With the explosive growth of smart devices in the enterprise, Mobile Device Management (MDM) is a hot topic among IT departments these days. In order to secure the network and protect sensitive data on mobile endpoints, many organizations are deploying tools to secure, monitor, and manage smart devices accessing their networks. Installing an MDM agent on mobile assets gives the IT department the ability to enforce VPNs, remotely wipe data off stolen/lost devices, and ensure that devices under management by the IT staff are running the most current and secure applications.
But is this really enough to protect you?
No. In today’s “BYOD” (bring your own device) culture, the reality is that personal smart devices will continue to attach to your network. These devices may not have your favorite MDM agents running on them, thus exposing your network and data to security threats again. Enterprises need a “gatekeeper” control to ensure that only approved devices with an installed MDM agent can attach to the corporate network. By adding a strong WIPS solution to your enterprise security portfolio, you will have the ability to enforce such control and complete your mobile security strategy.
A robust wireless IPS solution (WIPS) will detect, identify and locate unauthorized smart devices connecting to the network, generate a real time alert or even better – block those unmanaged devices from connecting in the first place. Better yet, a good WIPS will allow you to define your security policy by device type, VLAN, and location. For example, iPhones could be allowed to connect to the guest network for Internet access, but could still be blocked from accessing the internal network.
Watch this technical webinar for more information.
Best practices, mobile device management, smartphones, WiFi Access, Wireless security, WLAN networks
AirTight’s director of technology joins HP ProCurve executives for two informative sessions at the HP Technology Forum in Las Vegas
June 15-18, 2009, Mandalay Bay, Las Vegas, Nevada, USA
Session: Wired/Wireless Management
Speakers: Dr. Hemant Chaskar, Director of Technology, AirTight Networks, Carl Blume, HP
This session offers timely advice for managing wireless and integrated wired/wireless networks from the perspectives of security, policy enforcement, performance optimization, and scalability.
Session: Wired and wireless Security
Speakers: Dr. Hemant Chaskar, Director of Technology, AirTight Networks, Mauricio Sanchez, HP
This session will present some differences and commonalities between protecting your network in a wireless versus a wired environment. It will outline the fundamentals of a comprehensive, multi-layered network security strategy and will drill down into some specific IDS/IPS (intruder detection system/intruder protection system) solutions that are particularly useful for combating wireless threats.
Wireless security, WLAN planning
Do you believe that IT security in private enterprise is a national security issue? I do and would love to hear your thoughts. You might want to take a look at the Airport WiFi and Financial District wireless vulnerability studies that AirTight performed recently to see just how badly some organizations are following b est practices when it comes to wireless security.
It appears that in some quarters folks felt that the President did not tell us anything we did not know in his speech on Friday about cyber security. I think we need to understand, however, that the key phrase there is “anything WE did not know.” At times we who work in technology live in a bubble and assume that everyone understands what we understand. But technology or cyber security is our business – it is not the core business of the financial institution, the hospital, the school, the utility etc. Read more…
Best practices, Wireless security