Quote:
Originally Posted by s_wilwerding
The biggest item on our 5-year IT plan is to get as much of our IT infrastructure as possible accessible via mobile devices. More and more of our folks carry nothing but iPads/iPhones anymore (very few laptops when traveling), and even within the building, people don't necessarily use their laptops/desktops.
|
Those are one form of access to be concerned with, you should however be planning for an access solution that includes those items, and others as well. Build a virtualized back end desktop/server environment, move apps off the mobile devices and the desktops and laptops and put them in hypervisor. For security reasons you want one application on your mobile devices, and it should be a gateway to your back end environment.
Best to have your users have absolutely no access to anything on their device at all. It stops security issues and unintended malicious activity dead in its tracks. If they need mail, run it on the server as a published thin application, same with any app.
Phone calls, email, and all apps should be inside a controlled sphere. When one of our users places a phone call on his iphone, it goes though our system and is tracked and recorded, same with any of their data as well. If the user loses the device we destroy it remotely and the beauty is that none of his info was ever on the device.