Thank you for your message. It has been sent.

OK

Making virtualization, reality

SRA: Securing Access From Non-Corporate Devices

If the CEO of a corporation gets a new tablet or smartphone, chances are one of the first things they will do is head over to IT and ask the department to get the new device onto the company network.

The ability to access a corporate network via a personal device is a luxury that affords the user many desirable conveniences, and is something most IT units are capable of providing. The question, however, should not be whether a device can be added to the network, but rather how can it be done safely?

The Danger of Allowing Foreign Devices onto a Virtual Network

Without proper Secure Remote Access (SRA), foreign devices present a bevy of security threats to networks, including malware incursions and virus infiltration. If these harmful infections plague a personal device that is granted access to a network, they will begin to affect the network itself, and pose dangers to the other machines operating within the shared environment.

Another potential problem with allowing employees (of any level) remote access to company networks via personal devices is the creation of exit points of corporate data. For example, confidential information never meant to leave the network may be saved on a smartphone or tablet, thus becoming exposed to all kinds of threats previously protected from by the company’s network.

How to Mitigate the Risks of Foreign Devices on a Virtual Network

While the security issues raised by foreign devices entering a corporate network are both very real and equally serious, they should not dissuade consumers from creating a virtual computing environment that accommodates personal machines; the potential to improve user experience is just too great.

Besides, the dangers inherent in allowing access to personal devices can be mitigated, if not eliminated outright, simply by taking the necessary protective measures.

The following steps should be taken to ensure a network can securely accommodate personal devices:

Taking these measures will allow an organization to accept foreign devices onto its network, without raising legitimate cause for concern.

Trent Dilkie

Trent Dilkie

Trent Dilkie has come a long way in the last 30 plus years, from engineering student at the University of New Brunswick to VP Strategic Initiatives & CSO at Gibraltar Solutions. Today, Trent is an important part of the Gibraltar team, as his expertise in security has allowed him to be involved in ethical hacking and building computer security assessments and new security practices. He has also developed solutions for mobile device integration into corporate IT, Bring Your Own Computer programs and Mac@Work programs.

Tailored solutions for all your needs

by Gibraltar in partnership with

citrix-logo

logo-amazon-web-services-aws-ed

VMware-logo

Nutanix-logo

Cisco-logo

HP-logo

Simplivity-logo

logo-amazon-web-services-aws-ed

x

Request form


Full name

Company

Email

Phone

Your request

Contact us today


Twitter