Wednesday, August 10, 2005

Wireless Strategies: Threats and defenses for mobile devices


You received this because you subscribed to it through ITworld.com. Unsubscribe information below.
Add ITworld.com@itw.itworld.com to your address book and continue to receive our newsletters.

Wireless strategies for IT professionals

 August 10, 2005 An eNewsletter published by wireless.itworld.comPart of the ITworld.com Site Network


 In today's update

›› Feature: Three threats and defenses for mobile devices

›› In the news:
- The case of the stolen Wi-Fi: What you need to know
- 'Car Whisperer' puts hackers in the driver's seat


›› Go Figure: Survey: Americans own cell phones, hate cell phones

›› Poll: What does "performance" mean to you?

›› ITwhirled: The Internet's "it" animal

›› From the network:
- Managed Mobility in the Enterprise


›› FEATURE

Three threats and defenses for mobile devices

As more miniature devices continue to expand their presence in the enterprise their evolving capabilities and data content make them critical points of protection. It is not uncommon for contact databases, customer lists, pricing data and confidential documents to be contained on smartphones, USB drives, PDAs and other devices. While these devices offer increased productivity and portability, they often do so at the cost of security and information assurance.


›› IN THE NEWS

The case of the stolen Wi-Fi: What you need to know
Cisco mulls acquiring Nokia, report says
IBM hopes new material boosts wireless performance
RFID experts launch new software company
'Car Whisperer' puts hackers in the driver's seat
Gartner's Q2 view of PDA market lifted by wireless
Nokia to replace CEO next year
Study: Fixed WiMax fails to inspire

Get the latest news here...


›› GO FIGURE

81 percent
Portion of surveyed American adults who own a mobile phone, but don't like it. Reasons cited for dissatisfaction include "download speeds, confusing menu interfaces, poor graphics quality, and lack of relevant information, [which] serve as barriers to increased use of data services."
Source: Harris Interactive, via Macworld.co.uk

Advertisement



›› POLL

When you hear the phrase "high-performance wireless network," what's the first thing that comes to mind?

  • High throughput
  • Low latency
  • No dropped connections
  • No dead zones
  • A wide range

    Let us know!


    ›› ITWHIRLED

    The Internet's "it" animal
    From mycathatesyou.com and Rathergood.com to Litterboxcam.com and infinitecat.com, cats are everywhere on the Internet. Why the online fascination with cats? One reason may be that cats' private nature makes them perfect subjects for the voyeuristic aspects of the Internet.

    More offbeat news, reviews and other stuff...


    FROM THE NETWORK:

    Managed Mobility in the Enterprise
    Learn how to effectively tackle the enterprise mobility management challenge. Failure to include adequate levels of mobile management will substantially increase TCO, will prevent the most efficient deployment, and will degrade the end user experience.

    The Paradox of High Availability
    With the growing complexity of IT replication and failover systems specifically designed to keep your business running, there are more scenarios that can cause a business outage. Thus the paradox of high availability. Learn more now.

    Breakthrough Data Warehousing - A New Webcast
    The data warehouse plays a crucial role for organizations implementing business intelligence. Faster, deeper and more cost effective analysis of customer and operational data leads to a competitive advantage. Watch now.

    The Growing Application Delivery Market - New Webcast
    Poor application performance is one of the biggest application delivery challenges. Is there a better way to increase the performance of mission-critical applications than buying more bandwidth or adding more servers? Find out.



    Sponsored Links

    Stay Out of the Headlines!
    Lost or stolen laptops, desktops - even USB devices - may expose your business to significant regulatory compliance issues and brand damage. CREDANT's revolutionary intelligence-based encryption secures your data no matter where it is stored.
    NetSupport Manager PC Remote Control
    Perform remote support and management on multiple systems simultaneously over a LAN, WAN and the Internet with this PC remote control software. Provides speedy, secure remote PC access, dynamic inventory, automated scripting and more.
    assyst by Axios Systems - Wireless ITSM solutions
    Our mobile solutions enable technicians and remote workers to update and action events using the latest PDAs & Blackberries etc - Regsiter Online for more information
    Broadband Mobile Satellite Modem
    Mobile data transfer at up to 3 times speed of GPRS, coverage in 99 countries, packet data service so you are charged for data transferred not time spent online.
    Remote Access - Remote PC
    RemotePC provides secure remote access for mobile and call center professionals for remote support via Internet.
    » Buy a link now

  • www.itworld.com   open.itworld.com   security.itworld.com   smallbusiness.itworld.com  storage.itworld.com   utilitycomputing.itworld.com   wireless.itworld.com

    CUSTOMER SERVICE:   Manage subscriptions    |   Newsletter FAQs
    CONTACTS Advertising: Clare O'Brien, VP of Sales Other Inquiries: Jodie Naze, Director, ITworld.com Site Network

    Brought to you by:
    Accela Communications, Inc. - 118 Turnpike Road - Southborough, MA 01772 USA
    Privacy Policy   Copyright © 2005 All rights reserved.



    Click here to forward this message to a friend!


    Click here to change or remove your subscription.



    No comments: