A Smart (phone) Approach to Improving Tablet PC Security

by Reads (3,026)

Tablet PCs are currently a hot ticket product item for both consumer and business users. While the Apple iPad and iPad 2 are still the top dogs, newer entries from Motorola, Research in Motion (maker of the ubiquitous Blackberry), Dell and others have expanded the field considerably, increasing application options for the Android and Apple iOS camps, not to mention RIM’s new BlackBerry Tablet OS.

Companies are taking a close look at these devices as they are added to the approved lists of internal IT departments, and filter in through the back doors as personal employee buys. Management and control are top concerns, especially as tablets gain access to corporate networks and data base resources. But, tablet security may be something that IT types already have a handle on, so to speak, since many of the same rules that were designed to secure smartphones also apply to tablet PCs.

These concerns include anti-theft measures, mobile application controls, and device management. There are also some unique differences in specific devices, like the Blackberry Playbook, that present challenges in terms of device syncing and access to corporate servers.

For more on the challenges of tablet PC management and control issues, as well as recommendations on best practice approaches, read Tablet security: Best practices for the tablet computer onslaught, on TabletPCReview’s sister-site, SearchMobileComputing.



All content posted on TechnologyGuide is granted to TechnologyGuide with electronic publishing rights in perpetuity, as all content posted on this site becomes a part of the community.