set up user profiles to determine specific settings for each employee. Access permissions can be set for business critical applications, folders, and files to be saved, read, edited or emailed. These settings can be changed on the fly by the IT administrator.
“Organizations should also make sure their cellular carriers have security built in to their networks, including anti-malware and anti-spam software, hosted public key infrastructure (PKI) encryption, two-factor authentication support and fraud detection,” added Hedrich.
For content filtering, he said, organizations should also look at Blue Coat, Cisco, McAfee, Symantec and Websense, which all rank highly in Gartner assessments.
Drew Robb is a freelance writer based in Los Angeles specializing in technology and engineering. He has a degree in Geology/Geography from the University of Strathclyde in Scotland. He is the author of Server Disk Management in a Windows Environment, as well as hundreds of magazine articles.