While the Apple tablet doesn't yet equal the BlackBerry in terms of enterprise-grade management tools, it sports a set of surprisingly robust security features.
In researching a forthcoming InformationWeek Analytics IT Impact Report on the iPad 2, I became much more familiar with features enterprise users and IT staffers fret about in a tablet--things like support for automated provisioning, centralized configuration management, network security, and local data protection. Just the things often lost in the noise of a consumer-oriented rollout blitz.
While the iPad (and sister iOS devices the iPhone and iPod Touch) doesn't yet equal the BlackBerry--every mobile IT administrator's best friend--and leaves a lot to be desired when it comes to enterprise-grade management tools, it does sport a set of surprisingly robust security features.
Of course, the iPad incorporates the latest Wi-Fi security standards such as WPA2 personal (preshared key) and enterprise (Radius). It also offers a host of VPN protocols, including Cisco IPSec, Layer 2 Tunneling Protocol, and Point-to-Point Tunneling Protocol, with third-party apps from the likes of Cisco, F5 Networks, and Juniper adding support for SSL VPNs.
So data in motion is well protected, while data at rest, the flash drive partition for user and application data, is encrypted with AES-256 using an embedded hardware key, which is strengthened by salting (much like Unix passwords) with the device's screen-lock passcode. Local data can be wiped either remotely--using a third-party mobile device management app, Exchange ActiveSync, or Apple's Find My iPad service--or locally after a set number of invalid passcode entries.
Here are some quick tips for tightening up security on your iPad:
– Use WPA2 on any networks you control, office and home.
– Use a VPN while on any public Wi-Fi network.
– If you don't have access to a corporate VPN, get an account on a public provider like WiTopia or Strong VPN.
-- Configure a passcode and set a short lock interval of 15 minutes or less. The basic level, four-digit PIN is OK, but the "enhanced" alphanumeric password is better.
-- Configure local wipe after 10 invalid passcode attempts.
Building A Mobile Business MindsetAmong 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 18, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."