Honestly,

With the lack of security controls available for the smart phones. 

Remote Wipe ( Not forensically sound) (Can be defeated by just pulling the 
battery)
Encrypt the device ( you are still storing the keys local to device) (will take 
time, but keys can be recovered and there goes the data again)

And the other issues with the Mobile technology ( Information Disclosure, 
Mobile Malware, Spyware) etc etc. 

Bussiness are walking a very slippery slope with using these technologies to 
conduct business, but it's a risk they are willing to accept to keep their 
work-force connected and mobile. 

Think about the fun you can have with the a well meaning Trojan application in 
which I believe either Chase or BOA was touting that can take a picture of your 
checks and deposit them in your account. ( Plant the malware, steal the routing 
numbers on the check, and or credentials when they use that silly mobile phone 
to access their bank-accounts) and its game over. 

And the new IPAD/IPOD craze is going to raise the risk-bar even higher, and the 
proverbal game of Russian roulette keeps going on and on. I have been told and 
seen new initiatives (basically) bring your own mobile device to work and put 
it on the network ( Mostly the Apple products) and the organization sponsoring 
this non-sense don't have a clue how to secure, or support this, but the 
business initiatives over-ride good common sense and sooner than laters the 
company data will be in the wrong hand, and everyone will be pointing the 
finger at each other saying "NOT MY FAULT".. To bad we all subscribed to the 
insanity, therefore all are partly responsible when the worst does and will 
happen. 

Food for thought, tread lightly...

Z

Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:[email protected]
Cell:401-639-3505


-----Original Message-----
From: Brian Desmond [mailto:[email protected]] 
Sent: Tuesday, October 12, 2010 1:32 PM
To: NT System Admin Issues
Subject: RE: Most manageable and useable corporate smartphone?

Yeah but it's entirely dependent on the phone enforcing them. Windows Mobile 
devices do but all the third party ones are a total crapshoot.

Thanks,
Brian Desmond
[email protected]

c   - 312.731.3132

-----Original Message-----
From: Joseph Heaton [mailto:[email protected]] 
Sent: Tuesday, October 12, 2010 11:29 AM
To: NT System Admin Issues
Subject: RE: Most manageable and useable corporate smartphone?

Exchange 2010 gives some pretty good controls for you on your phones.

>>> Brian Desmond <[email protected]> 10/12/2010 8:48 AM >>>
The BlackBerry devices are going to give you the most control via a BES server. 
They're also going to be the most expensive when it's all added up. You can 
apply fairly granular controls over native Windows Mobile devices with Exchange 
but still not nearly to the level as BES provides.

Thanks,
Brian Desmond
[email protected] 

c   - 312.731.3132

From: Paul Hutchings [mailto:[email protected]]
Sent: Tuesday, October 12, 2010 9:56 AM
To: NT System Admin Issues
Subject: Most manageable and useable corporate smartphone?

I'm asking both lists as I guess Exchange compatibility is just as important as 
general management.

So, which smartphones would you choose assuming things like mobile network 
coverage weren't an issue.

I've no direct experience of Blackberry, I have (sadly!) too much Nokia 
experience, and iPhones seem to more or less just work with Exchange but as 
with Nokia's I'm not aware of any way I as an IT person can sit at my desk, 
specify an action/policy or "something" that should apply to all our phones and 
hit a big button that says "make it so" - I believe Blackberry can do this?

I'm not really asking for a breakdown of everything each does as I can get that 
from the respective websites, but I think you know where I'm coming at this 
from once you have a few dozen devices.

Thanks.
________________________________
MIRA Ltd

Watling Street, Nuneaton, Warwickshire, CV10 0TU, England Registered in England 
and Wales No. 402570 VAT Registration  GB 114 5409 96

The contents of this e-mail are confidential and are solely for the use of the 
intended recipient.  If you receive this e-mail in error, please delete it and 
notify us either by e-mail, telephone or fax.  You should not copy, forward or 
otherwise disclose the content of the e-mail as this is prohibited.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
[email protected]<mailto:[email protected]>
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
<http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to