Found this and I am floored :

http://forums.t-mobile.com/tmbl/board/message?board.id=WinMoLounge&message.id=144

Enter your cut contents here.
This just staggers me, even though so many IT managers do it today. Why would someone who is supposedly in charge of (and therefore have to underwrite) security.

How would I handle this situation, the way I did at a previous job. I bought a lot of 5 unlocked tytn2's (which we deemed capable) from a reputable supplier who gave us three year hardware, with a slight addition of upgrade and OS wipes at our request. The phones seem to have everything we needed, relatively strong security capability, in our own control, expansion capability, and most importantly quadband

Need 1. Superior service in Germany, Canada, US, Japan, Switzerland, and Hungary. Done, high-quality quad band radio paired with T-mobile US and T-Mobile Deutchland gave us 3.5 G speeds in most countries only the smallest drop out spots. Far in excess of coverage maps due the higher than subsidized radio quality.

Need 2. Integration with email. Exchange integration and beyond allowed us to roll out configuration as well as saftey mechanism, often with the help of T-mobile network configurations. 4GB microSD cards provide encryption security as well as storage space through AD configurations

Need 3. Control & Security. HTC's PRO OS and UI not only makes Windows Mobile easy to use but easy to configure through the use of Microsoft provided tools. The phones due pseudo-push, they get notification of messages and then make a secure connection to our servers (which

Need 4. Easy backup and applications. Throuhj a combination of Sprite Tools and Enterprise level Microsoft applications, this was easily accomplished.


Bottom line, it takes a bit of knowledge and extra money up front but in the long run the company will not have its hands tied. We also don't have to worry about the significantly lower quality radios and other hardware often found in carrier branded equipment (use to leverage lower prices). Note that an AT&T Tilt, is not the Same as an HTC Kaiser. Approximately 350 dollars has been shaved off the wholesale price through hardware removals, hardware replacements, and AT&T using a very buggy AT&T version of Windows Mobile that doesn't even properly support Exchange without either using a side deal with AT&T or removing software from the phone.

-------------------------------------------------------------------


First comment I usually hear to this is : use Blackberry. My answer to this is no. Once again there is a loss of control. All email on Blackberry devices are copied (either via imap or more securely buying RIM's exchange/lotus addon program) to RIM's servers in Waterloo., and then pushed on to your phones. There are contracts that claim they won't be read, but I can't guarantee that. I don't know if I can trust their encryption or their word.

Knowing two family members that work there and stories told, security is not really something well practiced at RIM. Additionally, China made it very clear that it will not allow Blackberry devices for sale in China unless it has a way to monitor communications at it's whim. A number of countries also makes these same restrictions. There have been rumors of a program being developed internally at RIM to bypass the encryption specifically for their government entities. Then a few months after these rumors and about a year ago, China authorised the sale of Blackberry devices, which speaks volumes to the security minded.

Second comment. Well iPhone offers exchange support now. Yes, its also locked down as heck and any design change has to be jailbreaked or made with uncle Stevie's permission. Add to this the inherent known design (not code, design) flaws made in the networking stack authentication scheme of all OS products so far ... as well as a handful of other security questions ... highly unlikely that I would ever consider iPhone connections. An operating system that is still vulnerable to an attack using windows 95 and third-party freeware is to disturbing to ignore. For more information, please see any of a number of Marc Maiffret's interviews, specifically in regards to Apple and its stance on security being a marketing issue, reminiscnet of a 1980's Microsoft.

 
Tags:
From:
Anonymous( )Anonymous This account has disabled anonymous posting.
OpenID( )OpenID You can comment on this post while signed in with an account from many other sites, once you have confirmed your email address. Sign in using OpenID.
User
Account name:
Password:
If you don't have an account you can create one now.
Subject:
HTML doesn't work in the subject.

Message:

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org


 
Notice: This account is set to log the IP addresses of everyone who comments.
Links will be displayed as unclickable URLs to help prevent spam.
.

Most Popular Tags

Powered by Dreamwidth Studios

Style Credit

Expand Cut Tags

No cut tags