Mobile Management Tools to the Rescue

 
 
By Cameron Sturdevant  |  Posted 2002-07-29 Email Print this article Print
 
 
 
 
 
 
 

Systems help enterprises define and enforce security policies.

Its one thing to set up a password program on a single personal digital assistant. Its quite another to enforce password policy on hundreds or even thousands of handheld devices.

Thats where enterprise mobile management systems come into play, allowing IT managers to quickly and consistently define and enforce security and configuration policies that can reduce exposure of corporate data while making it relatively easy for end users to live with the security policies.

Mobile Automation Inc.s MA2000 handheld management tool protects lost devices that have wireless connectivity. After such a device is reported missing, it can be moved into the "lost" policy group. The next time the device is connected to the network, the Mobile Automation agent loaded on the device automatically receives command scripts that can destroy all data on the device.

More typically, handheld management systems can help IT managers enforce password policies. Tranzao Co.s OnlyMe, for example, enforces sophisticated policies on Palm OS-based devices that can lock a device every time the screen is turned off, activate a time delay after a certain number of bad log-in attempts or wipe the memory of the device after a certain number of time-delayed "cracker time locks."

In addition, Mobile Automations MA2000 can enforce corporate security policies so that, for example, the handhelds native operating system uses passwords correctly. And if an encryption system is being used, MA2000—like Novell Inc.s ZENworks for Handhelds and XcelleNet Inc.s Afaria—can make sure the components are delivered to all appropriate devices.

IT managers can expect to see a number of other improvements in handheld device management. For one, they will soon be able to manage encryption, firewall and VPN (virtual private network) functions in a single interface. Check Point Software Technologies Ltd. announced a combined firewall/VPN product for handhelds earlier this year.

eWeek Labs would also like to see the integration of desktop and mobile management products so that policies and management tasks such as password enforcement could be conducted in the same management console.

Also on our wish list is technology that would audit device configurations for security risks. One thing managers can do today is run asset inventory tools on handheld devices to determine what software is installed.

Senior Analyst Cameron Sturdevant can be reached at cameron_sturdevant@ ziffdavis.com.

 
 
 
 
Cameron Sturdevant Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at cameron.sturdevant@quinstreet.com.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel