While the Apple tablet doesn't yet equal the BlackBerry in terms of enterprise-grade management tools, it sports a set of surprisingly robust security features.
In researching a forthcoming InformationWeek Analytics IT Impact Report on the iPad 2, I became much more familiar with features enterprise users and IT staffers fret about in a tablet--things like support for automated provisioning, centralized configuration management, network security, and local data protection. Just the things often lost in the noise of a consumer-oriented rollout blitz.
While the iPad (and sister iOS devices the iPhone and iPod Touch) doesn't yet equal the BlackBerry--every mobile IT administrator's best friend--and leaves a lot to be desired when it comes to enterprise-grade management tools, it does sport a set of surprisingly robust security features.
Of course, the iPad incorporates the latest Wi-Fi security standards such as WPA2 personal (preshared key) and enterprise (Radius). It also offers a host of VPN protocols, including Cisco IPSec, Layer 2 Tunneling Protocol, and Point-to-Point Tunneling Protocol, with third-party apps from the likes of Cisco, F5 Networks, and Juniper adding support for SSL VPNs.
So data in motion is well protected, while data at rest, the flash drive partition for user and application data, is encrypted with AES-256 using an embedded hardware key, which is strengthened by salting (much like Unix passwords) with the device's screen-lock passcode. Local data can be wiped either remotely--using a third-party mobile device management app, Exchange ActiveSync, or Apple's Find My iPad service--or locally after a set number of invalid passcode entries.
Here are some quick tips for tightening up security on your iPad:
– Use WPA2 on any networks you control, office and home.
– Use a VPN while on any public Wi-Fi network.
– If you don't have access to a corporate VPN, get an account on a public provider like WiTopia or Strong VPN.
-- Configure a passcode and set a short lock interval of 15 minutes or less. The basic level, four-digit PIN is OK, but the "enhanced" alphanumeric password is better.
-- Configure local wipe after 10 invalid passcode attempts.
Building A Mobile Business MindsetAmong 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.
InformationWeek Tech Digest August 03, 2015The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.