Most Common Types of Security Used in the Enterprise
As with previous questions relating to connectivity/data access, responses to the various types of security in enterprise usage were cross-tabulated by developer type; corporate enterprise or independent. Overall, the disparities between corporate and independent wireless developers are reasonably similar with the exception of a few cases.
Figure 5. Types of Security: This graph shows the various types of security in enterprise usage.
Figure 6. The Question: Which of the following security mechanisms would you be most likely to use in your wireless apps?
Independent developers are far more likely to use SSL/TLS secure channel encryption, which is supported by the vast portion of this segment which chose "Encryption of data before it is sent."
Wireless developers who identified themselves within the corporate enterprise sub-group we most likely to use "Digital Signatures," "VPN," and "Public Key Infrastructure" mechanisms in their solution designs.
How Many Tiers in Enterprise Wireless Apps?
When our survey group was divided into corporate enterprise and independent segments, we cross-tabulated the preferred tiered design choices used in wireless applications architectures. Overall, the divergence was not large, except in a few areas.
Corporate enterprise developers prefer three-tied designs over any other type, by a margin of 12 pointsquite a noticeable split. This can be directly linked to the long-term and successful push from various enterprise platformscorporate developers are very comfortable with this architectural design paradigm.
The largest disparity is the answers in the "Don't Know" category. Nearly three times as many independent wireless software developers do not know how many tiers will be in use. This is not due to a lack of technical expertise, but is mainly attributable to the consultative, client-driven nature their application designs.
Figure 7. Number of Tiers in Enterprise Wireless Apps: The graph shows the preferred tiered design choices used in wireless applications architectures.
Figure 8. The Question: How many tiers will be in your wireless architecture?