Why Samsung Won't Beat Blackberry in the Mobile Enterprise
CIO - Earlier this week I was asked to review the Samsung Safe offering, which is being rolled out to make Samsung's Android phones more acceptable to the enterprise. Safe reminds me a lot of what vendors from Netscape to Sony did to address what they thought were enterprise needs and often showcased without actually speaking to their own IT organizations.
The issue comes down to the general tendency for technology companies to be run by engineers with no IT experience and therefore no real clue about what a business IT organization-including their own-actually does.
IT, when done right, is largely transparent. As a result, it's often taken for granted. This makes it hard to build products for IT without engaging IT and hiring people with significant IT experience to work on the effort.
BlackBerry: Keeping IT in Mind From the Beginning
BlackBerry started with businesses as its primary customers. Then known as Research in Motion, the company initially brought the two-way pager into the mainstream-and, unlike today's typical smartphones and tablets, these actually entered the market as executive tools, not consumer products. From the very start, the company had to learn what IT needed and how to protect top executives. These were lessons hard learned.
Look at BlackBerry security efforts, then, and you see that they start and end with targeted IT needs. BlackBerry ties its systems into IT policy, assuring that IT can easily get the devices to conform. This is critical; IT doesn't have the time to manage everything that's currently on the table, and BlackBerry is designed to assure compliance without significantly increasing IT overhead.
One of the most talked-about problems since the introduction of the smartphone is separating personal and corporate information. This is because IT doesn't want to deal with personal apps and files, and users don't want IT seeing their personal stuff.
BlackBerry separates the environments on its devices, giving the user his own space and letting IT manage and secure the business information under its control. This is unique in the market-and it was driven by IT demands for this feature.
When developing its unique tablet, the BlackBerry PlayBook, the company tied it to its overall security framework and sandboxed the apps so they can't do hostile things. Looking at the overall nature of email and application attacks, BlackBerry created permissions and monitoring components that directly address the damage these attacks can cause, even though BlackBerry platform is generally less likely to be attacked than one of the consumer platforms.
Samsung: Start With an Insecure Platform, Bolt on Security
Samsung, in contrast, created Safe. The company started with Android, the only platform actively being blocked by IT organizations due to security concerns. I was at an event last year where McAfee showcased that an Android phone can be remotely attacked, put into a loop, overheat and catastrophically fail.
Meanwhile, Kaspersky recently discovered spy software that turns on the microphone of the Android devices, recording what's being said in the room. Finally, SophosLabs documented five classes of hostile Android apps. Some, once installed, automatically install additional apps, send identity information to the attacker, or hijack social network accounts.
So Samsung started with a platform that, by any reasonable measure, provides inadequate security for personal use, let alone business use. Ideally, to fix the problem, the company should have done what Amazon did with the Kindle and forked the code, creating a unique and more secure version of Android that wouldn't be as vulnerable.
Instead, Samsung went with mobile device management (MDM)-which, in the case of a vulnerable platform, only makes IT more responsible for adverse results but doesn't address the core security problems. The company implemented encryption, which can protect the files unless a user's identity is stolen, which unfortunately is the purpose of much Android malware. Samsung also installed a VPN, which actually makes a compromised device more dangerous, because VPNs tunnel through the perimeter security of a business, potentially granting even greater access to the attacker. Finally, the company made email connectivity improvements, which also giving an attacker greater access via a compromised phone.
All in all, this showcases that Samsung, a broad-based manufacturing company, doesn't understand IT needs nor the actual vulnerabilities that IT needs to address. For a period last year, Samsung phones were less secure than other Android phones.
One of These Things Is Not Like the Other
Generally, when a company is new to IT, it takes an existing product and patches it to look IT-like. Then, upon learning that that approach sucks, it goes back and creates a product from scratch that's designed specifically to meet its compliance and security needs.
Android, as it is, is too insecure to patch this way. Samsung may eventually realize that Blackberry and even Apple are closer to the mark; both companies control their own platform in order to provide an acceptable business solution. In the end, when you compare BlackBerry to Samsung, you can see that BlackBerry is an enterprise vendor. Samsung, not so much.
Rob Enderle is president and principal analyst of the Enderle Group. Previously, he was the Senior Research Fellow for Forrester Research and the Giga Information Group. Prior to that he worked for IBM and held positions in Internal Audit, Competitive Analysis, Marketing, Finance and Security. Currently, Enderle writes on emerging technology, security and Linux for a variety of publications and appears on national news TV shows that include CNBC, FOX, Bloomberg and NPR.
Read more about android in CIO's Android Drilldown.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Gartner Magic Quadrant for Mobile Application Development Platforms As unprecedented numbers of enterprises build mobile applications, the mobile application development platform market continues to grow and evolve rapidly.
- The Total Economic Impact of IBM's Worklight Platform Mobile is the fastest growing consumer technology in history. As enterprises build apps to engage these new users they are facing increased complexity...
- Improve Your Mobile Application Security with IBM Worklight IBM® Worklight helps organizations extend their business across multiple mobile devices. It provides an open, comprehensive and advanced mobile application platform to help...
- Unlock the Value of Enterprise Mobility Download this guide and learn how to manage the secure deployment of enterprise mobile apps and data, while still encouraging the levels of...
- It's Chaos Out There Worried about your mobile apps? You should be; it's chaos out there. Check out this humorous video and see if you can recognize...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to... All Mobile Apps White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!