Peer to Peer Magazine

December 2009

The quarterly publication of the International Legal Technology Association

Issue link: https://epubs.iltanet.org/i/4983

Contents of this Issue

Navigation

Page 61 of 83

the quarterly magazine of ILTA 63 Peer to Peer Title goes here Nate Smith McKee, Voorhees & Sease, P.L.C. IT Manager Des Moines IA Number Of Attorneys : 16 Number Of Offices : 1 ILTA City Rep, Des Moines; ILTA Open Source Software Steering Committee Member _________________________________________________________ We have started deploying iPhones in my firm using Good Mobile Messaging and the recently released Good Mobile Control for iPhones. Good Mobile Control allows us to turn ActiveSync OFF for all users so as to prevent any unauthorized access to our e-mail server. We then manage authorized iPhone users in the Good Mobile Control administration console, and when a user is added to the console, Good Mobile Control turns on ActiveSync for that user and for that one device. We currently have 16 iPhones deployed, and GMC makes the administration fairly painless. Christopher Hunt Director of Information Technology Tarlow, Breed, Hart & Rodgers, P.C. Boston, MA Number Of Attorneys : 22 Number Of Offices : 1 Follow me on Twitter:http://twitter.com/bren924 _________________________________________________________ We use two-factor authentication for all remote access traffic with the exception of ActiveSync for iPhones. To prevent access to OWA and other Exchange IIS sites directly from outside, we implemented a second IIS site just for ActiveSync, bound to a second IP address on the same box that is open to the outside world. The site is secured with a public certificate for encrytion, and e-mail accounts are ActiveSync disabled by default. This solution has worked out well for us with minium configuration on the iPhones. In addition, we are still able to secure all other traffic with tokens. We are using Exchange 2007. Jeremy Hubel Briggs and Morgan, P.A. Network Administrator St. Paul MN Number Of Attorneys : 175 Number Of Offices : 2 _________________________________________________________ We've found a product called SecureAuth for Cisco IPSEC from a company called MultiFa. I think this will solve our security issue. Now, the remaining issue is the Dead Peer Detection that we've experienced on the iPhone using VPN. From what we understand from Apple, when the iPhone goes to sleep (about two minutes after the screen turns blank), it will lose its connection to the network, and the user must reconnect manually. Janelle Malrick Robins, Kaplan, Miller & Ciresi, L.L.P. Director of IT Minneapolis MN Number Of Attorneys : 275 Number Of Offices : 6 _________________________________________________________ subject: What is your policy on stolen devices? after the recent theft of a couple of iPhone's, i'm wondering if anyone has a policy on what their users should do following a theft. here is my dilemma: the user of one stolen iPhone contacted at&t to have service canceled long before he reported the theft to us. at that point, a wipe of the device was initiated, but of course it was not successful since service had already been disconnected. My concern is that if someone is able to break into the iPhone, they will have access to some e-mail and all of his contacts. some of my users store very personal information in their contacts, like account numbers and passwords. i'm assuming since service was disconnected that the wipe will never succeed. does anyone have a policy on this or advice they would care to share? obviously there is a lot of demand for these devices, and obviously the criminals are able to unlock them before they offer them for sale. is my concern that user data will be exposed when the phone is hacked/unlocked a valid one given that the device was not wiped? bottom line, is it best to have them report thefts to it first so we can verify the device is wiped and then cancel service with the carrier? Tracy Cole Kelly Hart & Hallman LLP Systems Administrator Fort Worth TX Number Of Attorneys : 108 Number Of Offices : 3

Articles in this issue

Links on this page

Archives of this issue

view archives of Peer to Peer Magazine - December 2009