Mobile Security: Q&A with Peter Brockmann, Tech Analyst, Part 1
<img src="http://vpnhaus.ncp-e.com/wp-content/uploads/2010/06/peterbrockmann210x28072_feb10.png" alt="" align="right" /><em>This week, VPN Haus talks to <a href="http://www.brockmann.com/about-us-mainmenu-55/about-peter-brockmann-mainmenu-62.html">Peter B
VPN Haus: How are connectivity security issues different for iPhone OS mobile devices vs. the Blackberry or Palm devices?
Peter Brockmann: Modern smartphones are really pocket computers. As such, they exhibit each of the same security risks as their larger computing relatives. They have passwords, sensitive emails, files and critical business applications in their multi-giga
Devices need to be able to be remotely wiped clean including lock out secrets, passwords and public key infrastructure credentials. Devices need to support encrypted data transmissions over WiFi and over 3G/4G/LTE wireless services. Enterprises need to be able to support rollouts of hundreds or thousands of devices at a time and need to update software remotely and implement corporate-wide security policies.
Unfortunately, each of the manufacturers has implemented different server software to achieve the same result. This is unfortunate because the remote access administrator has to use different apps that do the same thing to support these leading devices, which can introduce process errors and slow support responses, not to mention be the cause for administrator error.
VPN Haus: Do you think any mobile device is more secure than the others?
Brockmann: We have no evidence that one is more secure than the other. These three vendors offer back-office management applications effective for large scale enterprise management of mobile devices. They all support encryption for data in transit, local
VPN Haus: People are now connecting to their corporate networks from hotels, airports, coffee shops, fast food chains, at bars, and even from the mall. What does the proliferation of remote access locations mean for organizations’ network security. Should they limit where their employees can log-in from and is that really enforceable?
Brockmann: Business needs to happen wherever and whenever business can happen. Only the most paranoid of organizations, where the risks to national security or billion dollar transactions are very large and very real, need to be overwhelmingly sensitive to where users do business. For the rest of us, it would be silly to prevent employees from doing business in some public areas versus others, provided that best practices for privacy, eavesdropping and remote wiping can be maintained. Good security policies always have to balance convenience and security.
Stayed tuned to VPN Haus for more from Brockmann on the proliferation of mobile devices, as well as Mac security.
[tweetmeme source=”vpnhaus” only_single=false]