Access your Pro+ Content below.
Tablet security: Best practices for the tablet computer onslaught
This article is part of the Network Evolution issue of April 2011 Vol. 2, No. 2
Adoption of tablet devices by business users has been astonishingly quick, taking some IT departments by surprise and wondering what to do about tablet security and support. To some extent, tablets can be treated like smartphones with the same mobile operating systems. But tablets are not just big flat smartphones -- they tend to be used differently and thus pose some unique challenges of their own. In the companion to this article, we explored the influx of tablet devices and related mobile security risks in the IT environment. Here we'll discuss how to mitigate those risks. Leverage smartphone mobile security practices Companies that rely on corporate-standard phones to ensure security will have more trouble embracing tablets. Employers may procure tablets for specific use cases, but this alone will not address all tablet demands. Instead, IT must facilitate safe business use of many different employee-owned tablets. Companies that are already securing employee-liable smartphones can start by applying smartphone mobile device ...
Access this PRO+ Content for Free!
Features in this issue
As iPhone and iPad Wi-Fi clients proliferate in the enterprise, IT must troubleshoot Wi-Fi connection problems. Here's how to solve basic iPhone and iPad connection problems.
Tablets are taking the enterprise by storm, and tablet security is a major concern. Find out which mobile device security best practices you're already using can apply to tablets, and which you will need to revisit to keep tablets secure.
Wireless LAN integration means upgrading wired networks with new equipment and traffic prioritization to avoid bottlenecks between the networks and provide QoS for wireless multimedia applications, including WLAN voice and video.
Enterprise Wi-Fi coverage is a key aspect of communications infrastructure planning as dual-mode smartphones and mobile handsets replace desk phones. Successful Wi-Fi strategies must incorporate hybrid technologies like DAS, femtocell and FMC.
Combining wired and wireless LAN security solutions may be a plus for smaller companies, but larger enterprises fear security integration could result in vulnerabilities.
News in this issue
With an integrated network management vision, two organizations improved security and reliability, and have made steps towards a fully integrated network. But will we get there?
To deploy unified network management, enterprises must look at the current network infrastructure, how users connect to the network and possibly embracing platforms like the cloud.