Five keys to mobile security

These features are must-haves for any mobile security product, users say

• Encryption. Security software should provide some level of encryption, preferably full disk encryption. The best tools can handle a wide variety of mobile devices - laptops, PDAs, smart phones and USB memory sticks, for example.

• Directory service integration. The best tools offer hooks into an organization's directory, be it Microsoft Active Directory or another Lightweight Directory Access Protocol-compliant service. Such integration eases policy management and user authentication.

• Centralized management. The best tools provide a central console for management and administration. To date, most tools have yet to integrate fully the management of all the pieces of mobile security - laptop encryption, PDA encryption, device lockout and USB port control -from one tool and one screen.

• Detailed policy support. Some tools offer more granularity than others. For example, they may block read/write access to a CD drive but allow read-only access.

• Audit trail. The best tools provide an audit trail showing which files have been encrypted and which have been copied to USB drives or PDAs and by whom.

< Return to main story: Mobile device lockdown >

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Take IDG’s 2020 IT Salary Survey: You’ll provide important data and have a chance to win $500.