Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Mobile
    • PC Hardware

    USB Device Cuts Risk of Hoteling

    Written by

    Rob Enderle
    Published May 11, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Hoteling is the practice of using borrowed equipment rather than taking your own. This is often done when IT doesnt want to provide laptops for every employee because most dont travel enough to need them.

      If an employee visits a remote site, they are given a guest PC to borrow—connected to e-mail and a browser—and are left to get as much done as they can (mostly e-mail) while on their visit.

      Employees are increasingly using PCs provided at industry events such as Comdex, in hotel business centers and in public kiosks at airports.

      In all cases, the employee may be creating a significant security exposure: Their passwords may get cached, spyware (particularly key loggers) may exist on that borrowed public hardware, and files may remain on the systems after the employee leaves.

      If that werent bad enough, the process of getting access often requires a help-desk call, which in and of itself may represent not only an unneeded cost but an additional security exposure.

      And there have been increasing concerns that kids, gaining access to their parents companies through shared home PCs, could represent a growing threat. This belief is based on the knowledge that children often play pranks or, if bored, get into mischief.

      With more and more children becoming capable of mining a home PC for its secrets and the frequent lack of parental supervision at home, there is a painful accident waiting to happen here as well.

      KeyComputing, which is owned by M-Systems Flash Disk Pioneers Ltd. (the folks who make USB memory dongles), came up with a product called the Xkey that appears to be ideal for this problem. This offering looks like any other USB dongle on the outside, but inside it has a series of utilities that should mitigate this growing employee risk.

      The Xkey has a secure Microsoft Exchange client for e-mail and a secure repository that can contain sensitive documents. It also runs a utility at the beginning and end of a session that blocks spyware (particularly key loggers) during use and removes all traces of the users presence from the borrowed machine on exit.

      Finally, the device contains a secure VPN so that users can get access to remote resources. This could be a simpler way to ensure that wireless users, even on the plant site, get both easy and secure access to the network without locking out guests. (Using VPNs and putting Wi-Fi access points outside the firewall is a widely recommended practice).

      IT can set this up for each user, and the user needs to know only their ID and password to use the device. The date on the device is fully encrypted (128-bit), and the device uses 2-factor authentication to protect it.

      /zimages/2/28571.gifThe Trusted Computing Group is working on a spec to secure wireless networks. Click here to read more.

      On request, the device can be preset to permanently lock up after a preset number of failed log-in attempts. This renders the device useless but protects the data. Of course, this suggests that leaving this thing around a house full of kids, if that feature is active, will probably result in the device becoming a doorstop, but that is still much safer than the alternative.

      Obviously, if you use a device like this, you should also back up the files on it to a secure corporate resource in case you lose the device. But given the risks we face on a daily basis, Im increasingly wondering how we can justify not using more powerful ways to secure our traveling users.

      Whether it is the Xkey or the Migo USB flash drive, which we covered a few months ago, you should be actively looking at ways to ensure that your traveling users dont become an increasing nightmare for your company.

      Rob Enderle is the principal analyst for the Enderle Group, a company specializing in emerging personal technology. Full disclosure: One of Enderles clients is Microsoft as well as Advanced Micro Devices, Dell, Gateway, Hewlett-Packard, Intel, Transmeta, VIA and Vulcan. In addition, Enderle sits on advisory councils for AMD, ClearCube, Comdex, Dell, Hewlett-Packard, IBM, Intel, Microsoft and TCG.

      /zimages/2/28571.gifCheck out eWEEKs Desktop & Notebook Center at http://desktop.eweek.com for the latest news in desktop and notebook computing.

      Rob Enderle
      Rob Enderle
      https://enderlegroup.com
      Rob Enderle is a principal at Enderle Group. He is a nationally recognized analyst and a longtime writer for eWEEK and Pund-IT. Enderle is considered one of the top 10 IT analysts in the world by Apollo Research, which evaluated 3,960 technology analysts and their individual press coverage metrics.
      Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×