Mobile & Wireless World: It's still about security
Balancing ROI and security concerns is hard to do, users say
Computerworld - PALM DESERT, Calif. -- Wireless adoption in the enterprise, widely seen as a productivity booster, continues to be hampered by security concerns, according to speakers and users here at Computerworld's Mobile & Wireless World conference.
"I'm constantly getting hacked," said Majid Zahedi, an applications specialist at Forty-Niner Shops Inc., which provides bookstore and food services at California State University in Long Beach. He was referring to server statistics that show constant probes launched against his network.
The company has some remote users who need wireless access, but securing the network is "my main concern right now," Zahedi said. It's especially unnerving, he said, to "see the kids with their [mobile] computers trying to sniff out our information" with Wi-Fi sniffers.
Zahedi said security is so worrisome that he's recommending to the company's board of directors that they remove all wireless networks.
While other companies may not be ready just yet to give up on wireless because of security, such concerns are the main impediment to widespread wireless adoption, according to 46% of attendees who voted in an instant poll during the conference.
Lynn Carson, a PC support manager at International Sematech in Austin, said his company within the past five months provided complete wireless access to its headquarters building. But the project was delayed by security considerations. "Security was the big detriment to rolling that out," he said. "It kept us from moving faster on the project."
Scott Richards, vice president of product management at Senforce Technologies Inc. in Orem, Utah, said during a panel discussion that companies have long had to deal with "a balancing act between productivity and security," and that has been magnified with the spread of mobility devices. Companies used to have a safe network perimeter protected by firewalls and the like, he said, but now they must secure each device that extends beyond that perimeter.
"Data is flowing through the air, and there are some security issues with that," Richards said.
Those issues sometimes become all too real. Panel member Marty Menard, an executive at Intel Corp., mentioned during the discussion that someone once "snooped" the e-mail of 10 to 12 vice presidents in an Intel facility in Oregon. The hole has been patched, he quickly noted.
Lost and stolen mobile devices are another security problem. Though losing a device may be rare, "there are concerns there," Richards said.
Like it or not, he said, most companies must address these security concerns. Through "viral deployment" -- unauthorized devices being brought in by users -- or officially sanctioned efforts, "you do have mobility," he said. Richards
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Keeping UP with Mobile Trendsetters Global survey tracks achievements and challenges of mobile initiatives along with best practices for success.
- Assessing ROI for Mobile Acceleration Clients This EMA® paper examines the business case for deploying mobile WAN optimization client software and builds a ROI model based on the experiences...
- The Apple-ization of the Enterprise: Understanding IT's New World Read this paper for how to tackle Apple-ization (and the related consumerization of IT and Bring Your Own Device/BYOD).
- A Practical Introduction to Enterprise Mobility Management Read the white paper to better understand the basic concepts within mobility management and to learn how you can apply EMM technology to...
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the... All Mobile/Wireless White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!