Mobile Internet Devices and Secure Guest Access (SGA & MID)
5th Oct 2016
Mobile Internet Devices and Secure Guest Access (SGA & MID)
The emergence of Mobile Internet Devices (MID) has generated a lot of interest in the consumer market. They are essentially devices that fuse the power and features inherent in laptops, with the portability of smart phones; add to that a much larger screen, and what you have is basically a nice blend between mobility and power. Every day the technology which drives MID's expands as well; it's more or less a given that every year, new tech advancements will push these devices to even greater heights. In fact, at the current rate of technological growth, newer devices and/or upgrades may in fact soon become a near monthly occurrence; that's how much exponential growth is occurring in the mobile computing industry right now. It's quite an interesting paradigm; phones are trying to imitate computers, and computers are trying to shrink down to the size of phones. For many businesses throughout the world (especially in the realm of healthcare), the combination of a smart phone and a tablet have made laptops/computers somewhat archaic.
Mobile internet devices are a unique development in that they actually employ elements of both traditional and cloud computing. While MID's are smaller devices containing their own powerful components, they are also designed to take advantage of a range of internet-based applications, similar to the way that cloud computing works. In many ways, mobile internet devices are transitional, as they mark a mid-way point between traditional computing models and the cloud.
Secure Guest Access and MID's
One of the (if not most) important concerns among mobile internet device users is security. Users often wonder if their information and/or connection to a network are truly secure. This is a very important concern for users of mobile internet devices because these individuals often have very important data stored on their machines.
Keep in mind that all data that is transferred between host and user is normally encrypted to an acceptable industry standard via some type of cryptographic security measure(s). If a Wi-Fi connection is not protected in this manner, you are taking a risk in using it. While it is possible for someone to intercept your data with these security measures in place, the dense encryption would take an extremely powerful system to decode it and that would also require time as well. Since most respectable networks have managers or security bots monitoring all activities (often both), serious data thieves are often apprehended long before they have time to decrypt their stolen files.
How SGA works
A dedicated managed wireless connection requires that each individual user possess an encryption key for network access. More often than not you will be directed first to a splash page that either provides you with a key, or asks you to input one. The key itself may be provided automatically or person-to-person via direct interaction between you and the network manager or a liaison. In this way, only the device which is logged on using a specific key will be able to access and transfer data over the connection.
For cloud computing scenarios where devices like tablets are to be deployed, secure guest access is an absolute necessity. Large businesses and corporations are usually the first to implement new technologies like cloud-enabled mobile internet devices, and they often use them in situations where sensitive or valuable data is processed and/or stored. As a result, the implementation of strict SGA guidelines is even more important. These types of scenarios usually necessitate the appointment of an individual or small team whose job is to strictly monitor any and all connections to the central hardware stack. In addition to working with employees face-to-face they may also employ any and all manner of automated or virtualized process to monitor the infrastructure of a cloud, including all connections to it.
Mobile Internet Devices and User Fears
There may be a somewhat disproportionate number of individuals that are living in fear of implementing MID's in their own lives and/or business processes. Somehow, the idea that anything connected to a wireless portal is dangerous or 'not secure', has worked its way into the collective consciousness of the public. This is likely due to the increased prevalence of Wi-Fi hotspots that seem to be springing up nearly everywhere you look. It would be foolish to assume that heavily used and populated wireless centers are completely secure and without fault, however you also have to ask the question, 'Who in their right mind would use one of these portals to send or receive sensitive data?' The average Wi-Fi hotspot is implemented with the average consumer in mind, who might chat, watch videos, blog or surf the net. Those who use the mobile internet devices mostly for work would do well to shy away from using them in popular spots, and should consider adding a second device specifically for that purpose, if desired.
The emergence of Mobile Internet Devices (MID) has generated a lot of interest in the consumer market. They are essentially devices that fuse the power and features inherent in laptops, with the portability of smart phones; add to that a much larger screen, and what you have is basically a nice blend between mobility and power. Every day the technology which drives MID's expands as well; it's more or less a given that every year, new tech advancements will push these devices to even greater heights. In fact, at the current rate of technological growth, newer devices and/or upgrades may in fact soon become a near monthly occurrence; that's how much exponential growth is occurring in the mobile computing industry right now. It's quite an interesting paradigm; phones are trying to imitate computers, and computers are trying to shrink down to the size of phones. For many businesses throughout the world (especially in the realm of healthcare), the combination of a smart phone and a tablet have made laptops/computers somewhat archaic.
Mobile internet devices are a unique development in that they actually employ elements of both traditional and cloud computing. While MID's are smaller devices containing their own powerful components, they are also designed to take advantage of a range of internet-based applications, similar to the way that cloud computing works. In many ways, mobile internet devices are transitional, as they mark a mid-way point between traditional computing models and the cloud.
Secure Guest Access and MID's
One of the (if not most) important concerns among mobile internet device users is security. Users often wonder if their information and/or connection to a network are truly secure. This is a very important concern for users of mobile internet devices because these individuals often have very important data stored on their machines.
Keep in mind that all data that is transferred between host and user is normally encrypted to an acceptable industry standard via some type of cryptographic security measure(s). If a Wi-Fi connection is not protected in this manner, you are taking a risk in using it. While it is possible for someone to intercept your data with these security measures in place, the dense encryption would take an extremely powerful system to decode it and that would also require time as well. Since most respectable networks have managers or security bots monitoring all activities (often both), serious data thieves are often apprehended long before they have time to decrypt their stolen files.
How SGA works
A dedicated managed wireless connection requires that each individual user possess an encryption key for network access. More often than not you will be directed first to a splash page that either provides you with a key, or asks you to input one. The key itself may be provided automatically or person-to-person via direct interaction between you and the network manager or a liaison. In this way, only the device which is logged on using a specific key will be able to access and transfer data over the connection.
For cloud computing scenarios where devices like tablets are to be deployed, secure guest access is an absolute necessity. Large businesses and corporations are usually the first to implement new technologies like cloud-enabled mobile internet devices, and they often use them in situations where sensitive or valuable data is processed and/or stored. As a result, the implementation of strict SGA guidelines is even more important. These types of scenarios usually necessitate the appointment of an individual or small team whose job is to strictly monitor any and all connections to the central hardware stack. In addition to working with employees face-to-face they may also employ any and all manner of automated or virtualized process to monitor the infrastructure of a cloud, including all connections to it.
Mobile Internet Devices and User Fears
There may be a somewhat disproportionate number of individuals that are living in fear of implementing MID's in their own lives and/or business processes. Somehow, the idea that anything connected to a wireless portal is dangerous or 'not secure', has worked its way into the collective consciousness of the public. This is likely due to the increased prevalence of Wi-Fi hotspots that seem to be springing up nearly everywhere you look. It would be foolish to assume that heavily used and populated wireless centers are completely secure and without fault, however you also have to ask the question, 'Who in their right mind would use one of these portals to send or receive sensitive data?' The average Wi-Fi hotspot is implemented with the average consumer in mind, who might chat, watch videos, blog or surf the net. Those who use the mobile internet devices mostly for work would do well to shy away from using them in popular spots, and should consider adding a second device specifically for that purpose, if desired.
+++
Would you like to learn more about Cloud Computing and how to manage your IT Service through Cloud technology? Sign up for our Cloud Computing Foundation Program. Now also available for iPad and iPhone.