A short and simple example is the question of company provided versus "bring 
your own"

If you allow the users to provide their own, you have no control over what they 
put on them or bring into your network.   

Keep in mind this my lack of caffeine scraggily memory but there was a recent 
event of an attack via PDF.

There are solutions such as in my case you can isolate them by giving them 
their own network and use citrix to grant them access to stuff.

What about company confidential files?   iPad gets stolen.....

They are very useful tools but if somebody says "just give them wireless 
access" you could very well regret that.....

-----Original Message-----
From: Terry Dickson [mailto:te...@treasurer.state.ks.us] 
Sent: Tuesday, August 23, 2011 11:12 AM
To: NT System Admin Issues
Subject: RE: Apple newbie - iPad remote access to server shares

What about the point I might have missed in this discussion on Security.  I do 
not have any experience with an Ipad, but I hear they are HUGE Security Risks.  
I have heard this more than once, and I would like to know more on why.  It is 
not that I do not believe the people telling me that, however they did not 
provide the facts as to why.  Does anyone know why they are considered security 
risks?


________________________________________
From: Michael White [mswhite...@gmail.com]
Sent: Tuesday, August 23, 2011 1:00 PM
To: NT System Admin Issues
Subject: Re: Apple newbie - iPad remote access to server shares

> At this point, I'd settle for ANY reason other than "but all the cool people
> have an iPad!"  :-)

Why wait for others to tell you what reasons they could use the
devices.  As IT Pros, I believe it is part of our job to have the
foresight and leadership to be able to introduce new technology within
our organizations and how it can be used by our users.

As far as the concern that there are not the apps or tools to be able
to support them; how about building them?  Sounds to me that there is
a great opportunity for some developer on this list to create a set of
tools and, potentially make some money.

Michael.

--
--
Michael S. White
mswhite...@gmail.com

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin
________________________________
 CONFIDENTIALITY NOTICE: This e-mail and any attachments are confidential. If 
you are not the intended recipient, you do not have permission to disclose, 
copy, distribute, or open any attachments. If you have received this e-mail in 
error, please notify us immediately by returning it to the sender and delete 
this copy from your system.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to