From a security perspective, mobile apps are much more than they seem. They may appear as harmless and benevolent creatures, yet their potential for security issues resembles something more like King Kong. Mobile apps can wreak havoc with security because they are easily introduced, easily developed, and easily deployed. Their usefulness leads to complacency. Yet they increasingly gain access to critical information and important corporate applications through APIs in the cloud. Mobile apps also have access to a wide variety of personal data, such as location information, social information, contacts, photos and videos, and anything else that a user may care to contribute to social streams. If this weren’t enough cause for concern, they contain codes, passwords, and information that would be critical for gaining access to corporate data directly, or through social engineering techniques.
Attack Vectors for Mobile Apps — Source: Saugatuck Technology
Despite these issues and their valuable content, mobile apps are notoriously insecure. Relatively little attention has been paid to them due to their relative recent introduction and the fact that their development coincides with general changes in software development. Apps create security concerns going well beyond what has previously been considered with their desktop cousins. They may be vulnerable in every area from development to deployment and, afterwards, maintenance and security updates. On top of this, there are special concerns that are particular to mobile devices.
Is the security profile of your organization partly cloudy with a chance of meatballs? Is the security budget not expanding fast enough to cover required projects or simply never enough? Can you easily explain the difference between managed security services, subscription security services, and Cloud infrastructure security including VM monitoring services, virtual machine, and hypervisor notification agents?
It may be time to climb out of the Cloud and look at alternatives to onsite security programs and controls. Security subscription services, managed security services, Identity services, Cloud infrastructure and data center services may be just the fixes for never enough money, staff turnovers, and the need to deliver more in less time.
Saugatuck recently published a five-page Strategic Perspective entitled The Rise of Cloud Security Services (1562STR, 17Apr2015 – see link at bottom of this blog post if you are a premium subscriber to Saugatuck’s CRS research service to access) that analyzes available Cloud security service alternatives across five key dimensions (see Figure 1). The piece includes identification of some of the leading vendors delivering Cloud security services in each of the five categories, what the different services are best suited for and why, and provides insight into the multiple apparitions of Cloud security.
Figure 1: Cloud Security Services
Source: Saugatuck Technology, 2015
It seems that all security products and services are being labeled as “Cloud security” these days, and that every vendor in the business of delivering security is now a Cloud security vendor. There’s good reason why vendors are toeing the “Cloud” line as organizations transition from legacy systems and application workloads to virtualized Cloud data centers: the Cloud and in the transition to the Cloud is where the money is. Continue reading
What’s stopping the largest percentage of enterprise leaders, including Finance executives, from trusting even some of their systems and data to Cloud providers?
December’s Saugatuck survey on Cloud and Finance, which has provided fodder for a terrific series of strategic reports, Strategic Perspectives, blog posts, and other insights published for and used by Saugatuck’s clients, included hundreds of open-ended responses regarding current and expected Finance IT systems and infrastructures. And while an encouraging plurality of survey participants indicated that they are moving, typically judiciously, toward using more and more Cloud for Finance, more than 20 percent of those writing in responses still expressed security-related concerns as their primary reasons for not even considering Cloud-based Finance systems.
The ones that stood out included the following:
- “Every time our financial managers look at ‘the cloud,’ they only see that the information is outside our firewall and therefore perusable by anyone and everyone. Only completely public information will ever be stored off-site or outside of our company’s direct control.” – Controller, Healthcare, Upper-midsize company
- “We are concerned about cloud security and competitors being able to access cloud information.” – Finance Director, Business / Professional Services, Midsize
- “We have a fear of using the cloud based on possible hacking and fraud capabilities. Until it’s a proven technology we will keep everything in-house.” – VP Finance, Financial Services, Large
- “Organizationally, we are evaluating the movement towards cloud-based computing, and are aware of the potential cost savings, but are tempered by the continuing risk of breaches.” – Director of IT, Healthcare, Upper-midsize company
First, let me vent in a blunt manner, then I’ll get to the more reasoned content.
Positions such as those expressed above border on willful ignorance. They are based almost entirely on perception, opinion, and Continue reading
In the old days in each village, access to personally identifiable information was in your face: it occurred when the other villagers looked into your eyes. The days of the village and up-close eye contact have been replaced by vast amounts of digital data representing identity. The modern digital equivalent of identity information is stored in repositories in digital networks throughout the world. Continue reading
Strap yourself into your seat for the big data security analytics show, for it’s coming to a town near you. Carnival barkers from every walk of life will want you to come into their tents to see the latest and greatest show on earth: the big data security analytics show.
You will want to understand why using evolution charts, Venn diagrams, Pareto charts, and Pivot tables can or will help. You’ll want to see what association rules, clustering, decision trees, and forecasting can do for you. And you will want to understand the difference between analysis and knowledge, as it’s applied to security.
You will also want to make the distinction between whether you have to hire a data scientist or not and whether this will solve your immediate problems. You will also want to consider which approaches you could take that will produce the most value in the short, medium, and long term for your company and career.
To be useful, security analytics must take the large volume of data that can be collected and take three actions with the data, as follows:
- Reduce voluminous data and identify the pattern that matters,
- Use the information to enable a timely and appropriate in-situ response, and,
- Use the data to make adjustments – after the fact.
Mocana began as a technology provider of embedded systems security in 2004. Over the years Mocana has broadened its scope and identified two potential markets to address: one, the need to protect mobile devices and, two, to protect apps and the data on them. Mocana launched its Mobile Application Protection platform in 2011 with support for Android apps, and added iOS app support in 2012.
In 2012 Mocana raised $25 million in Series D funding, bringing total investment to $47 million, to expand its opportunity around its Mobile App Protection software. Trident Capital led the round, joined by existing investors Intel Capital, Shasta Ventures, Southern Cross Venture Partners and Symantec.
Mocana’s nearly two-year partnership with SAP, launched in May 2013, has taken a back seat to SAP’s single-minded focus on promoting its HANA platform. However, over the past twenty months, Mocana Atlas has emerged as a leading platform for delivering secure, high-productivity mobile integration with SAP solutions.
Mocana recently commissioned a research study designed to validate its economic benefit and now stakes a claim to user productivity improvements leading to improved application time to market and and cost savings resulting from that.
According to Ranjeet Vidwans, vice president of marketing at Continue reading
Privacy – or the lack of it – is a fact of life on the Internet today. Between big banks, healthcare, and insurance companies being infiltrated, and national governments getting into the act with rumors of proxies and direct involvement, the stakes and consequences involving identity data are becoming higher. Whether the raw data of identity is being harvested by mobile telecommunication operators, big Internet search and online advertising companies, large online ecommerce houses, via shadowy browser fingerprinting, or by stealth from government agencies and cyber-criminals, identity is big business – valued in excess of hundreds of billions annually – and will likely remain this way.
With almost 7.3 billion people on the earth today, only 32.7 bits of information about someone is required to uniquely identify a single person living on the earth. It does not take much information about someone to get close to 33 bits of information: it can be assembled from small pieces of data about people. If you assemble and add enough small bit of information to someone’s bit-profile, you can quickly approach the one in 7.3 billion chance of uniquely identifying a person by rapidly aggregating 33 bits about a person. And, although not able to uniquely identify a person by itself, when surreptitious browser fingerprinting and geo-location are mated to an email address, a Facebook account, a Google+ account, etc., the combination makes it possible to uniquely identify almost anyone. Continue reading
Adoption of Cloud-based solutions is expanding across enterprises and across business departments within enterprises. Saugatuck’s on-going surveys and discussions with IT executives indicate that significant expansion of Cloud usage will continue over the next two years. However, as experience grows, IT management teams are learning the “realities” of Cloud IT. In a recently published Strategic Perspective, Saugatuck reviews four reality areas discussed by an expert panel and audience of IT executives at Saugatuck’s recent Cloud Business Summit (CBS2014) conference in New York City. The four reality areas are characterized by the following questions posed to initiate the panel discussions: Continue reading
As we close out every year, especially in periods of rapid and accelerating change, looking back to interesting and compelling events becomes a de rigueur part of blogging and analysis.
One of the more digital business interesting developments affecting enterprise CIOs in recent weeks was Twitter’s late October announcement of its “Fabric” software development platform for mobile apps. Fabric enables Twitter to create its own new digital business, while enabling enterprises and IT services providers to do the same. Since the announcement, I’ve researched it in more detail, spoken with a handful of experienced developers, and played a bit with the thing myself.
Here’s a year-end update on what Fabric is, how it can enable and challenge enterprise Marketing and other aspects of Digital Business, and how it in turn changes and challenges the role(s) of the enterprise CIO.
Fabric is a free extension with three SDKs that can be added to existing iOS and Android development environments. It enables very simple and straightforward, with drop-down menus for adding Twitter functions, analytics, and ads to applications. Developers select Continue reading
Security is a “hot topic.” The news coverage for security is unrelenting with Edward Snowden, JP Morgan Chase, Russian state agents, Chinese army militias, NSA, Target, Home Depot, Chip and Pin, OpenSSL, and Regin among some of the many stories capturing headlines and the imagination of people around the world.
News coverage continues to veer from one extreme to another, from utilities being invaded by state-sponsored hackers, to simplistic software coding mistakes not uncovered for years, to websites targeting mobile phones, and to stealthy cyberwar-craft malware lying at the ready for its owners to call. Continue reading