Mobile Customer Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 20 April 2008

Mobile UC and Business Applications Security

Posted on 14:02 by Unknown

April 18, 2008

Will Security Hold Up Mobile UC Applications For The Enterprise?

Art Rosenberg, The Unified-View

Two recent articles on the web caught my attention because they focused on a key concern of IT management about security as it affects business communications in the enterprise. The first article, by Michael Ybarra, reports on the negative reaction of IT management to end user demand for mobile smart phones, where security concerns are given as reasons for limiting support for such devices that will be essential to UC.

Part of the reluctance to allow the use of smartphones by business users seems to be simply because IT thinks it has to fund the purchase, complete user support of the device, as well as the security of any enterprise information that is accessed by the device. In effect, they view the mobile devices just like premise-based, wired desktop PC and telephones. However, because end user demand for mobile “smartphones” has heated up significantly, IT is caught in the middle of changing needs that will also be critical for maximizing UC benefits.

When enterprise-oriented RIM Blackberries, supported by secure enterprise servers, were the only game in town for “push” enterprise email and application messaging, enterprise IT had control over pretty much everything that end users did with those devices. Adding telephony access to the RIM devices “glued” the voice and data pieces together at the mobile device level, although not necessarily in a fully integrated “UC” manner. When Apple jumped into the mobile communications market with its innovative iPhone, the battle for the hearts and minds of both consumers and business users began.

According to the article, one CIO said that a big challenge is keeping up with the latest mobile devices that end users want. “I can’t tell you how many people have come up to me wanting an iPhone. It’s not what we support. WE give them the tools to support their job and environment.”

Those tools could become simpler to manage if they were software based and controllable for enterprise use, both from a security perspective as well as from an interoperability perspective. Apple is now playing catch-up with RIM with its iPhone upgrades for controlling device usage and working with Microsoft’s Exchange software. So, it is just a matter of time that the client and server software will handle the basic enterprise messaging requirements for iPhone users.

The other side of the UC coin however has to do with using the same device for business process applications, and that’s where the second article addresses the need to change enterprise security from the network level to the application software servers.

Where Will The Information Access Security Be Enforced?

The second article, an interview with Internet security expert Ted Schlein, makes the point that enterprise security responsibilities really belong at the application software level to protect proprietary company information, not at the network hardware level. The article claims that the biggest obstacle in pursuing this software approach to network security is simply” inertia.”

Just like business communications are no longer just location based, business information, accessible through business process applications, is also no longer restricted to a single type of network access or just to internal, intra-enterprise staff. To preserve both device and access flexibility for different types of end users, enterprise security has to be selectively enforced at the information source level.

According to Schlein, “ We need to change who is providing the defenses and how we provide the defenses. In the past, the “who” part was the network operations guys, and they basically put in a box to stop malicious data packets….In (the) future, software engineers have to be responsible for security. Engineering principles have to be built into security and applied by the people creating the software.”

Such an approach, which is done from the “inside out,” could eliminate the need for firewalls and intrusion detection systems, etc., and allow business process applications to selectively and consistently secure their content to different types of users and different modes of access.

As enterprise business applications become more distributed and “virtual” with the likes of software implementation frameworks like SAAS and SOA, the enterprise network “walls” will not be adequate to control the security of information that must flow directly to people outside of the business organization, i.e., supply side partners, sales channels, and, most importantly, customers. So, although legacy application software is not yet ready to take on this responsibility, it is yet another area of software changes that the vision of UC will require.

What Do You Think?

You can contact me at: artr@ix.netcom.com or .

Confused About Implementing “UC?”

The experts at UCStrategies.com just published a comprehensive UC eBook that focuses very heavily on defining the various components of UC and how to systematically migrate current business communications to UC. Take a look and see if it answers your questions!

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • UC is More Than IP Telephony
    May 7, 2008 Confusion About IP Telephony vs. UC vs. Mobility vs. CEBP Art Rosenberg, The Unified-View Because the transition of ...
  • Say Goodbye to the Telephony User Interface (TUI)
    Copyright © 2007 Unified-View, All Rights Reserved Worldwide February 17, 2007 The Fading Away of the TUI – Long Live “Visual” Call and ...
  • (no title)
    AT&T Pushing Mobile Users To Their Public, Unified Messaging “Cloud”   By Art Rosenberg, The Unified-View / UC Strategies Expert  ...
  • ShoreTel Joins Mobile UC At The Desktop
    By Art Rosenberg, The Unified-View / UC Strategies Expert Whether you like it or not, all your employees are consumers too, and they are al...
  • "BYOC" For UC Driver Communication
    Copyright © 2012 The Unified-View, All Rights Reserved Worldwide November 10, 2012 “Bring Your Own Car” Hits Mobile UC By Art Rosenberg, Th...
  • Cisco Focuses On Mobile User Experiences
    Copyright © 2012 The Unified-View, All Rights Reserved Worldwide October 24, 2012 Cisco Going After “Multi-modal” User Experiences In ...
  • UC-Enabling End-user Notifications
    Copyright (C) Unified-View, All Rights Reserved.   While there has been much attention paid to simplifying business communications between p...
  • Should Voicemail Die or Join UC?
    July 12, 2008 The Voice of the Users – Should Voicemail Die or Change to Fit UC? Art Rosenberg, The Unified-View Michael Arrington...
  • Who Really Knows Business End User UC Needs?
    August 8, 2008 Who In The Enterprise Should Represent End User Needs for UC? Art Rosenberg, The Unified-View It’s getting very obvio...
  • "Mobile Apps" Need Multi-modal UC "Cloud" Services
    Copyright (C) Unified-View, All Rights Reserved. By Art Rosenberg, The Unified-View / UC Strategies Expert It’s getting very obvious that ...

Categories

  • analytics
  • ASAP Calling
  • contact center
  • contact center UC
  • Customer UC
  • Managing UC
  • Mobility
  • Smart-phones Affect Mobile UC
  • smartphones
  • TCO
  • TCU
  • UC
  • UC Analytics
  • UC Confusion
  • UC Cube

Blog Archive

  • ►  2013 (17)
    • ►  November (1)
    • ►  August (1)
    • ►  July (3)
    • ►  May (2)
    • ►  April (2)
    • ►  February (6)
    • ►  January (2)
  • ►  2012 (32)
    • ►  December (2)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  August (4)
    • ►  July (2)
    • ►  June (4)
    • ►  May (1)
    • ►  April (3)
    • ►  March (5)
    • ►  February (3)
    • ►  January (2)
  • ►  2011 (14)
    • ►  December (2)
    • ►  November (4)
    • ►  October (5)
    • ►  August (1)
    • ►  February (2)
  • ►  2010 (16)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (2)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (2)
    • ►  March (3)
    • ►  February (1)
    • ►  January (2)
  • ►  2009 (23)
    • ►  November (3)
    • ►  October (3)
    • ►  September (4)
    • ►  August (2)
    • ►  July (2)
    • ►  June (1)
    • ►  May (1)
    • ►  April (2)
    • ►  March (2)
    • ►  January (3)
  • ▼  2008 (39)
    • ►  December (1)
    • ►  November (3)
    • ►  October (3)
    • ►  September (2)
    • ►  August (5)
    • ►  July (4)
    • ►  June (1)
    • ►  May (3)
    • ▼  April (5)
      • AVAYA Comments on Mobile UC Security Approach
      • Mobile UC and Business Applications Security
      • April 16, 2008<?xml:namespace prefix = o />Does Vo...
      • Voicemail-to-Text Services Picking Up Steam
      • How Will Your Organization Use UC? New UC eBook
    • ►  March (6)
    • ►  February (2)
    • ►  January (4)
  • ►  2007 (23)
    • ►  December (1)
    • ►  November (4)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (2)
    • ►  May (4)
    • ►  April (1)
    • ►  March (2)
    • ►  February (2)
    • ►  January (2)
  • ►  2006 (23)
    • ►  December (3)
    • ►  November (1)
    • ►  October (2)
    • ►  September (4)
    • ►  August (2)
    • ►  July (2)
    • ►  June (5)
    • ►  May (1)
    • ►  February (1)
    • ►  January (2)
Powered by Blogger.

About Me

Unknown
View my complete profile