Q&A: iPhone Security and the Enterprise Market
by HNS Staff - Monday, 16 June 2008.
Jesper Svegby is the Director of Business Development for the Mobile group at Check Point. With more than 10 years of experience in the Mobility and IT-security community Jesper has among other positions a history within the Swedish banking sector where he has participated within security groups covering secure transactions over public nets.

Does Check Point's support of the iPhone mean that you believe it's ready for the business user? Should Windows Mobile and Symbian be worried?

We see the iPhone as a successful and intuitive piece of technology that has been widely accepted. With Apple's iPhone 2.0 beta wrapping up we would expect to see a much greater adoption by enterprises as this latest version addresses their key requirements, like e-mail integration (most importantly with Microsoft Exchange), WiFi and an SDK to facilitate new applications by developers.

When it comes to security, the most important aspect (encryption of data at rest) is not yet available. In terms of device management, the vendors in this space will have to implement support for iPhone.

The new iPhone SDK that has been released will enable 3rd party vendors to do a lot on this platform. However it still needs more in terms of device management and security for the platform to excel into the enterprise market, where it will go up against Blackberry in the US and Symbian/Windows Mobile in EMEA.

In your opinion, what are the most important steps an iPhone user should do in order to keep their device safe?

These are measures we recommend for any end point device. Maintain control of the device and use appropriate physical security practices and set up. Don't install any applications other that the ones provided to you by your organization. Do not synchronize data that might be sensitive (which includes company emails.

Utilize the existing access control/password on the iPhone to make it more difficult to gain access to the contents. Apple will offer a remote wipe feature that can be utilized in the 2.0 release, however we would recommend the much stronger encryption technology when available. Wipe cannot ensure that data has not been leaked (for example, the first thing that usually happens with a stolen device is the SIM card is removed).

What worries about iPhone deployment does Check Point take care of?

Today Check Point provides the strongest end point security for more platforms than any other vendor and we're committed to expanding this coverage to new platforms. One example of our close working relationship with Apple was the successful development and launch of our Full Disk Encryption for Mac OSX product. We also recently launched secure remote access for the iPhone via our VPN-1 gateways and are actively working with Apple on data security solutions for this platform as well.

Spotlight

eBook: Cybersecurity for Dummies

Posted on 16 December 2014.  |  APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Dec 17th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //