A somewhat rhetorical question really. Much like which came first, the chicken or the egg. In his ThreatPost article, George Hulme highlights the challenges and risks associated with allowing consumer-owned devices (phones, laptops, netbooks, tablets) onto corporate networks.
Realistically, consumer devices and applications are both high risk with the devices presenting slightly less risk than the personal applications (social networking, webmail, IM, media, etc) that are in use. Several reasons for this line of thinking:
The edge in terms of greater business and security risk: applications, but only by a photo finish. Now the question is, which would be easier to control and secure the network against. The winner again would be the applications because IT owns the network and they can apply (using Palo Alto Networks) application usage policies (as recommended in the article) that securely enable applications by:
By exerting control over the network, the applications that run on it, then IT can help mitigate the risks of personal devices as well as personal applications (used often for business), without hindering the business (or getting fired for blocking Gmail for an Executive VP).
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.