Escolar Documentos
Profissional Documentos
Cultura Documentos
2012
513.234.5822 Dustin.werden@afidence.com
Dustin Werden
TABLE OF CONTENTS
Contents
The Enterprise Environment Embraces the Tablet ........................................................................................... 1 What are the security risks and how are they mitigated? ............................................................................... 2 Central Management; Standardization ............................................................................................................ 3 Summary ........................................................................................................................................................... 4
2010-2011 Afidence, Inc. Proprietary & Confidential All Rights Reserved No Reproduction or Redistribution Without Written Permission
TABLET COMPUTING IN THE ENTERPRISE ENVIRONMENT What Are the Security Risks and How Are They Mitigated?
Increased business use and criticality of information held on tablets dictates the need to mitigate and manage risk due to the theft or loss of a device; the security risks of mobile computing devices are well known and well documented. Data is at risk whenever it leaves a controlled enterprise environment in any form but laptops, external hard drives, and smart phones are especially easy and highly valued targets for theft. Tablets are also now high on the list of most desirable items to be stolen from an employees home or vehicle. The enterprise must protect the physical security of their data while providing secure remote access. The data held on a tablet can be secured in two ways; encryption and remote location services. Encryption is the gold standard of data protection and is native in the two leading tablet operating systems, iOS and Android. Proper encryption of data on an enterprise tablet will prevent unauthorized users from viewing, modifying, or otherwise interfering with the integrity of that data. The second means by which an enterprise can secure their data on a tablet is by utilizing remote location services. As long as the device is in use, remote location services allow the enterprise to track the physical location of the device from a central console using the integrated GPS, which is standard in current tablets. Remote location services functionality can increase the recovery of a missing device and also allows for remote wipe capability to reduce the exposure or potential data leakage. Besides the native data security capability of tablet operating systems, major players in data loss prevention are entering the market with offerings designed and marketed solely for tablet use. Products from Symantec and McAfee have recently been released or are scheduled for impending release, with more surely following. Along with physical security concerns, secured remote access to data is one of the main challenges of tablet computing. Secured access to enterprise data includes architecture that is familiar to any laptop user, VPN and the secured gateways provided by HTTPS and Citrix. If a stolen or lost device is not properly encrypted or managed with remote location services, secured access to enterprise data can at the very least reduce the amount of potential data leakage. No aspects of data loss prevention are impenetrable, but with multiple layers of security used in concert a tablet computing device can be considered secure.
2010-2011 Afidence, Inc. Proprietary & Confidential All Rights Reserved No Reproduction or Redistribution Without Written Permission -2-
2010-2011 Afidence, Inc. Proprietary & Confidential All Rights Reserved No Reproduction or Redistribution Without Written Permission -3-
Citations:
1. Boulton, Clint. (2011). Desktops and Notebooks: Tablets, Smartphones Fuel 10 Technology Trends for 2011: Deloitte. EWeek.com. January 20, 2011. Link to Article
2. 3. 4.
5.
Business Courier. (2011). Hamilton County approves purchase of 187 iPads for social workers. Bizjournals.com. November 3, 2011. Link to Article Business Wire. (2012). Strategy Analytics: Android Captures Record 39 Percent Share of Global Tablet Shipments in Q4 2011. BusinessWire.com. January 26th, 2012. Link to Article Murphy, Chris. (2012). 9 Powerful Business Uses For Tablet Computers. InformationWeek.com. February 10, 2012. Link to Article Montalbano, Elizabeth. (2012). Air Force Command To Buy Tablets. InformationWeek.com. February 7, 2012. Link to Article
2010-2011 Afidence, Inc. Proprietary & Confidential All Rights Reserved No Reproduction or Redistribution Without Written Permission -4-