While devices such as the iPhone, iPad, Blackberry and Android are in most cases welcomed into the corporate world, there's uncertainty about how to fit them into enterprise IT security practices that have been concerned so long by Microsoft Windows.
"We're excited about enabling our financial advisers to use ] in lieu of a traditional laptop," says Pat Patterson, enterprise information security architect at Raymond James Financial, where employees are clamoring to use smartphone and tablet devices they own as part of their job. But excitement was tempered when the financial services firm, which wants to be able to exert management and security controls over iPhones, for instance, found the software agent it used for that purpose was so cumbersome and had the effect of slowing device use, that employees were complaining that it should be removed.
While it's still the early days of smartphone security, Raymond James has not found an agent-based approach yet that isn't cumbersome for its user base.
"A lot of the early forays into mobile devices have been agent-based," says Patterson, who preferred not to name some of the software he's tried on smartphones. At this point, he says he's looking at trying something totally new, Sophos Mobile Control, that Sophos is introducing later this year as an agentless approach to enforce some basic security controls such as password length, device lock and remote wipe.
Raymond James would like to open the doors to the Android device, especially since the version Android 2.2 platform introduced last year appears more security-friendly for the enterprise.
"My goal is to be a business-enabler," Patterson says. "We're excited about the potential this has. The problem is, can we meet our own security requirements?"
The debate about the pros and cons of an agent or agentless approach to the new breed of smartphones and tablets will likely grow over the coming year.
There needs to be at least a "mini-agent," as Trend Micro CEO and co-founder Eva Chen called it, on the device to exert security controls. Without some kind of agent, "you can't do it," she firmly says.
Patch management for smartphones and tablets remains problematic — even for experts in patch management at security firms which traditionally focused on the apparently unending Patch Tuesdays of Microsoft Windows.
Shavlik Technologies is letting its employees bring in the myriad iPhones, Androids and iPads to use at work, says Mark Shavlik, CEO of the firm. But Shavlik execs acknowledge the company, though it has expertise in Windows-based patch management, as of yet has no way to approach doing the same job for the iPads, iPhone and Androids that have come in the door.
There are auto-update mechanisms from Apple, for instance, with wireless carriers playing a role approving these updates in the middle, and thousands of third-party apps for these devices that might possibly one day need to be patched, says Rob Juncker, vice president of technologies at Shavlik. "It's a tectonic shift" from the world of Windows-oriented patching, he says, but Shavlik hints it may introduce its own approach to this mobile-device segment later this year.
The sheer plethora of mobile devices and the speed at which they are being introduced is also a factor putting huge pressure on traditional security vendors whose main preoccupation in the old days was risk posed by flaws in Microsoft operating systems and applications.
"It's absolutely harder," says Dave Cole, senior director product management for Symantec Norton Everywhere and Mobile. "It's more complicated."
The world of the PC generally revolved around a longer life cycle, while the "mobile melee" includes not just the makers of the operating systems and devices pushing their innovations out at a faster pace but also the wireless carriers involved in making decisions related to security, he noted.
While few believe security threats against iPhones, iPads, Android and their many cousins have reached the level seen in the Web-based Internet environment against the PC, there's acknowledgement that attackers are increasingly likely to see mobile devices as attractive targets for malware and social-engineering exploits as device adoption grows.
According to IDC, manufacturers shipped about 100.9 million smartphones to stores globally in the last three months of 2010, in comparison to 92.1 million PCs.
Read more about wide area network in Network World's Wide Area Network section.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.