Protecting Sensitive Business Data on the iPad

26.03.2010
The Apple iPad is coming, and--thanks primarily to the iPhone revolution--it is guaranteed to break out of its consumer-oriented shackles and . A quote from Star Trek: The Next Generation comes to mind: "Resistance is futile." Your business data will be assimilated.

Despite the fact that Apple has targeted the built for media consumption, emerging polls suggest that leading reason that consumers want the iPad is , with media consumption and game playing not far behind.

Why not? Notebook computers are heavy and unwieldy by comparison. The iPad is perfectly capable of s that roaming workers need it to, and it can do it on a device that is intuitive and instant-on. It delivers a multitouch interface with 10 hours of battery life on a device that can is functional even one-handed.

Andrew Storms, Director of Security Operations for , emailed to share his thoughts on the iPad in the enterprise. "The biggest question I have about the iPad concerns how it will be used. Either people will use it as a laptop replacement or they will use it as supplementary tool in a few specific situations."

Storms clarified his concerns "This has everything to do with what kind of data ends up on the device and that's the real concern for enterprise security. How enterprises treat the iPad from a policy perspective depends completely on what kind of data is on the device."

Businesses and IT administrators have reason to be concerned, too. At the CanSecWest conference in Vancouver this week, a pair of security researchers was able to in a matter of seconds--accessing the data contained on the hacked iPhone. The iPad is built on the same iPhone OS that was hacked.