06-05-2009, 10:39 PM
Join Date: Jun 2009
Post Thanks: 0
Thanked 0 Times in 0 Posts
| | Best Practices: Security and Blackberry Devices
Please Login to Remove!
I have read books that deal with security and blackberry. The topics discuss device security and server security and range from conservative to liberal in terms of security. One view was to split up the services offered by the BES into different servers. This would allow you to put services that needed to touch the outside world into your DMZ and keep the rest within your corporate lan. We are going to opt to put the entire server in the DMZ to avoid the headache of splitting the BES server apart.
Device security, on the other hand, we are not so sure upon. There is a list of things we need to make a decision on. Ultimately I just need to go through the list and choose, however, I am not sure what the best practices are that seem to make both the end user and the sys admin happy.
How do you administer your companies IT policy to your end users? Do you even use an IT policy? Do you push all Blackberry traffic through your BES or do you let it go straight out to the internet? Passwords? Third-party apps? Bluetooth? And the list goes on...
Lastly, is there a resource that I can goto to view best practices for IT policy on Blackberry handhelds?