Displaying articles for: 04-29-2012 - 05-05-2012
The recent trend toward IT “consumerization” has flooded corporate IT with a host of new apps and personal devices, forcing businesses to re-think their network access strategies. While these apps and devices raise valid concerns about security, compliance and management complexity, do they actually put your business at risk?
The solution is a “unified policy”—a holistic approach to coordinated security for enterprise network access, regardless of who owns a given device.Read more...
Does VDI save money? Does it save time? Is it cheaper than regular desktops? Is it less secure? Is it more secure? The debate has been going for some time as to whether VDI is worth the investment—in terms of money and risk. Perhaps the best question to start with is: Why are you considering VDI? Why do you really want to use it?
For now, yes, there’s still some uncertainty around the ROI of VDI. Or, at minimum, it is less apparent than that of server virtualization. Same goes for security. Kinda. A VDI environment is not automatically more secure, but it is possible to make it more secure. And so if the ability to augment security and facilitate regulatory compliance is your biggest motivator toward adopting VDI, you may very well find it well worth the investment on that benefit alone. The key is finding the right solution for managing laptop security. It’s got to be comprehensive, high quality, high performing, and hypervisor-based so you can be best prepared to avoid any risks associated with synchronizing laptop contents inside the heart of your data center where so much sensitive data resides.
You’ll need a solution that gives you complete visibility into your virtual desktop environment so you can see what your users are installing. You’ll need a solution that enforces a gold image so that configuration standards are upheld and that any deviation triggers an alert or quarantine. You’ll need virtualization-specific antivirus protection that helps to prevent, detect, and remove malware, but does not compromise performance because, let’s face it, VDI users are expecting an experience that exceeds that of traditional PCs. They want fast. They want flexible. They want secure.
There has been a surge in smart phone adoption and Internet usage through mobile devices, according to recently released figures by Nielsen and IDC, both global providers of market intelligence.
According to Nielsen, as of February 2012, “Almost half (49.7%) of U.S. mobile subscribers now own smart phones…an increase of 38 percent over last year”, and according to IDC ,“By 2015, more U.S. Internet users will access the Internet through mobile devices than through PCs or other wireline devices”.
Many smart phone owners use these devices not just to make phones calls and/or exchange SMS messages, but also to check email, surf the Web and download and use mobile apps for information gathering, social media (e.g., Facebook) and entertainment (e.g., YouTube, playing games, etc.). Subscribers expect that when using their mobile devices, they will be able to exchange information relatively quickly and easily, play games, as well as download/upload files with a reasonable quality of service. However, what they might not realize is the mobile operator who is enabling mobile data services has made infrastructure and personnel investments for assuring subscribers an expected level of service quality as well as protecting subscribers from threats introduced to the mobile network.
In a mobile network, one of the vulnerable points is the Gi (for 3G network) or SGi (for 4G network) interface, which is the public data network/Internet facing interface that allows subscribers to use Internet-dependent features of their device (with an activated data plan or wireless service in place). This interface is subject to the same types of Internet borne threats seen in terrestrial networks and could result in loss of service to the wireless data subscriber. In order to extend a positive customer experience with high quality of service and to minimize customer churn, mobile operators should and do protect this interface. To learn about the key threats to the Gi/SGi interface and how Juniper Networks SRX security solutions can help mitigate these threats, read the White Paper.Read more...
Discussing a wide range of topics impacting enterprises and data center security.