New RSA Research Focuses on Mounting Risks from Mobile Devices
October 11, 2012
By Raju Shanbhag
, TMCnet Contributor
Mobile computing devices and the remote workers who use them are both a bane and a boon to companies. While remote workers, working from the comfort of their homes, usually provide enhanced productivity and decreased overhead costs for the company, they also pose security threats.
These devices often contain sensitive data and are outside the direct supervision of the network administrators.
RSA, The Security Division of EMC (News - Alert), decided to pitch in with a report on this issue. The report focuses on the increasing use of consumer mobile devices in the enterprise. It also shares insights by experts on how to manage those devices.
Often, companies find it hard to keep pace with the flurry of new mobile devices introduced in the market. As a result, there are loopholes in the company’s security system which can result in disastrous consequences, if it is exploited by the hackers.
As an increasing number of mobile devices access a company’s network, the chance of data leakage is higher than ever before.
“With the prevalence of mobile devices and applications, organizations have huge opportunities to create business value, but the accompanying risks are equally huge,” said Art Coviello, executive vice president of EMC and executive chairman for RSA (News - Alert). “This new report from the Security for Business Innovation Council provides strategic guidance that helps organizations not only reduce their mobile liabilities but also foster mobile programs that enable them to realize the full benefits of the mobile enterprise.”
Recently, the company introduced an innovative new technology created to safeguard passwords and other credentials and secrets stored in databases from cyber attacks. RSA Distributed Credential Protection offers scramble, randomize and split secrets and authentication credentials into two separate locations.
RSA Distributed Credential Protection is created to considerably decrease the likelihood of successful “smash-and-grab” attacks on password servers.
Edited by Braden Becker