Wireless Data Shot: Security and the Enterprise

Wireless Data Shot: Security and the Enterprise

he Evans Wireless Development Survey is a detailed report of extensive, in-depth interviews with almost 500 developers active in wireless application or infrastructure development. It was conducted in the Fall of 2004. All text and analysis herein provided by Evans Data.

Barriers of Adoption: Security
When wireless developers were asked their opinion on whether or not security was a some form of barrier to widespread adoption of mobile devices and services, 85 percent felt that it was. Evans Data respectfully disagrees with this opinion, theorizing that the vast majority of consumers care more about the “gee-whiz” factor of their wireless devices than security.


Figure 1. The Barriers: This graph shows how many developers thought that security was a some form of barrier to widespread adoption of mobile devices and services.
 
Figure 2. The Question: For mobile devices/services, what is your perception of the following barriers of adoption?
Figure 3. Most Common Security Mechanism: This graph shows the type of security mechanism that will be the most common.

The main problem with wireless networks is that most are unprotected. The simple fact is that 70 percent of wi-fi networks don’t make use of such readily available security offerings like WEP. Those exposed networks are easily exploited by the unscrupulous.

The average user is extremely pleased if they can get devices from multiple vendors working at all, let alone securely. If the widespread consumer base was concerned about security, the current plagues of email “virii” that are dependant on opening attachments simply would not be possible.

The Type of Security Mechanism that Will Be the Most Common
Currently, there is no clear technology leader in the mobile and wireless space with regard to the security mechanism developers choose when building applications. Additionally, unless a developer specializes in security, there can be definite overlap in their selection. For example, choosing PKI does not rule out the usage of SSL, digital signatures, and data encryption mechanisms.

Figure 4. The Question: Which of the following security mechanisms would you be most likely to use on your wireless apps?

They are all interrelated and supportive of each other. SSL relies on digitally signed certificates provided by a trusted third-party PKI certifying authority, which enables encrypted data channels and allows for safe user authentication for Web login scenarios.

PKI ranks first in usage by 15 percent of wireless developers surveyed, followed shortly by SSL/TLS. When the two options are combined, PKI/SSL solutions are selected by just under a third of all developers surveyed. Vying for third-place, user authentication/password protection, WAP 2.0 security, and digital signatures are each selected by one out of 10 respondents.

On the next page, we’ll look beyond speculation and find out what security mechanisms developers are actually *using* in their enterprises.

Most Common Types of Security Used in the Enterprise
As with previous questions relating to connectivity/data access, responses to the various types of security in enterprise usage were cross-tabulated by developer type; corporate enterprise or independent. Overall, the disparities between corporate and independent wireless developers are reasonably similar with the exception of a few cases.


Figure 5. Types of Security: This graph shows the various types of security in enterprise usage.
 
Figure 6. The Question: Which of the following security mechanisms would you be most likely to use in your wireless apps?

Independent developers are far more likely to use SSL/TLS secure channel encryption, which is supported by the vast portion of this segment which chose “Encryption of data before it is sent.”

Wireless developers who identified themselves within the corporate enterprise sub-group we most likely to use “Digital Signatures,” “VPN,” and “Public Key Infrastructure” mechanisms in their solution designs.

How Many Tiers in Enterprise Wireless Apps?
When our survey group was divided into corporate enterprise and independent segments, we cross-tabulated the preferred tiered design choices used in wireless applications architectures. Overall, the divergence was not large, except in a few areas.

Corporate enterprise developers prefer three-tied designs over any other type, by a margin of 12 points?quite a noticeable split. This can be directly linked to the long-term and successful push from various enterprise platforms?corporate developers are very comfortable with this architectural design paradigm.

The largest disparity is the answers in the “Don’t Know” category. Nearly three times as many independent wireless software developers do not know how many tiers will be in use. This is not due to a lack of technical expertise, but is mainly attributable to the consultative, client-driven nature their application designs.


Figure 7. Number of Tiers in Enterprise Wireless Apps: The graph shows the preferred tiered design choices used in wireless applications architectures.
 
Figure 8. The Question: How many tiers will be in your wireless architecture?

devx-admin

devx-admin

Share the Post:
Poland Energy Future

Westinghouse Builds Polish Power Plant

Westinghouse Electric Company and Bechtel have come together to establish a formal partnership in order to design and construct Poland’s inaugural nuclear power plant at

EV Labor Market

EV Industry Hurting For Skilled Labor

The United Auto Workers strike has highlighted the anticipated change towards a future dominated by electric vehicles (EVs), a shift which numerous people think will

Soaring EV Quotas

Soaring EV Quotas Spark Battle Against Time

Automakers are still expected to meet stringent electric vehicle (EV) sales quotas, despite the delayed ban on new petrol and diesel cars. Starting January 2023,

Affordable Electric Revolution

Tesla Rivals Make Bold Moves

Tesla, a name synonymous with EVs, has consistently been at the forefront of the automotive industry’s electric revolution. The products that Elon Musk has developed

Poland Energy Future

Westinghouse Builds Polish Power Plant

Westinghouse Electric Company and Bechtel have come together to establish a formal partnership in order to design and construct Poland’s inaugural nuclear power plant at the Lubiatowo-Kopalino site in Pomerania.

EV Labor Market

EV Industry Hurting For Skilled Labor

The United Auto Workers strike has highlighted the anticipated change towards a future dominated by electric vehicles (EVs), a shift which numerous people think will result in job losses. However,

Soaring EV Quotas

Soaring EV Quotas Spark Battle Against Time

Automakers are still expected to meet stringent electric vehicle (EV) sales quotas, despite the delayed ban on new petrol and diesel cars. Starting January 2023, more than one-fifth of automobiles

Affordable Electric Revolution

Tesla Rivals Make Bold Moves

Tesla, a name synonymous with EVs, has consistently been at the forefront of the automotive industry’s electric revolution. The products that Elon Musk has developed are at the forefront because

Sunsets' Technique

Inside the Climate Battle: Make Sunsets’ Technique

On February 12, 2023, Luke Iseman and Andrew Song from the solar geoengineering firm Make Sunsets showcased their technique for injecting sulfur dioxide (SO₂) into the stratosphere as a means

AI Adherence Prediction

AI Algorithm Predicts Treatment Adherence

Swoop, a prominent consumer health data company, has unveiled a cutting-edge algorithm capable of predicting adherence to treatment in people with Multiple Sclerosis (MS) and other health conditions. Utilizing artificial

Personalized UX

Here’s Why You Need to Use JavaScript and Cookies

In today’s increasingly digital world, websites often rely on JavaScript and cookies to provide users with a more seamless and personalized browsing experience. These key components allow websites to display

Geoengineering Methods

Scientists Dimming the Sun: It’s a Good Thing

Scientists at the University of Bern have been exploring geoengineering methods that could potentially slow down the melting of the West Antarctic ice sheet by reducing sunlight exposure. Among these

why startups succeed

The Top Reasons Why Startups Succeed

Everyone hears the stories. Apple was started in a garage. Musk slept in a rented office space while he was creating PayPal with his brother. Facebook was coded by a

Bold Evolution

Intel’s Bold Comeback

Intel, a leading figure in the semiconductor industry, has underperformed in the stock market over the past five years, with shares dropping by 4% as opposed to the 176% return

Semiconductor market

Semiconductor Slump: Rebound on the Horizon

In recent years, the semiconductor sector has faced a slump due to decreasing PC and smartphone sales, especially in 2022 and 2023. Nonetheless, as 2024 approaches, the industry seems to

Elevated Content Deals

Elevate Your Content Creation with Amazing Deals

The latest Tech Deals cater to creators of different levels and budgets, featuring a variety of computer accessories and tools designed specifically for content creation. Enhance your technological setup with

Learn Web Security

An Easy Way to Learn Web Security

The Web Security Academy has recently introduced new educational courses designed to offer a comprehensible and straightforward journey through the intricate realm of web security. These carefully designed learning courses

Military Drones Revolution

Military Drones: New Mobile Command Centers

The Air Force Special Operations Command (AFSOC) is currently working on a pioneering project that aims to transform MQ-9 Reaper drones into mobile command centers to better manage smaller unmanned

Tech Partnership

US and Vietnam: The Next Tech Leaders?

The US and Vietnam have entered into a series of multi-billion-dollar business deals, marking a significant leap forward in their cooperation in vital sectors like artificial intelligence (AI), semiconductors, and

Huge Savings

Score Massive Savings on Portable Gaming

This week in tech bargains, a well-known firm has considerably reduced the price of its portable gaming device, cutting costs by as much as 20 percent, which matches the lowest

Cloudfare Protection

Unbreakable: Cloudflare One Data Protection Suite

Recently, Cloudflare introduced its One Data Protection Suite, an extensive collection of sophisticated security tools designed to protect data in various environments, including web, private, and SaaS applications. The suite

Drone Revolution

Cool Drone Tech Unveiled at London Event

At the DSEI defense event in London, Israeli defense firms exhibited cutting-edge drone technology featuring vertical-takeoff-and-landing (VTOL) abilities while launching two innovative systems that have already been acquired by clients.

2D Semiconductor Revolution

Disrupting Electronics with 2D Semiconductors

The rapid development in electronic devices has created an increasing demand for advanced semiconductors. While silicon has traditionally been the go-to material for such applications, it suffers from certain limitations.

Cisco Growth

Cisco Cuts Jobs To Optimize Growth

Tech giant Cisco Systems Inc. recently unveiled plans to reduce its workforce in two Californian cities, with the goal of optimizing the company’s cost structure. The company has decided to

FAA Authorization

FAA Approves Drone Deliveries

In a significant development for the US drone industry, drone delivery company Zipline has gained Federal Aviation Administration (FAA) authorization, permitting them to operate drones beyond the visual line of

Mortgage Rate Challenges

Prop-Tech Firms Face Mortgage Rate Challenges

The surge in mortgage rates and a subsequent decrease in home buying have presented challenges for prop-tech firms like Divvy Homes, a rent-to-own start-up company. With a previous valuation of

Lighthouse Updates

Microsoft 365 Lighthouse: Powerful Updates

Microsoft has introduced a new update to Microsoft 365 Lighthouse, which includes support for alerts and notifications. This update is designed to give Managed Service Providers (MSPs) increased control and

Website Lock

Mysterious Website Blockage Sparks Concern

Recently, visitors of a well-known resource website encountered a message blocking their access, resulting in disappointment and frustration among its users. While the reason for this limitation remains uncertain, specialists