When was the last time you thought about remote access? As an end user, you probably don’t think about it that often – nor should you. It’s one of those things that you just expect to work when you need it. And for us remote users (as an occasional telecommuter I’m including myself in this bucket), it’s all about having the same functionality we have in the office no matter where we’re logging in from. Let me access our corporate resources from anywhere I happen to be and from whatever device I happen to be logging in from, and I’m happy.
For the IT department though, it’s a whole different set of concerns. Sure, they need secure remote access just like end users, but they also have the headache of managing the whole solution and – let’s be honest – dealing with frustrated end users when they can’t log in. I’m sure they prefer to keep us in that happy state.
Previously, Ben had blogged about Why Mobile Device Management (MDM) is necessary for today’s enterprises. Today, I would like to touch on how to secure mobile devices. The main two components of securing mobile devices are 1) securing the connection between the mobile device and the corporate network, and 2) securing the device itself.
Securing the Connection