Test

Submitted by: Submitted by

Views: 129

Words: 2275

Pages: 10

Category: Philosophy and Psychology

Date Submitted: 02/10/2014 05:26 PM

Report This Essay

Controlling laptop and smartphone access to corporate networks

Understanding the similarities and differences of securing mobile laptops and smartphones

Executive summary

Smartphones have joined laptops as de facto network endpoints in corporations, academic institutions and government entities. In managing security for these mobile devices, IT must be aware of the differences, as well as similarities, between laptop and smartphone platforms. With these distinctions in mind, IT can apply best practices to ensure the confidentiality and security of corporate communications from both inside and outside of the network perimeter. The information presented in this paper represents the ™ ™ industry experience of the Dell SonicWALL research and development team and reflects the requirements that can be met by applying Dell SonicWALL solutions. The Dell SonicWALL solutions are referenced in the conclusion to this paper and can be reviewed in detail on the Dell SonicWALL web site: http://www.Dell SonicWALL.com

additional layer of security screening or review. If a laptop compromised by insecure applications logs into the network, it presents a direct threat to corporate resources. Because of their open application environment, these laptops also require device interrogation to enable IT to see if the proper security applications are running on the device, and enforce security policy to allow, quarantine or deny access to the device and/or user based on the defined security policy of the company. For these unmanaged laptops, security demands using reverse proxy portal access or a virtual private network (VPN) tunnel with endpoint control. In contrast, apps designed to run on smartphone (as well as tablet) operating systems typically undergo stringent review and are white-listed before becoming ® ® available for download. For example, Apple iPhone users have rarely downloaded a rogue app from the SM ® App Store . Google Android™, while somewhat less stringent (after...