powered by TMCnet

Network Security

November 01, 2010

Offering Network Security in the Mobile Blind Spot

By David Sims, TMCnet Contributing Editor

Qwest (News - Alert) Business has recentlyoffered some tips to protect your enterprise network security systems from the mobile blind spot.

Ensuring visibility with continuous monitoring. No insight means no awareness. If you don’t know what’s going on with your network, your data could be at risk. An IT operations tool, company officials say, “that can provide visibility to all corporate assets, including laptops, USB drives” and others, “is essential to preventing breaches.”

A second way to improve mobile security is to protect and update business endpoints. “This is critical,” Qwest officials say, “even when the endpoint is not connected to the LAN. Users can connect to the Internet and unintentionally download viruses and worms that can infect the machine.”

Earlier this month TMC’s (News - Alert) Gary Kim wrote that This year, the number of post-PC devices, such as tablets, eReaders, and Internet-capable mobile phones, will eclipse PC devices, such as desktops, laptops, and netbooks, quoting Andrew Jaquith, Forrester Research (News - Alert) senior analyst.

“That should have many and widespread implications for consumer and business users of those devices, for one simple reason,” Kim says: “Most of us would not think to run our PCs without firewalls, anti-virus and other security measures. But how many of us actively use such protections on our smartphones, tablet PCs, iPod Touch and other devices able to use the Internet, and therefore subject to attacks launched against Internet-connected devices?”

To be sure, this is a problem that does not generally seem to have reached dangerous proportions. Although security experts discover hundreds of new strains of malicious code targeted at PCs every day, they've detected only 67 directed at smartphones in all of 2010, said Sean Sullivan, security adviser for the North American labs of F-Secure (News - Alert).

And one might argue that the use of Linux-derived operating systems, plus the way they are implemented on a mobile device, limits the value of any attempted attack. Android's (News - Alert) Linux operating system apparently runs applications in compartmentalized ways.


David Sims is a contributing editor for TMCnet. To read more of David’s articles, please visit his columnist page. He also blogs for TMCnet here.

Edited by Erin Monda

  Network Security Quick Links

  Astaro Press Corner

For more information on press releases, please contact your local Astaro media representative: Ms. Monika Schraft for the EMEA region on +49-721-255160; Ms. Jessica Lavery-Pozerski for the AMER region on +1-978-9742648 or Ms. Cheryl Tuquib for the Asia region on +65-622-72700. High resolution images and management team biographies and headshots are freely available for download on the right side of all press corner pages.

  Network Security Resources

  Featured Blogs

  White Papers & eBooks

 Stay Connected!