Traveling professionals use a variety of mobile tools — cell phones, laptop computers, GPSdevices and PDAs. These devices increase productivity, but they also create security challenges for firms and companies. How can network administrators secure the various entry points?

Admittedly, it is virtually impossible to keep track of all devices and ensure everyone is in compliance with your policies. The broad answer is that your IT department must assess each specific risk, and then implement security systems, policies and procedures to take advantage of the latest technologies and maximize remote access capabilities.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]