Wireless Data Shot: Security and the Enterprise Page 1 of 3
Wireless Data Shot: Security and the Enterprise
What is the main barrier to wireless security adoption? What kinds of wireless security would
other developers be most likely to use? What is being used in the enterprise? Find out how your
colleagues answered these questions in a recent survey by Evans Data Corp.
October 14, 2004
he Evans Wireless Development Survey is a
detailed report of extensive, in-depth interviews
with almost 500 developers active in wireless
application or infrastructure development. It was
conducted in the Fall of 2004. All text and
analysis herein provided by Evans Data.
Barriers of Adoption: Security
When wireless developers were asked their
opinion on whether or not security was a some
form of barrier to widespread adoption of mobile
devices and services, 85 percent felt that it was.
Evans Data respectfully disagrees with this
opinion, theorizing that the vast majority of
consumers care more about the quot;gee-whizquot; factor
of their wireless devices than security.
Figure 1. The Barriers: This graph shows how Figure 2. The Question: For mobile
many developers thought that security was a devices/services, what is your perception
some form of barrier to widespread adoption of of the following barriers of adoption?
mobile devices and services.
The main problem with wireless networks is that most are
unprotected. The simple fact is that 70 percent of wi-fi networks don't
make use of such readily available security offerings like WEP.
Those exposed networks are easily exploited by the unscrupulous.
The average user is extremely pleased if they can get devices from
multiple vendors working at all, let alone securely. If the widespread
consumer base was concerned about security, the current plagues of
email quot;viriiquot; that are dependant on opening attachments simply would
not be possible.
The Type of Security Mechanism that Will Be the Most Common Figure 3. Most Common Security
Mechanism: This graph shows the type
Currently, there is no clear technology leader in the mobile and
of security mechanism that will be the
wireless space with regard to the security mechanism developers
choose when building applications. Additionally, unless a developer
specializes in security, there can be definite overlap in their selection. For example, choosing PKI does not
rule out the usage of SSL, digital signatures, and data encryption mechanisms.
Wireless Data Shot: Security and the Enterprise Page 2 of 3
They are all interrelated and supportive of each other. SSL relies on
digitally signed certificates provided by a trusted third-party PKI
certifying authority, which enables encrypted data channels and
allows for safe user authentication for Web login scenarios.
PKI ranks first in usage by 15 percent of wireless developers
surveyed, followed shortly by SSL/TLS. When the two options are
combined, PKI/SSL solutions are selected by just under a third of all
developers surveyed. Vying for third-place, user
authentication/password protection, WAP 2.0 security, and digital
signatures are each selected by one out of 10 respondents.
Figure 4. The Question: Which of the
following security mechanisms would you
On the next page, we'll look beyond speculation and find out what be most likely to use on your wireless
security mechanisms developers are actually *using* in their
Page 1 of 2
Navigating Your IT Career
A career in information technology usually has its share of ups and
downs. Download this Internet.com eBook to learn where the jobs are
in IT, how to negotiate a salary, and helpful advice on job security and
how to deal with a layoff. »
Locking Down Your Wireless Network
Changing the default SSID or disabling SSID broadcasting are two of
the most popular ways to help secure a wireless network, but by no
means do they provide adequate security. Learn how to use
encryption, VPNs, and basic laptop and PC security to keep your
network and machines safe. »
Evaluating Software as a Service for Your Business
Is Software as a Service just hype, or is something really going on
here? And if there is fuel behind these flames, what's different? Why
has a model that languished for a decade suddenly gained steam?
Download this eBook to see if your company can benefit as SaaS tries
to change the face of the enterprise. »
The State of Storage Virtualization
Virtualization has been something of a buzzword in storage for more
than half a decade. It is defined in a variety of ways, depending on
whom you ask. So what exactly is it? And how should it be
implemented? This eBook from our editors at
EnterpriseStorageForum.com and Internet.com explores some of the
second-generation storage virtualization products from a number of
vendors and compares their approaches. »
Waging the War Against Spam
Businesses spend a whopping $712 per worker, per year, in the battle
against spam, but there doesn't seem to be any easy answers to the
problem. Download this eBook to see what your IT department can do
to reduce the nuisance of spam, and for tips on how your users can
help you fight the battle. »
Wireless Data Shot: Security and the Enterprise Page 3 of 3
Next Page: Most Common Types of Security Used in
Page 2: Most Common Types of Security Used in the
Page 1: Introduction