*>>**If you allow the users to provide their own, you have no control over
what they put on them or bring into your network.
*
True.  Or, to be more precise, you have much less control.

Having said that bear in mind that the vast majority of attacks occur
on/over/to company owned equipment.   Yes, that constitutes the vast
majority of use cases, but the point is that the security advantage that
should be realized from corporately own equipment has not fully
materialized.


*>>**Keep in mind this my lack of caffeine scraggily memory but there was a
recent event of an attack via PDF.*

Yes.   Lots of other vectors as well.   And many of these are available to
laptops and desktops.




*>>**There are solutions such as in my case you can isolate them by giving
them their own network and use citrix to grant them access to stuff.*

Which is well advisable even if the mobile devices are company provided.
 Having this infrastructure in place makes it a non-issue to support BYOD
equipment.



*>>**What about company confidential files?   iPad gets stolen.....*

Happens today with laptops all the time.   Just because there is encryption
available for laptops, how many people are actually using it?

No increased risk.



*>>They are very useful tools but if somebody says "just give them wireless
access" you could very well regret that.....
*
Definitely.   Rather than embrace technology recklessly, or shun it
outright, it will require a measured approach to ensuring that deployments
and implementations do not have to happen under duress.


Yes, there are theoretical ways in which the influx of mobile devices can
result in lowered security, but the reality of the situation is that
most organizations are not taking advantage of all the security they can
today on the devices they have already, AND most of the attacks
are occurring on the devices that have lots of security available for them.

The *practical* upshot of these mobile devices is a small increase in
security risk that is relative to an organization's existing security
profile.


* *

*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Tue, Aug 23, 2011 at 2:23 PM, Mathew Shember <[email protected]
> wrote:

> A short and simple example is the question of company provided versus
> "bring your own"
>
> If you allow the users to provide their own, you have no control over what
> they put on them or bring into your network.
>
> Keep in mind this my lack of caffeine scraggily memory but there was a
> recent event of an attack via PDF.
>
> There are solutions such as in my case you can isolate them by giving them
> their own network and use citrix to grant them access to stuff.
>
> What about company confidential files?   iPad gets stolen.....
>
> They are very useful tools but if somebody says "just give them wireless
> access" you could very well regret that.....
>
> -----Original Message-----
> From: Terry Dickson [mailto:[email protected]]
> Sent: Tuesday, August 23, 2011 11:12 AM
> To: NT System Admin Issues
> Subject: RE: Apple newbie - iPad remote access to server shares
>
> What about the point I might have missed in this discussion on Security.  I
> do not have any experience with an Ipad, but I hear they are HUGE Security
> Risks.  I have heard this more than once, and I would like to know more on
> why.  It is not that I do not believe the people telling me that, however
> they did not provide the facts as to why.  Does anyone know why they are
> considered security risks?
>
>
> ________________________________________
> From: Michael White [[email protected]]
> Sent: Tuesday, August 23, 2011 1:00 PM
> To: NT System Admin Issues
> Subject: Re: Apple newbie - iPad remote access to server shares
>
> > At this point, I'd settle for ANY reason other than "but all the cool
> people
> > have an iPad!"  :-)
>
> Why wait for others to tell you what reasons they could use the
> devices.  As IT Pros, I believe it is part of our job to have the
> foresight and leadership to be able to introduce new technology within
> our organizations and how it can be used by our users.
>
> As far as the concern that there are not the apps or tools to be able
> to support them; how about building them?  Sounds to me that there is
> a great opportunity for some developer on this list to create a set of
> tools and, potentially make some money.
>
> Michael.
>
> --
> --
> Michael S. White
> [email protected]
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
> ________________________________
>  CONFIDENTIALITY NOTICE: This e-mail and any attachments are confidential.
> If you are not the intended recipient, you do not have permission to
> disclose, copy, distribute, or open any attachments. If you have received
> this e-mail in error, please notify us immediately by returning it to the
> sender and delete this copy from your system.
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to