*>>**If you allow the users to provide their own, you have no control over what they put on them or bring into your network. * True. Or, to be more precise, you have much less control.
Having said that bear in mind that the vast majority of attacks occur on/over/to company owned equipment. Yes, that constitutes the vast majority of use cases, but the point is that the security advantage that should be realized from corporately own equipment has not fully materialized. *>>**Keep in mind this my lack of caffeine scraggily memory but there was a recent event of an attack via PDF.* Yes. Lots of other vectors as well. And many of these are available to laptops and desktops. *>>**There are solutions such as in my case you can isolate them by giving them their own network and use citrix to grant them access to stuff.* Which is well advisable even if the mobile devices are company provided. Having this infrastructure in place makes it a non-issue to support BYOD equipment. *>>**What about company confidential files? iPad gets stolen.....* Happens today with laptops all the time. Just because there is encryption available for laptops, how many people are actually using it? No increased risk. *>>They are very useful tools but if somebody says "just give them wireless access" you could very well regret that..... * Definitely. Rather than embrace technology recklessly, or shun it outright, it will require a measured approach to ensuring that deployments and implementations do not have to happen under duress. Yes, there are theoretical ways in which the influx of mobile devices can result in lowered security, but the reality of the situation is that most organizations are not taking advantage of all the security they can today on the devices they have already, AND most of the attacks are occurring on the devices that have lots of security available for them. The *practical* upshot of these mobile devices is a small increase in security risk that is relative to an organization's existing security profile. * * *ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of Technology for the SMB market… * On Tue, Aug 23, 2011 at 2:23 PM, Mathew Shember <[email protected] > wrote: > A short and simple example is the question of company provided versus > "bring your own" > > If you allow the users to provide their own, you have no control over what > they put on them or bring into your network. > > Keep in mind this my lack of caffeine scraggily memory but there was a > recent event of an attack via PDF. > > There are solutions such as in my case you can isolate them by giving them > their own network and use citrix to grant them access to stuff. > > What about company confidential files? iPad gets stolen..... > > They are very useful tools but if somebody says "just give them wireless > access" you could very well regret that..... > > -----Original Message----- > From: Terry Dickson [mailto:[email protected]] > Sent: Tuesday, August 23, 2011 11:12 AM > To: NT System Admin Issues > Subject: RE: Apple newbie - iPad remote access to server shares > > What about the point I might have missed in this discussion on Security. I > do not have any experience with an Ipad, but I hear they are HUGE Security > Risks. I have heard this more than once, and I would like to know more on > why. It is not that I do not believe the people telling me that, however > they did not provide the facts as to why. Does anyone know why they are > considered security risks? > > > ________________________________________ > From: Michael White [[email protected]] > Sent: Tuesday, August 23, 2011 1:00 PM > To: NT System Admin Issues > Subject: Re: Apple newbie - iPad remote access to server shares > > > At this point, I'd settle for ANY reason other than "but all the cool > people > > have an iPad!" :-) > > Why wait for others to tell you what reasons they could use the > devices. As IT Pros, I believe it is part of our job to have the > foresight and leadership to be able to introduce new technology within > our organizations and how it can be used by our users. > > As far as the concern that there are not the apps or tools to be able > to support them; how about building them? Sounds to me that there is > a great opportunity for some developer on this list to create a set of > tools and, potentially make some money. > > Michael. > > -- > -- > Michael S. White > [email protected] > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > ________________________________ > CONFIDENTIALITY NOTICE: This e-mail and any attachments are confidential. > If you are not the intended recipient, you do not have permission to > disclose, copy, distribute, or open any attachments. If you have received > this e-mail in error, please notify us immediately by returning it to the > sender and delete this copy from your system. > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
