|Page (1) of 1 - 03/26/10||email article||print page|
DeviceLock Says Results of iPhone Security Readiness Poll Point to Lack of Preparedness(March 26, 2010)
SAN RAMON, CA and MOSCOW -- (Marketwire) -- 03/26/10 -- DeviceLock, Inc., a worldwide leader in endpoint data leak prevention software solutions, today announced the results of its iPhone security readiness poll, which found few respondents taking action to combat the threat posed by the increased use of iPhones in the workplace.
After collecting data for more than seven months, more than 1,000 responses were posted to the survey question, "Have you taken any steps to secure your business against the security threat posed by iPhones?" The research reflected the distribution of DeviceLock's user base, the geographic plot of the responses was predictably spread around the world; about two-thirds came from North America and Western Europe with the other one-third originating in Eastern Europe, the Middle East and Asia Pacific regions.
Less than 40 percent of all respondents answered affirmatively to the survey's question and admitted that the iPhone threat is a "back-burner issue," especially North America and Western Europe, where only about 25 percent of respondents answered 'Yes' to the question. This tendency was not seen in the one-third sample coming from regions to the East. Viewed as a whole, the Eastern Europe, Middle East and Asia Pacific regions registered close to 60 percent 'Yes' responses to the question.
"While this website-administered poll has inherent limitations, the results do suggest that the iPhone threat to data security is being generally underestimated," said Ashot Oganesyan, DeviceLock CTO and Founder. "Given the iPhone platform's consumer popularity and robust development community, its launch into the workplace is inevitable. Apple is among the mobility vendors competing for corporate users that want the ideal 'convergence' mobile device -- one that provides full function access to and interoperability with the business applications they use the most.
"The variation in how the well-developed IT markets of the West view the iPhone threat versus the emerging IT markets of the East may be because Enterprise IT planners in the West are relying on the already-entrenched vendors, such as RIM and Microsoft, to 'have their backs' and not introduce such a device without the necessary security hooks in place for device-related policy enforcement and encryption," said Oganesyan. "However, the Apple iPhone development community has less to lose, and may get there first. Meanwhile, IT planners in the emerging markets are, by virtue of economic necessity and down-sized expectations, already closer to the 'convergence dream' of doing everything they might otherwise do with a laptop with a phone, so they are just quicker to recognize the strength of the iPhone as a corporate contender. We're encouraging DeviceLock customers and prospects around the world to take precautions with regard to iPhones in the workplace."
As with previous waves of convenient devices that infiltrated the workplace -- from CD-ROMs, to personal printers, to thumb drives -- the iPhone offers gains in flexibility and productivity, along with greater risk of disastrous data leaks from corporate endpoint computers. History has proven that the best strategy for enterprise IT teams is to set clear policies with regard to new devices and to tool-up to enforce them. The particular risk with mobile communications devices like the iPhone is that an employee can run a local synchronization for data transfer, completely bypassing the corporate network and any network-based security solutions. With DeviceLock in place, IT security organizations can impose a "least privilege" mobile device policy that limits data exchanges to only specific iPhones and to only the types of data required for exercising an employee's business duties.
Featuring a patent-pending local synchronization filtering technology, DeviceLock gives security administrators the ability to centrally control which types of data specified users or their groups are allowed to synchronize between corporate computers and locally connected iPhones and iPods. DeviceLock also can recognize and filter numerous data object types for iTunes® protocols, thus empowering administrators to selectively allow or block synchronization of files, emails, email attachments and accounts, contacts, tasks, notes, calendar items, bookmarks, and various media types.
DeviceLock provides scalable, centralized, and easy-to-learn management and administration via a customized Microsoft Management Console (MMC) snap-in that natively integrates with Group Policy Management Console in Microsoft Active Directory. DeviceLock agents can be deployed, managed and administered completely from within an existing Microsoft Active Directory domain. DeviceLock also has classic administrative consoles for Novell, LDAP, or any Microsoft network configuration. A separate component, the DeviceLock Enterprise Server (DLES), is available for centrally auto-collecting audit and shadow data from protected endpoints. Highly-granular event logging and data shadowing configurations are supported for tracking and analyzing user actions on peripheral ports/devices, related system events and data transferred to peripheral devices.
In addition, the DLES can monitor remote DeviceLock-managed computers in real-time to check on agent status and policy template consistency. DeviceLock's comprehensive mix of configurable policy parameters and options facilitates the definition and enforcement of a "least privilege" corporate IT security policy. With DeviceLock, IT security administrators are equipped to logically profile the business role of every employee, group or department with regard to their use of local PC ports and peripheral devices, keeping each to the minimal set of operations required to perform their role. This reduces the overall risk of data leaks and helps organizations to better comply with applicable IT security regulations and industry standards.
About DeviceLock, Inc.
Since its inception in 1996 as SmartLine, DeviceLock, Inc. has been providing endpoint device control software solutions to businesses of all sizes and industries. Protecting more than 4 million computers in more than 60,000 organizations worldwide, DeviceLock has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. DeviceLock, Inc. is an international organization with offices in San Ramon (California, US), London (UK), Ratingen (Germany), Moscow (Russia) and Milan (Italy).
COPYRIGHT ©2010 DeviceLock, Inc. All rights reserved. DeviceLock® and the DeviceLock logo are registered trademarks of DeviceLock, Inc. iPhone, iPod touch, and iTunes are trademarks of Apple Inc., registered in the U.S. and other countries. BlackBerry® and related trademarks, names and logos are the property of Research In Motion Limited and are registered and/or used in the U.S. and countries around the world. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at www.devicelock.com.
DEVICELOCK MEDIA CONTACTS
Madison Alexander PR
Copyright @ Marketwire
Related Keywords:DeviceLock,Western Europe,USA,Marketwire, Inc.,IT (Information Technology),Security,Apple Computer,healthcare,Financial,Business,Email,middle east,Other,