Commonly blacklisted and whitelisted iOS and Android apps include DropBox, Netflix and Angry Birds. Why aren't more companies blacklisting mobile device apps?
Why do so few businesses blacklist apps on mobile devices? "Part of the reason is, IT starts to look at what they actually allow on the laptop, and they say, we don't block them on their laptops, so how can we block them on their tablets?" said Jonathan Dale, director of marketing at Fiberlink, speaking by phone.
When businesses do impose app-usage restrictions, "the number-one driver is reducing data risk, and specifically where corporate data ... can go," he said. The second biggest driver is using blacklisting and whitelisting to ensure that a device doesn't contain inappropriate apps, based on how it's used. "It could be a tablet in a classroom, or an iPad being used by hostesses in a casino, and they want to make sure that device is being used for its intended purpose," Dale said. The third biggest concern, finally, is curtailing excessive bandwidth consumption.
Roughly the same number of businesses that blacklist apps also employ whitelisting, which means allowing only approved apps to run on a device. The practice is most prevalent in the retail and services industries, which suggests the devices are being used -- at least in part -- for point-of-sale applications, customer catalogs, product displays and so on.
When whitelisting is used on an iOS device, an average of 16 apps are allowed.
For businesses that employ an Android whitelist, an average of 10 apps are allowed.
Top 10 Whitelisted Apps: Android Devices
-- Adobe Reader
-- Lookout Mobile Security
-- Citrix Receiver
-- Android Translator
-- ZXing (barcode processing)
-- Google Maps
Given that the majority of mobile devices entering the workplace are now employee owned, can businesses really blacklist and whitelist apps on those devices? Dale said the answer is yes. "What we see is that employees using their own devices are relatively tolerant of having some common-sense restrictions imposed on their device," he said.
For example, people with access to sensitive information might agree to have their camera blocked. Furthermore, dynamic policies can be employed to make restrictions location dependent, so that, for example, cameras -- or bandwidth-hogging media apps -- might be disabled when the device is within a mile of the workplace.
Unfortunately, businesses sometimes find themselves having to block certain apps because they can't block underlying device functionality. "There are certain restrictions that you're not able to push down to a device, and that could be dependent on the OS," Dale said. For example, iOS apps can't be selectively blocked from transferring data via the cellular network -- while allowing Wi-Fi access -- unless they're designed that way from the start.
InformationWeek Elite 100Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?
InformationWeek Tech Digest, Nov. 10, 2014Just 30% of respondents to our new survey say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?