security and enter price

3

Click here to load reader

Upload: rajunair

Post on 30-May-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security and Enter Price

8/14/2019 Security and Enter Price

http://slidepdf.com/reader/full/security-and-enter-price 1/3

 

Wireless Data Shot: Security and the EnterpriseWhat is the main barrier to wireless security adoption? What kinds of wireless security would other developers be most likely to use? What is being used in the enterprise? Find out how your colleagues answered these questions in a recent survey by Evans Data Corp.

October 14, 2004

he Evans Wireless Development Survey is adetailed report of extensive, in-depth interviewswith almost 500 developers active in wirelessapplication or infrastructure development. It wasconducted in the Fall of 2004. All text andanalysis herein provided by Evans Data.

Barriers of Adoption: Security When wireless developers were asked theiropinion on whether or not security was a someform of barrier to widespread adoption of mobiledevices and services, 85 percent felt that it was.Evans Data respectfully disagrees with thisopinion, theorizing that the vast majority of

consumers care more about the "gee-whiz" factorof their wireless devices than security.

The main problem with wireless networks is that most areunprotected. The simple fact is that 70 percent of wi-fi networks don'tmake use of such readily available security offerings like WEP.Those exposed networks are easily exploited by the unscrupulous.

The average user is extremely pleased if they can get devices frommultiple vendors working at all, let alone securely. If the widespreadconsumer base was concerned about security, the current plagues of

email "virii" that are dependant on opening attachments simply wouldnot be possible.

The Type of Security Mechanism that Will Be the Most Common Currently, there is no clear technology leader in the mobile andwireless space with regard to the security mechanism developerschoose when building applications. Additionally, unless a developerspecializes in security, there can be definite overlap in their selection. For example, choosing PKI does notrule out the usage of SSL, digital signatures, and data encryption mechanisms.

Figure 1. The Barriers: This graph shows howmany developers thought that security was asome form of barrier to widespread adoption ofmobile devices and services.

 

Figure 2. The Question: For mobiledevices/services, what is your perceptionof the following barriers of adoption?

Figure 3. Most Common SecurityMechanism: This graph shows the typeof security mechanism that will be themost common.

Page 1 of 3Wireless Data Shot: Security and the Enterprise

11-Dec-07http://www.devx.com/wireless/Article/22160/1763/page/1

Page 2: Security and Enter Price

8/14/2019 Security and Enter Price

http://slidepdf.com/reader/full/security-and-enter-price 2/3

They are all interrelated and supportive of each other. SSL relies ondigitally signed certificates provided by a trusted third-party PKIcertifying authority, which enables encrypted data channels andallows for safe user authentication for Web login scenarios.

PKI ranks first in usage by 15 percent of wireless developerssurveyed, followed shortly by SSL/TLS. When the two options are

combined, PKI/SSL solutions are selected by just under a third of alldevelopers surveyed. Vying for third-place, userauthentication/password protection, WAP 2.0 security, and digitalsignatures are each selected by one out of 10 respondents.

On the next page, we'll look beyond speculation and find out whatsecurity mechanisms developers are actually *using* in theirenterprises.

Page 1 of 2  

Figure 4. The Question: Which of thefollowing security mechanisms would yoube most likely to use on your wirelessapps?

 

Navigating Your IT Career A career in information technology usually has its share of ups and

downs. Download this Internet.com eBook to learn where the jobs are

in IT, how to negotiate a salary, and helpful advice on job security and

how to deal with a layoff. » 

Locking Down Your Wireless NetworkChanging the default SSID or disabling SSID broadcasting are two of

the most popular ways to help secure a wireless network, but by no

means do they provide adequate security. Learn how to use

encryption, VPNs, and basic laptop and PC security to keep your

network and machines safe. » 

Evaluating Software as a Service for Your Business Is Software as a Service just hype, or is something really going on

here? And if there is fuel behind these flames, what's different? Why

has a model that languished for a decade suddenly gained steam?

Download this eBook to see if your company can benefit as SaaS tries

to change the face of the enterprise. » 

The State of Storage VirtualizationVirtualization has been something of a buzzword in storage for more

than half a decade. It is defined in a variety of ways, depending on

whom you ask. So what exactly is it? And how should it be

implemented? This eBook from our editors at

EnterpriseStorageForum.com and Internet.com explores some of thesecond-generation storage virtualization products from a number of

vendors and compares their approaches. » 

Waging the War Against Spam Businesses spend a whopping $712 per worker, per year, in the battle

against spam, but there doesn't seem to be any easy answers to the

problem. Download this eBook to see what your IT department can do

to reduce the nuisance of spam, and for tips on how your users can

help you fight the battle. » 

Page 2 of 3Wireless Data Shot: Security and the Enterprise

11-Dec-07http://www.devx.com/wireless/Article/22160/1763/page/1

Page 3: Security and Enter Price

8/14/2019 Security and Enter Price

http://slidepdf.com/reader/full/security-and-enter-price 3/3

 

Next Page: Most Common Types of Security Used in

the Enterprise

Page 1: IntroductionPage 2: Most Common Types of Security Used in theEnterprise

Page 3 of 3Wireless Data Shot: Security and the Enterprise

11-Dec-07http://www devx com/wireless/Article/22160/1763/page/1