• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Security And Enterprice

Security And Enterprice






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Security And Enterprice Security And Enterprice Document Transcript

    • Wireless Data Shot: Security and the Enterprise Page 1 of 3 Wireless Data Shot: Security and the Enterprise What is the main barrier to wireless security adoption? What kinds of wireless security would other developers be most likely to use? What is being used in the enterprise? Find out how your colleagues answered these questions in a recent survey by Evans Data Corp. October 14, 2004 he Evans Wireless Development Survey is a detailed report of extensive, in-depth interviews with almost 500 developers active in wireless application or infrastructure development. It was conducted in the Fall of 2004. All text and analysis herein provided by Evans Data. Barriers of Adoption: Security When wireless developers were asked their opinion on whether or not security was a some form of barrier to widespread adoption of mobile devices and services, 85 percent felt that it was. Evans Data respectfully disagrees with this opinion, theorizing that the vast majority of consumers care more about the quot;gee-whizquot; factor of their wireless devices than security. Figure 1. The Barriers: This graph shows how Figure 2. The Question: For mobile many developers thought that security was a devices/services, what is your perception some form of barrier to widespread adoption of of the following barriers of adoption? mobile devices and services. The main problem with wireless networks is that most are unprotected. The simple fact is that 70 percent of wi-fi networks don't make use of such readily available security offerings like WEP. Those exposed networks are easily exploited by the unscrupulous. The average user is extremely pleased if they can get devices from multiple vendors working at all, let alone securely. If the widespread consumer base was concerned about security, the current plagues of email quot;viriiquot; that are dependant on opening attachments simply would not be possible. The Type of Security Mechanism that Will Be the Most Common Figure 3. Most Common Security Mechanism: This graph shows the type Currently, there is no clear technology leader in the mobile and of security mechanism that will be the wireless space with regard to the security mechanism developers most common. choose when building applications. Additionally, unless a developer specializes in security, there can be definite overlap in their selection. For example, choosing PKI does not rule out the usage of SSL, digital signatures, and data encryption mechanisms. http://www.devx.com/wireless/Article/22160/1763/page/1 11-Dec-07
    • Wireless Data Shot: Security and the Enterprise Page 2 of 3 They are all interrelated and supportive of each other. SSL relies on digitally signed certificates provided by a trusted third-party PKI certifying authority, which enables encrypted data channels and allows for safe user authentication for Web login scenarios. PKI ranks first in usage by 15 percent of wireless developers surveyed, followed shortly by SSL/TLS. When the two options are combined, PKI/SSL solutions are selected by just under a third of all developers surveyed. Vying for third-place, user authentication/password protection, WAP 2.0 security, and digital signatures are each selected by one out of 10 respondents. Figure 4. The Question: Which of the following security mechanisms would you On the next page, we'll look beyond speculation and find out what be most likely to use on your wireless apps? security mechanisms developers are actually *using* in their enterprises. Page 1 of 2 Navigating Your IT Career A career in information technology usually has its share of ups and downs. Download this Internet.com eBook to learn where the jobs are in IT, how to negotiate a salary, and helpful advice on job security and how to deal with a layoff. » Locking Down Your Wireless Network Changing the default SSID or disabling SSID broadcasting are two of the most popular ways to help secure a wireless network, but by no means do they provide adequate security. Learn how to use encryption, VPNs, and basic laptop and PC security to keep your network and machines safe. » Evaluating Software as a Service for Your Business Is Software as a Service just hype, or is something really going on here? And if there is fuel behind these flames, what's different? Why has a model that languished for a decade suddenly gained steam? Download this eBook to see if your company can benefit as SaaS tries to change the face of the enterprise. » The State of Storage Virtualization Virtualization has been something of a buzzword in storage for more than half a decade. It is defined in a variety of ways, depending on whom you ask. So what exactly is it? And how should it be implemented? This eBook from our editors at EnterpriseStorageForum.com and Internet.com explores some of the second-generation storage virtualization products from a number of vendors and compares their approaches. » Waging the War Against Spam Businesses spend a whopping $712 per worker, per year, in the battle against spam, but there doesn't seem to be any easy answers to the problem. Download this eBook to see what your IT department can do to reduce the nuisance of spam, and for tips on how your users can help you fight the battle. » http://www.devx.com/wireless/Article/22160/1763/page/1 11-Dec-07
    • Wireless Data Shot: Security and the Enterprise Page 3 of 3 Next Page: Most Common Types of Security Used in the Enterprise Page 2: Most Common Types of Security Used in the Page 1: Introduction Enterprise http://www.devx.com/wireless/Article/22160/1763/page/1 11-Dec-07