Home In the Age of the Cloud, 5 Tips for Enterprise Smartphone Management

In the Age of the Cloud, 5 Tips for Enterprise Smartphone Management

The data that extends to a smartphone points to the need for more focused ways to protect networks from security breaches.

At IBM Pulse this past week, IBM Threat Intelligence Manager Tom Cross said the need for enterprise management is a hot topic for IT managers. Citing IBM’s own research, Cross said IBM surveys show that 90% of IT managers are investing to secure end points in the enterprise.

Data that people have access to and can store on the device is the greatest concern among IT managers. Cross said vulnerabilities and attacks exist but exploitation is not prevalent. This concern stretches into how people use devices for personal purposes. Right now, the enterprise is pretty wide open. About 73% of those surveyed by IBM allow nontraditional endpoints such as smartphones and tablets to connect to corporate networks.

Considering this, enterprises have to set policies for how data is managed on the tablet or the smartphone.

He makes five recommendations:

  1. Contain Smartphone VPN Access: Set a firewall policy. Smartphones only need access to certain sites.
  2. Control the installation of 3rd Party Applications: Do you allow unsigned apps?
  3. Establish screen lock password policies: Did you lose a $400 phone or a million dollar contract?
  4. Procedures: Establish procedures for employees to follow in the event that phones are lost or stolen: Can you wipe the phones remotely?
  5. Protection: Evaluate smartphone anti-virus solutions.

Exploitations are rare but it’s more of a concern how the data flows and the ways it can be at least monitored to prevent unnecessary intrusions.

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.