Network managers are progressively imposed for security and balance utility, as the administration approaches more company data on their tablet computers and smartphones. Some challenges they encounter includes the use of new tools and techniques that manages the devices on the network, supervising some troubleshooting bandwidth issues and more network traffic since the companies are using more data and how they can keep tabs on the evolving number of mobile devices that connects on their networks.
The director of security services and chief information security officer at a program management and information technology services firm Creative Computing Solutions Inc., Joe Beal said that it was a race where in they try to lead along with the curve. Some agencies are not just utilizing desktop computers owned by the agencies that was in the four corners of their office and arranged with required security settings. To get the data with the virtual private networks or any other ways, feds are using laptop computers and some are with their personal mobile devices.
Beal was also signed a security contract work for the Department of Homeland Security and stated that the network boundary evolved into uncertainty and the attack surface has become high. He added that the more devices that are being connected to the network, the more they need to control and evaluate it. The company should know how to control and track down the devices that are being connected to their networks. In the previous years as they were government-issued, some network managers understand the virtual path devices that they obtain to get the function of the network and to distinguish where the devices comes from.
However things have changed, based in the Digital Government Security announced last May, the total costs of the federal government annually for mobile and wireless devices and services was approximately $1.2 billion and the active accounts was about 1.5 million. As companies advance their adoption of the latest mobile technologies, the numbers will just grow. The chief security strategist in Citrix Systems, Kurt Roemer said that some individuals are not only using their company’s network to distribute data and resources. Nowadays, people are working in the hotels, home offices and other places.
The network is in anywhere and it is far beyond their supervision. To give their employees with safe access to agency data even in using their own government or personal devices, companies is being required to adopt in the latest technologies. Some solutions require to download third-party software on the employees’ devices and other firms are using versions of that software. The mobile application management manages the access to agency applications on the device and it decreases the focused on the security settings of that device.
The CEO and co-founder of Plixer International, Michael Patterson said that the network managers should acknowledge how much bandwidth consumes in their networks by different applications like iTunes and YouTube. He added that the companies should set rules to boost the bandwidth they have and prevent to spend more resources.
REFERENCES:
http://www.federaltimes.com/article/20120902/IT03/309020001/Agencies-can-mandate-personal-phones?odyssey=nav|head
http://hightechnologyforensics.com/as-technology-goes-mobile-network-managers-try-to-keep-up-federal-times/
http://www.infosecmagazine.com/?title=As_technology_goes_mobile_network_managers_try_to_keep_up_Federal_Times