Security issues and the relative novelty of the technology have Interop NY attendees worried about the impact of mobile device use in the enterprise. MORE INTEROP: Data center operators in for a world of changeTroy Reid, marketing director for Metropolitan Website Design, says that mobile infrastructure is the main reason he came to the conference.“That’s what I’m here to learn more about, because I’m a little bit behind the times and our hardware’s really outdated. My task is to get us back on track,” Reid says. Other attendees, like Alan Maendel of Community Products, seem to simply wish the problem would go away.“I would say, maybe leave the devices at home? That would definitely solve the security headaches back at the office. But if that’s necessary, just get the best protection that you can, and make it clear to the employees what the limits are.” However, Liberty Mutual technologist William Wong says there’s no way to simply bury one’s head in the sand — not that this stops businesses, particularly in tightly regulated industries, from trying to do so.“”It’s inevitable that you will have to support mobile devices … however, heavily regulated industries do actually have specific policies. There are actually companies out there where it’s a fireable offense to bring a smartphone in,” he says.Frank Tobias, who works for Automatic Data Processing, concurs with Wong’s take on strict privacy controls.“Especially with my company, security is a big issue. We deal with sensitive personal data,” he says.TRG Management’s Mario Agoursalidis argues that centralization would be an important consideration for those dealing with BYOD.“”Have an infrastructure capable of handling all these devices — a one-stop appliance … able to handle any device the user brings in,” he urges. “That would be ideal. This way, the tech team wouldn’t have to deal with multiple appliances.” Email Jon Gold at jgold@nww.com and follow him on Twitter at @NWWJonGold.Read more about anti-malware in Network World’s Anti-malware section. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe