Login | Register   
LinkedIn
Google+
Twitter
RSS Feed
Download our iPhone app
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX


advertisement
 

Wireless Data Shot: Security and the Enterprise : Page 2

What is the main barrier to wireless security adoption? What kinds of wireless security would other developers be most likely to use? What is being used in the enterprise? Find out how your colleagues answered these questions in a recent survey by Evans Data Corp.


advertisement
Most Common Types of Security Used in the Enterprise
As with previous questions relating to connectivity/data access, responses to the various types of security in enterprise usage were cross-tabulated by developer type; corporate enterprise or independent. Overall, the disparities between corporate and independent wireless developers are reasonably similar with the exception of a few cases.


Figure 5. Types of Security: This graph shows the various types of security in enterprise usage.
 
Figure 6. The Question: Which of the following security mechanisms would you be most likely to use in your wireless apps?

Independent developers are far more likely to use SSL/TLS secure channel encryption, which is supported by the vast portion of this segment which chose "Encryption of data before it is sent."



Wireless developers who identified themselves within the corporate enterprise sub-group we most likely to use "Digital Signatures," "VPN," and "Public Key Infrastructure" mechanisms in their solution designs.

How Many Tiers in Enterprise Wireless Apps?
When our survey group was divided into corporate enterprise and independent segments, we cross-tabulated the preferred tiered design choices used in wireless applications architectures. Overall, the divergence was not large, except in a few areas.

Corporate enterprise developers prefer three-tied designs over any other type, by a margin of 12 points—quite a noticeable split. This can be directly linked to the long-term and successful push from various enterprise platforms—corporate developers are very comfortable with this architectural design paradigm.

The largest disparity is the answers in the "Don't Know" category. Nearly three times as many independent wireless software developers do not know how many tiers will be in use. This is not due to a lack of technical expertise, but is mainly attributable to the consultative, client-driven nature their application designs.


Figure 7. Number of Tiers in Enterprise Wireless Apps: The graph shows the preferred tiered design choices used in wireless applications architectures.
 
Figure 8. The Question: How many tiers will be in your wireless architecture?



Comment and Contribute

 

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

 

Sitemap
Thanks for your registration, follow us on our social networks to keep up-to-date