Pro+ Premium Content/Network Evolution

Thank you for joining!
Access your Pro+ Content below.
April 2011 Vol. 2, No. 2

Tablet security: Best practices for the tablet computer onslaught

Adoption of tablet devices by business users has been astonishingly quick, taking some IT departments by surprise and wondering what to do about tablet security and support. To some extent, tablets can be treated like smartphones with the same mobile operating systems. But tablets are not just big flat smartphones -- they tend to be used differently and thus pose some unique challenges of their own. In the companion to this article, we explored the influx of tablet devices and related mobile security risks in the IT environment. Here we'll discuss how to mitigate those risks. Leverage smartphone mobile security practices Companies that rely on corporate-standard phones to ensure security will have more trouble embracing tablets. Employers may procure tablets for specific use cases, but this alone will not address all tablet demands. Instead, IT must facilitate safe business use of many different employee-owned tablets. Companies that are already securing employee-liable smartphones can start by applying smartphone mobile device ...

Features in this issue

News in this issue

SearchEnterpriseDesktop

SearchVirtualDesktop

  • VDI assessment guide

    Wait! Don't implement VDI technology until you know your goals and needs. A VDI assessment should consider the benefits of a VDI ...

  • Guide to calculating ROI from VDI

    Calculating ROI from VDI requires a solid VDI cost analysis. Consider ROI calculation models, storage costs and more to determine...

  • Keep the cost of VDI storage under control

    Layering, persona management tools and flash arrays help keep virtual desktop users happy and VDI storage costs down.

SearchVMware

SearchCIO

SearchSecurity

-ADS BY GOOGLE

Close