Mobile // Mobile Business
News
6/28/2014
07:00 AM
Connect Directly
RSS
E-Mail
50%
50%

BlackBerry Swipes At Android Security

In response to Google I/O announcements, BlackBerry criticizes Android's lack of security. On point, or sour grapes?

IT Salaries: 8 Cold Hard Facts
IT Salaries: 8 Cold Hard Facts
(Click image for larger view and slideshow.)

BlackBerry CEO John Chen took a swipe at Google this week, suggesting the Android-maker's new security push is too little, too late. In today's world of BYOD, Chen says businesses need to prioritize security from the start, not add it after the fact.

Android For Work will be built into Android Release L, and will also be available separately for earlier versions of Android going back to Ice Cream Sandwich. Google is relying a bit on the hard work done by Samsung to entice businesses by adopting portions of Samsung's Knox security platform. With Android For Work, businesses can separate work data from personal data through containerization. The segregated data can be managed from the IT admin console and locked, wiped, or restored as needed without touching the owner's personal information.

Android For Work also allows for the bulk installation of apps to an entire fleet of devices. According to Google, companies won't have to modify their apps to function within the Android For Work environment.

It's a big step forward for Android, one that should make it more attractive to businesses. In a blog post, BlackBerry's Chen contends Google's efforts are a good first step, but are only the start.

"At Google's I/O developer conference, the company said it would do several things to boost Android's security. Most prominently, this includes separating work and personal apps and data in coming versions of Android by leveraging Samsung's Knox containerization technology," said Chen. "I'm delighted by this first step. The need to improve Android's security was clear. And it validates what we at BlackBerry have been saying all along about the potential perils that businesses face in the BYOD era."

[Do you have a Mobile Security Action Plan?]

As Chen points out, however, Knox's success can be described as limited at best. Fewer than 2 million Samsung devices are actually running Knox. To put that in some perspective, Samsung sells between 75 million and 90 million smartphones per quarter.

"Tens of millions of BlackBerry devices are trusted every day by Fortune 1000 firms worldwide," said Chen. "Our BES software dominates the enterprise mobility management space, with more business customers than our top three competitors combined. And while Knox tries to build a fortress upon an insecure foundation, BlackBerry's entire infrastructure is constructed upon a multi-decade bedrock of mobile management and security expertise."

Chen's blog then devolves into a long-winded and analyst-backed pitch for BlackBerry's products and services. Comparing Android's numbers to BlackBerry's, however, shows just how much impact BlackBerry's security focus has in the real world.

During its I/O keynote, Google's Sundar Pichai said there are more than 1 billion active Android devices on planet Earth. That's a device for one out of every seven people on the planet. Android owns more than two-thirds of the global market for smartphones. By Chen's own admission, BlackBerry's presence in the market has dwindled to just tens of millions of users. Its worldwide share has fallen to about 3%. Microsoft's Windows Phone platform, which is struggling for relevance, now outsells BlackBerry.

"While we applaud Google and Samsung for their plans, we don't think it's enough for security-minded enterprises. Don't be dazzled by those who can talk the security talk. Instead, look to the company that has proven repeatedly it can walk the walk," concluded Chen.

There's no doubt BlackBerry's model offers strong security. For many businesses, however, Android L and Samsung's Knox may be secure enough. Sometimes secure-enough is all the security you need.

What do you think? Are Chen's comments warranted, or do they come off as sour grapes from a cast-aside has-been?

Most IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift. Get the 6 Tools To Protect Big Data report today (registration required).

Eric is a freelance writer for InformationWeek specializing in mobile technologies. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Ken.Dugdale
50%
50%
Ken.Dugdale,
User Rank: Apprentice
6/29/2014 | 8:46:17 AM
Sometimes secure-enough is all the security you need?
Of course, the only truly secure computer is powered off and buried 10 feet in concrete; that's been said since the very first computer. There's no such thing as 100% secure, so it's always true to say that "secure-enough is all you need." However, security is measured in degrees according to what you do and have access to, and most importantly security isn't something you add on later, like a bag hanging off the side of your device. Security *needs* to be built in to the original design.

The average worker usually doesn't have access to Strictly Confidential (read once and destroy) kind of material; they're not privy to the long-range plans discussed in meetings of the board of directors. So what device will the directors use? Android is secure-enough for whom? It's the directors, C-level, and upper management that use their devices in the most productive ways and they use far more than just email and attachments. We will still have the average user bringing their Android devices - albeit now with a built-in MDM app instead of the company-installed one - while management use their BlackBerry's; and we will still have a heterogeneous environment to manage and cope with at expense.

There's a H3LL of a lot more to mobile computing than simply email, if you actually want to be productive in your job. We need to stop thinking like average employees if we expect to be above average employees. That's where Apple and Android have failed to implement from the start in their design -- they built for the consumer, so cannot be truly corporate-grade until they redesign from scratch. You don't put airbags on a motorcycle and claim it's safe enough for your child seat.
<<   <   Page 2 / 2
InformationWeek Elite 100
InformationWeek Elite 100
Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A UBM Tech Radio episode on the changing economics of Flash storage used in data tiering -- sponsored by Dell.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.