Security Architecture, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

Debate

Share

For, by Chris Hoppen, CTO, VP of engineering and co-founder, Aventail

Why support a separate proprietary infrastructure for mobile email using Blackberry Enterprise Server (BES), when an SSL VPN with strong mobile support provides universal access to email and other resources on any network from multiple devices?

SSL VPNs enhance remote productivity and ROI. Besides just reading email, users can open attached files or follow links to other applications. SSL VPNs can deliver leading email without format translation, POP re-direction or user retraining.

With a common security model enforced for all access, SSL VPNs provide granular access to control security.

SSL VPNs lower costs by providing a single-appliance universal solution for laptops and other remote endpoints (not just PDAs and smartphones), while leveraging predefined directories and rules — without adding complex and expensive multi-server BES (or Exchange Mobile Messaging) infrastructure.

Mobile email is simply another remote access use case, best secured by SSL VPN technology.

 

Against, by Rick Osterloh, senior director, product management and marketing, Motorola Good Technology Group

Enterprise mobility requires seamless application experiences — be it email, intranet, CRM or anything else. A mobility platform provides an end-to-end approach, while SSL VPNs merely address the plumbing, and leave it to the customer to cobble together products and services to meet their requirements. Take two examples.

User experience: A real-time push is critical to mobile enterprise users. They also require a consistent interface across all platforms to reduce costs. They want to get applications and updates over the air without firmware upgrades. The SSL VPN approach by itself addresses none of these needs.

Security and administration: Mobility platforms employ a network operations center (NOC) to provide a persistent and managed connection. The NOC provides end-to-end visibility into the device fleet. Mobility platforms go further than SSL VPNs in securing the device; they lock down Bluetooth, restrict attachment downloads by size or type, and encrypt and erase SD [secure digital] cards.

 

THREAT OF THE MONTH
Removable media

What is it?

Any exchangeable memory media — USB memory sticks, memory cards, external hard disks, floppy disks, CD/DVD media — that can have information downloaded onto it and that can be transported. These devices play a critical role in the modern mobile workforce.

How does it work?

Users download information from their computers onto removable media devices in order to store and/or transport data. Users can then extract the data to another portable device or PC, and then read and work with that data.

While convenient to use, these removable media devices are often reported lost by users, putting the data stored on them at risk. Many users rely on more than one removable media device, and most report having lost more than one device.

Should I be worried?

Users report storing business critical data on removable media — including contact data, financial data and customer information — but most do not take measures to protect this data.

How can I prevent it?

Corporations can develop a removable media policy that outlines use of these devices and what kind of data can be stored on them. Encryption solutions that protect removable media devices, and still allow users to work with stored data, are also available.

— Malte Pollmann, vice president, products, Utimaco

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.