Considering that security ranks high on the list for enterprises in terms of wireless mobility management, the results of a new industry study are surprisingly contradictory.
According to the latest research from AOTMP, nearly two of every five enterprises are at risk of exposing sensitive data on wireless devices, and ineffective wireless policies and protocols could be to blame. The study also shows almost 90 percent of enterprises view security as “extremely” or “very” important to wireless mobility management.
“Computer and network security, compliance and mitigating risk has always been a concern for IT but now with the proliferation of smartphones and the capability for vast amounts of data storage – the added burden is unmanageable without dedicated policies, applications and oversight,” said Fernando Oliveira, director of business development at Wireless Analytics.
The AOTMP report, “Securing Your Mobile Environment,” says as the number of mobile employees, smart devices and applications increases, protecting sensitive data on these devices becomes more challenging.
“The good news for 2010 is that a large number of applications are being developed with ways to better to manage mobility,” Oliveira said. Now, using technology from vendors and managed service providers, the enterprise has the ability to offer a remote access services either as a complete mobility service or as standalone module such as:
· Authentication services and identity management
· Visibility into connectivity costs, security and compliance status
· Protection of data that is carried in the mobile device from theft, loss, hackers, viruses
· Deploy, manage and monitor security and connectivity applications
“As the sophistication of today’s wireless devices become more complex, security must become a priority for the enterprise,” said Timothy C. Colwell, vice president of knowledge operations at AOTMP. “While a reactive approach to security management could have severe consequences, proactive security measures – such as user authentication and remote kills – are important steps to address security within the wireless environment.”
The report also outlines five key best practices for creating or improving wireless security policies:
1. Assess the current state of wireless security, which includes identifying weak spots.
2. Establish or update wireless security policies and procedures.
3. Ensure the enterprise makes appropriate support resources available.
4. Monitor and reassess the security practices once established.
5. Update the security policies and practices as needed.
AOTMP’s report examined wireless device security from key benchmark data points representing more than 190 enterprise telecom professionals across 23 different industries.
“As mobile users and enterprises increasingly rely on cost-efficient use of mobile devices, Wireless Analytics will make it easy for them to ensure employee productivity and accountability,” Oliveira said.
Erin Harrison is a senior editor with TMCnet, primarily covering telecom expense management, politics and technology and Web 2.0. She serves as senior editor for TMC's print publications, including "Internet Telephony (News - Alert)", "Customer Interaction Solutions", "Unified Communications" and "NGN" magazines. Erin also oversees production of TMCnet's weekly iPhone e-Newsletter. To read more of Erin's articles, please visit her columnist page.Edited by Erin Harrison