Small laptops pose a big security threat
Ultraportables forgo size, weight, power -- and security.
Computerworld - They're highly portable, inexpensive, very popular -- and a potential security nightmare. Running against the trend of mobile computers featuring progressively larger processors, memory, storage, screens and price tags, ultraportable laptops promise to streamline and simplify their users' lives. Easy to carry, capable of running only a handful of modest applications and affordably priced, ultraportables have emerged over the past year or so to become one of the hottest mobile computing trends.
Pioneered by Taiwanese PC maker Asustek Computer Inc. with its Eee PC and now also available from vendors such as Dell, Hewlett-Packard and Fujitsu, ultraportables are designed to appeal to users who need portable systems with more power and functionality than a smart phone but don't want to lug a conventional laptop through offices, hotels and airports.
"It's a technology with great appeal to many people," observes Gabriel Vitus, IT director at the Certified General Accountants' Association of Canada, a trade organization in Vancouver, British Columbia.
That small package comes with built-in compromises, however. Ultraportables typically feature a processor that lags at least a generation or two behind the CPUs included in traditional laptops, a few gigabytes of solid-state memory and storage, a squeezed-down display and a cramped keyboard. But another characteristic of the new portable pipsqueaks is striking fear into the hearts of a growing number of IT managers: security weaknesses that are directly attributable to the machines' diminished technology.
"This is a threat that IT managers are just beginning to recognize," says Brian Wolfe, a security analyst at Lazarus Technologies Inc., an IT consulting service in Itasca, Ill.
Minimized hardware resources force ultraportables -- and their users -- to cope with weakened system software. Most models ship with a stripped-down Linux operating system or, in some cases, Microsoft Corp.'s previous-generation operating system, Windows XP. Newer and more capable operating systems, which also tend to have the latest internal security safeguards, demand processing and storage power that ultraportables typically lack, Wolfe notes.
Ultraportables' reduced resources also limit their ability to run add-on security software, such as data encryption and anti-malware tools. With processing power, internal memory and storage space all at a premium, it can be difficult -- sometimes impossible -- to squeeze security software onto an ultraportable. "As a result, the machines are often sent out into the world with little or no protection," Wolfe says.
Vendors' use of dated software can also make ultraportables more susceptible to various malware. Earlier this year, for example, Brazilian security firm Rise Security released an alert that showed that old, unpatched Samba code found on the Eee PC allowed the machine to be subverted ("rooted") right out of the box. Such vulnerabilities allow hackers to remotely gain complete control over the systems.
Other key security features are often absent on ultraportables. "Many, if not most, [ultraportables] are sold without Trusted Platform Modules because they are targeted at the consumer market," says Rob Enderle, an analyst at Enderle Group in San Jose. "This means they either don't have encryption solutions or the solutions aren't that robust."
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- The Truth About Virtual Computing for CAD If you're a user of graphics-intensive software such as 3D modeling, simulation and analysis, and visualization, you might be skeptical about moving to...
- Simplifying Product Design In A Complex World Product design engineering has moved far beyond the confines of ever-more powerful workstations. Companies can't afford to restrict projects to using only local...
- A Reference Architecture for the Internet of Things The aim of this is to provide Architects and Developers of IoT projects with an effective starting point that covers the major requirements...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer... All Hardware White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!