SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

CHANNEL BY TOPICS


QUICK LINKS




Seal Sensitive Data with Solid Wireless Security Policies (Part 3)

Wireless Management

Wireless Management - Featured Article

October 22, 2009

Seal Sensitive Data with Solid Wireless Security Policies (Part 3)

By Marisa Torrieri, TMCnet Editor

With smartphones gaining traction in the consumer world, it’s easy to forget that handsets are simply mini computers that could contain sensitive data about business contacts and inter-office electronic communication.  
 
In addition to putting in place a procurement policy that includes checks and balances for who gets what type of wireless device and plan, as well as a usage policy to make sure employees aren’t overusing mobile services for personal use, implementing a solid security policy is also essential, said Pankaj “PJ” Gupta, founder and CEO of Amtel (News - Alert), a company that helps enterprises to rein in wireless management expenses and improve productivity.

 
“Corporations need to determine if their sector needs to comply with regulations of their governing bodies,” said Gupta. For example, hospital IT staff should check to make sure wireless management security policies set forth comply with the privacy regulations outlined in HIPAA (Health Insurance Portability and Accountability Act). The financial industry needs to keep tabs on laws like the Gramm-Leach-Bliley Act (GLBA), which requires U.S. financial institutions to protect customer confidentiality.
 
“Depending on their requirements, organizations would decide various aspects of security policy,” Gupta said.
 
Factors worthy of consideration include the length and/or complexity of passwords on devices, whether to erase or time out for unsuccessful logins or allow Bluetooth, WiFi (News - Alert) and other technologies to reside on a device.
 
A number of devices, such as BlackBerry, can be remotely and securely managed through enterprise servers, which, in turn, can be integrated into the telecom expense management platform, Gupta said.
 
“Establishing wireless policies streamlines the procurement, usage and security process at an enterprise and gives a better perspective of the telecom spend,” Gupta said. “An integrated wireline and wireless solution with full policy management support is integral to successful implementation of telecom expense management at an enterprise.”
 
This is the third of a three-part series on the telecom expense management policies that enterprises need to look at in order to curb wireless expenses. For more information on TEM policies, check out Part 1 and Part 2 of the series.

Marisa Torrieri is a TMCnet Editor. To read more of her articles, please visit her columnist page.

Edited by Marisa Torrieri


More on Wireless Management >>





Technology Marketing Corporation

35 Nutmeg Drive Suite 340, Trumbull, Connecticut 06611 USA
Ph: 800-243-6002, 203-852-6800
Fx: 203-866-3326

General comments: tmc@tmcnet.com.
Comments about this site: webmaster@tmcnet.com.

STAY CURRENT YOUR WAY

© 2019 Technology Marketing Corporation. All rights reserved | Privacy Policy