Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Mobile
    • PC Hardware

    USB Device Cuts Risk of Hoteling

    By
    Rob Enderle
    -
    May 11, 2004
    Share
    Facebook
    Twitter
    Linkedin

      Hoteling is the practice of using borrowed equipment rather than taking your own. This is often done when IT doesnt want to provide laptops for every employee because most dont travel enough to need them.

      If an employee visits a remote site, they are given a guest PC to borrow—connected to e-mail and a browser—and are left to get as much done as they can (mostly e-mail) while on their visit.

      Employees are increasingly using PCs provided at industry events such as Comdex, in hotel business centers and in public kiosks at airports.

      In all cases, the employee may be creating a significant security exposure: Their passwords may get cached, spyware (particularly key loggers) may exist on that borrowed public hardware, and files may remain on the systems after the employee leaves.

      If that werent bad enough, the process of getting access often requires a help-desk call, which in and of itself may represent not only an unneeded cost but an additional security exposure.

      And there have been increasing concerns that kids, gaining access to their parents companies through shared home PCs, could represent a growing threat. This belief is based on the knowledge that children often play pranks or, if bored, get into mischief.

      With more and more children becoming capable of mining a home PC for its secrets and the frequent lack of parental supervision at home, there is a painful accident waiting to happen here as well.

      KeyComputing, which is owned by M-Systems Flash Disk Pioneers Ltd. (the folks who make USB memory dongles), came up with a product called the Xkey that appears to be ideal for this problem. This offering looks like any other USB dongle on the outside, but inside it has a series of utilities that should mitigate this growing employee risk.

      The Xkey has a secure Microsoft Exchange client for e-mail and a secure repository that can contain sensitive documents. It also runs a utility at the beginning and end of a session that blocks spyware (particularly key loggers) during use and removes all traces of the users presence from the borrowed machine on exit.

      Finally, the device contains a secure VPN so that users can get access to remote resources. This could be a simpler way to ensure that wireless users, even on the plant site, get both easy and secure access to the network without locking out guests. (Using VPNs and putting Wi-Fi access points outside the firewall is a widely recommended practice).

      IT can set this up for each user, and the user needs to know only their ID and password to use the device. The date on the device is fully encrypted (128-bit), and the device uses 2-factor authentication to protect it.

      /zimages/2/28571.gifThe Trusted Computing Group is working on a spec to secure wireless networks. Click here to read more.

      On request, the device can be preset to permanently lock up after a preset number of failed log-in attempts. This renders the device useless but protects the data. Of course, this suggests that leaving this thing around a house full of kids, if that feature is active, will probably result in the device becoming a doorstop, but that is still much safer than the alternative.

      Obviously, if you use a device like this, you should also back up the files on it to a secure corporate resource in case you lose the device. But given the risks we face on a daily basis, Im increasingly wondering how we can justify not using more powerful ways to secure our traveling users.

      Whether it is the Xkey or the Migo USB flash drive, which we covered a few months ago, you should be actively looking at ways to ensure that your traveling users dont become an increasing nightmare for your company.

      Rob Enderle is the principal analyst for the Enderle Group, a company specializing in emerging personal technology. Full disclosure: One of Enderles clients is Microsoft as well as Advanced Micro Devices, Dell, Gateway, Hewlett-Packard, Intel, Transmeta, VIA and Vulcan. In addition, Enderle sits on advisory councils for AMD, ClearCube, Comdex, Dell, Hewlett-Packard, IBM, Intel, Microsoft and TCG.

      /zimages/2/28571.gifCheck out eWEEKs Desktop & Notebook Center at http://desktop.eweek.com for the latest news in desktop and notebook computing.

      Rob Enderle
      https://enderlegroup.com
      Rob Enderle is a principal at Enderle Group. He is a nationally recognized analyst and a longtime contributor to eWEEK and Pund-IT. Enderle is considered one of the top 10 IT analysts in the world by Apollo Research, which evaluated 3,960 technology analysts and their individual press coverage metrics.

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×