Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

BLOG: Securing the mobile generation

Jon Andresen | March 30, 2012
While the mobile computing boom presents enterprises with significant business opportunities, the key to success lies in their ability to deal with the accompanying security threats.

Next Generation Security

One way to overcome the inherent limitations of mobile devices is to offload security processing functions to a more powerful system. For instance, companies may look to backhaul mobile data traffic to their in-house servers for threat analysis before routing it to handheld devices. However, with the proliferation of mobility, the additional processing burden placed on enterprise resources can be significant and may quickly result in system and bandwidth bottlenecks.

A more efficient method is to employ a dedicated appliance or server that can leverage the power of the cloud. These cloud-based security systems are focused purely on identifying the latest Web threats and distributing the latest analyses in real time to subscribing companies who in turn are able to effectively filter Web traffic and ensure the safety of their mobile users.

To address the issue of bandwidth, a WAN optimisation solution may also be necessary to intelligently control business and recreational traffic, as well as accelerate important applications and media.

The combination of cloud security and bandwidth optimisation results in a solution that not only meets the security needs of mobile devices. It effectively presents a unified Web security solution that can be used throughout an organisation. Regardless of whether people use a desktop, notebook, tablet, or smartphone, to access the Web, a dedicated cloud solution ensures consistent security policy and coverage.

In addition, it places only a minimal burden on enterprise infrastructure while maximising available mobile bandwidth for highest user experience and productivity.

Jon Andresen is director of product marketing, APAC, Blue Coat Systems


Previous Page  1  2 

Sign up for Computerworld eNewsletters.