Scott Yelich, a Unix administrator at a large Wall Street investment banking firm, attended the exhibition to search for Unix and Linux security products. But he was also looking for technology that secures mobile devices, he said. Holding out his . . .
Scott Yelich, a Unix administrator at a large Wall Street investment banking firm, attended the exhibition to search for Unix and Linux security products. But he was also looking for technology that secures mobile devices, he said. Holding out his BlackBerry pager, by Research In Motion Ltd., Yelich noted that the device can be programmed to send instructions back to his computer at work via e-mail, but his company does not currently use products that would spot such activity, which could be used to launch attacks or spread infections.

The sheer number of new security products and mobile computing devices that companies are deploying is forcing changes in the way network security administrators manage security, said Lance Braunstein, chief information security officer at Morgan Stanley Dean Whitter & Co., who gave a presentation on the best security practices.

The link for this article located at InfoWorld is no longer available.