Do wireless providers like Verizon and AT&T crimp mobile security?

By , Network World |  Security, AT&T, Mobile Security

"It's a political problem," said iSec's Stamos about the situation where mobile-device makers must gave approval by the carriers to approve these types of updates. He said a lot of this situation is engendered by "the desire by the carriers to control profit streams."

In contrast, Microsoft, in its Windows patching routine, "doesn't have to go to every laptop OEM to get permission from each." Stamos added that Google has set up separate "tiers" for certain devices and customers to be patches. Overall, Stamos advocated that the mobile-device industry make a break with the current situation regarding carrier control, and especially for enterprise users, "please give these people the ability to patch their phones." The iPhone and Android devices are hard to manage in part because of this.

Apps were another topic of discussion. Amoroso said AT&T's policy on Android is that "we restrict apps to the Android market. I thought this community would love that," because it was intended to make malware more difficult to exploit. But, he adds, "the reaction is more like they want mobile to look more like the Internet."

Mobile-device apps may seem silly or whimsical at times, but the reality is that apps are becoming part of the critical infrastructure, Amoroso pointed out. Some businesses are also setting up their own app stores to distribute apps to their end-users.

2011 is the "eye of the storm" in terms of mobile-device security, said Amoroso. One reason is that over the next 12 months, carriers are rolling out their 4G networks, a move that's "unbelievably profound" because it will be "an IP infrastructure for mobility at speeds that will be appealing for hacking." He said he felt the world was not yet fully prepared for this as an event.

The current tight-knit relationship between the carriers and the makers of the smartphone operating systems, including Google, RIM and Apple, among others, effectively leaves a broad swath of the traditional security industry somewhat out in the cold in terms of becoming aware of patching issues and being able to best offer their own analysis and remedies.


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question