Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Mobile

    Gadgets Present Security Conundrum

    By
    Matt Hines
    -
    May 22, 2006
    Share
    Facebook
    Twitter
    Linkedin

      Palm introduces its newest Treo, Nokia and Google partner for instant messaging on handhelds and Research In Motions BlackBerry tackles the China market. Another day, another hot device. The downside: keeping the enterprise network secure amid a barrage of new consumer devices.

      Indeed, when Mark Halligan, a principal in the Chicago-based law firm Welsh & Katz, wants to show business leaders how easy it is for their employees to secretly walk out the door with important data, he simply shows them his watch, which bears a USB connector that allows the device to download and store roughly 1GB of electronic information.

      The security risks from such digital toys—not to mention smart phones, digital music players and USB drives—are growing, said Halligan, who urges companies to police how employees use outside devices. “With outside consumer devices, you need to build strict policies that police and limit the use of each individual device,” he said.

      Ways to curb device use range from squirting hot glue into PCs USB ports and keeping key-chain fobs and iPods off the network to the advanced—blending technology systems with physical security tools to monitor behavior.

      However, those approaches can backfire. Telling workers to leave their smart phones at home is counterproductive, said Steve Baker, an analyst with NPD Group, of Port Washington, N.Y. For instance, if IT administrators had banned Palms original PDAs out of security fears in the mid-1990s, we may not have the companys latest Treo smart phones today, Baker said.

      “Theres no way for enterprises to stop these kind of things; users are bringing them in because they see a business rationale,” said Baker. “Enterprises must find ways to allow people to use consumer devices securely, as banning them will only lead to people staging rebellions from within.”

      A bevy of vendors are trying to help. Microsoft is promising to give IT administrators expanded capabilities to manage devices in its next-generation Vista operating system.

      Enhancements to Vistas Group Policy settings, which allow administrators to enforce configuration settings for individuals, groups and specific machines, have been designed to block access to removable devices such as CD-ROMs, DVD drives and USB tokens, said David Zipkin, a product manager at Microsoft, in Redmond, Wash.

      Centennial Software is another player. The companys DeviceWall creates a virtual whitelist of approved devices assigned to certain groups and individuals. These lists can be configured to block any device not explicitly permitted by a companys policies. DeviceWall also ties users device privileges directly to their user names and passwords.

      One company using DeviceWall is Motor Information Systems, of Troy, Mich., a specialty automotive publishing company owned by Hearst Publishing.

      “We have some people who need to use USB ports to print information or download photos, but, at the same time, you appreciate the risk of having someone plug in their iPod and walk off with a gigabyte of data,” said Jeff Schmitt, network administrator at Motor. “This way, we can allow people to have unique privileges based on their jobs and even keep an eye on who is trying to attach something else to the network.”

      Another fix is to use cameras to curb device usage. One company marketing such tools is 3VR Security. In April, 3VR introduced the fourth iteration of its IVMS (Intelligent Video Management Systems), which promises to convert raw video from security cameras into a searchable database.

      The system is designed to detect misuse and warn administrators if someone appears to be stealing data or attempting to log in to computers or to a data center where they do not have access privileges.

      “There is the ancillary benefit of having people know that they are being watched; it may sound obtrusive, but companies in the health care and financial services industries, in particular, have to consider that they can be held liable if they dont know where this information went,” said Steven Russell, co-founder of San Francisco-based 3VR.

      Steve Hunt, an analyst at 4A International, a Chicago research company, agreed that constant monitoring may be the way to go. “It may seem sort of draconian at first, but with all the devices that are finding their way into the office, it may someday be the only choice companies have,” said Hunt.

      Consumers Have Their Own Devices

      A growing array of consumer devices pose potential threats to enterprise data security.

      USB drives

      * Easily concealable portable drives can swallow large volumes of information

      Smart phones

      * Carry on-board cameras, support USB and wireless network connectivity, and offer sizable data reserves

      MP3 players

      * Offer USB network connectivity and the ability to store gigabytes of data

      Digital cameras

      * Increasingly diminutive in scale, yet large in on-board memory

      USB gadgets

      * Watches and pens with USB storage drives inside are already on the market

      Matt Hines
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×