Premium Content

Access "Tablet security: Best practices for the tablet computer onslaught "

Lisa Phifer Published: 10 Oct 2012

Adoption of tablet devices by business users has been astonishingly quick, taking some IT departments by surprise and wondering what to do about tablet security and support. To some extent, tablets can be treated like smartphones with the same mobile operating systems. But tablets are not just big flat smartphones -- they tend to be used differently and thus pose some unique challenges of their own. In the companion to this article, we explored the influx of tablet devices and related mobile security risks in the IT environment. Here we'll discuss how to mitigate those risks. Leverage smartphone mobile security practices Companies that rely on corporate-standard phones to ensure security will have more trouble embracing tablets. Employers may procure tablets for specific use cases, but this alone will not address all tablet demands. Instead, IT must facilitate safe business use of many different employee-owned tablets. Companies that are already securing employee-liable smartphones can start by applying smartphone mobile device security policies and ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

    • How to troubleshoot iPad and iPhone Wi-Fi connection problems by Lisa Phifer, Contributor

      As iPhone OS Wi-Fi clients proliferate in the enterprise, IT must troubleshoot iPhone Wi-Fi connection problems and a host of other iPad WLAN problems. Here's how to solve basic iPad and iPhone Wi-Fi connection problems.

    • Preparing your wired network for wireless network integration by Lisa Phifer, Contributor

      Wireless LAN integration means upgrading wired networks with new equipment and traffic prioritization to avoid bottlenecks between the networks and provide QoS for wireless multimedia applications, including WLAN voice and video.

    • Integrated wired and wireless LAN security? Not so fast by Rivka Gewirtz Little, Senior Site Editor

      Combining wired and wireless LAN security solutions may be a plus for smaller companies, but larger enterprises fear security integration could result in vulnerabilities.

    • Tablet security: Best practices for the tablet computer onslaught by Lisa Phifer, Contributor

      Tablets are taking the enterprise by storm, and tablet security is a major concern. Find out which mobile device security best practices you're already using can apply to tablets, and which you will need to revisit to keep tablets secure.

    • Efficient enterprise Wi-Fi coverage requires hybrid approach by Lisa Phifer, Wireless Expert

      Enterprise Wi-Fi coverage is a key aspect of communications infrastructure planning as dual-mode smartphones and mobile handsets replace desk phones. Successful Wi-Fi strategies must incorporate hybrid technologies like DAS, femtocell and FMC.

More Premium Content Accessible For Free