Purchase Solution

Deploying Global Technology

Not what you're looking for?

Ask Custom Question

Address security concerns in deploying global technology solutions.

Purchase this Solution

Solution Summary

This solution addresses security concerns in deploying global technology solutions. Supplemnted with security of global deployment.

Solution Preview

1. Address security concerns in deploying global technology solutions.
For example, in Hong Kong — April 12, 2006 — Security concerns are the biggest obstacle to the widespread adoption of wireless and remote computing in businesses worldwide today, according to a global survey by the Economist Intelligence Unit and sponsored by Symantec Corp (NASDAQ: SYMC). More than 60 percent of companies are holding back on deployment, citing security concerns. Close to 47 percent of respondents cite cost and complexity as a major obstacle to deployment. All the while, almost one in five businesses has already experienced financial loss due to attacks via mobile data platforms. The Economist Intelligence Unit's research highlights serious weaknesses in firms' present security arrangements for mobile devices. While 82 percent of businesses worldwide indicate that they see the damage from virus attacks as the same or greater on a mobile network than on a fixed network, only 26 percent have actually assessed security risks of smart phones, compared with 81 percent of enterprises conducting security assessments for laptops. Despite the proliferation of mobile device use in the enterprise, only nine percent of companies have incorporated a comprehensive security architecture designed to include mobile device access. Of the rest, ten percent of companies have no measures for addressing mobile security, 39 percent are granting mobile devices access to corporate networks on an ad hoc basis and another 39 percent are integrating mobile devices into their existing fixed network security architecture. http://www.symantec.com/region/hk/press/2006/hk_060412.html
Therefore, enterprises must gain experience in mobile deployments and security before a serious attack makes it mandatory and time critical," said Paul Miller, director mobile and wireless solutions, Symantec Corporation. "In today's enterprise, there are multiple end points to account for - and proper protection cannot be tackled as one-size-fits-all. While most enterprises are aware of the risks introduced with mobility, they continue to lack the appropriate security measures and policies required to protect themselves from potential threats." For example, the Economist Intelligence Unit surveyed more than 240 global company executives and conducted a number of in-depth interviews with executives across a range of industries to explore awareness of the security risks associated with the widespread adoption of mobile data solutions. The research also looked at business readiness to respond should a security threat be realized. Regional responses were aligned on a number of matters, with regional contrast strongest around security risk assessment on specific devices and security software deployment. For example, 55 percent of Western European businesses have deployed security software to protect mobile data, compared to 44 percent in Asia-Pacific and just 36 percent in North America. "Security is the one particular issue that continues to impede the widespread adoption of mobile computing in the workplace and if it continues to be overlooked there is a danger that some businesses will miss the advantages mobility can bring to their workforces," said Gareth Lofthouse, director of custom research, Economist Intelligence Unit. http://www.symantec.com/region/hk/press/2006/hk_060412.html
Furthermore, the Symantec Internet Security Threat Report Volume IX, published in March 2006, highlighted that malicious code that targets mobile devices, particularly smart phones, continued to grow through the second half of 2005. The report also highlighted several new examples of malicious code for smart phones including Cardtrp, which was the first cross-platform threat with the ability to affect both Symbian and Windows operating systems. The end of 2005 also saw the emergence of Pbstealer which is distributed as a file that represents itself as a phone book utility for smart phones in order to entice a user to download and execute it. Once a device has been compromised by one of these Trojan horses, information such as the user's phonebook, notepad, calendar, and to-do list will be transmitted to Bluetooth-enabled devices that are within range. This may pose a serious breach of confidentiality if a corporate device is compromised in this manner, as sensitive contact information and appointments could be shared. The risks connected with mobile data will increase, as larger mobile networks become a more ...

Purchase this Solution


Free BrainMass Quizzes
Social Media: Pinterest

This quiz introduces basic concepts of Pinterest social media

Paradigms and Frameworks of Management Research

This quiz evaluates your understanding of the paradigm-based and epistimological frameworks of research. It is intended for advanced students.

Academic Reading and Writing: Critical Thinking

Importance of Critical Thinking

IPOs

This Quiz is compiled of questions that pertain to IPOs (Initial Public Offerings)

Lean your Process

This quiz will help you understand the basic concepts of Lean.