Feeds

Who am I when I'm mobile?

Meta physical

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Two recent announcements highlight the difficulties and importance of authenticating just who has access to what data or services via a mobile network, writes Bloor Research's Rob Bamforth. Each adopts a different approach, coming from two different perspectives in the mobile data world. The IT perspective, and the telecoms perspective - the intelligent end point, or the intelligent network.

First, does the device know who you are?

With the announcement from Aladdin Knowledge Systems and Pointsec Mobile Technologies, comes a traditional 'security equals something you hold plus something you know' approach to authentication. This is directly equivalent to the card plus activation PIN number we're all familiar with, and the idea being that it's unlikely you will both lose the card, and give up your secret password or PIN.

The difference of course with a mobile device like a laptop, is the network isn't always connected, and you still want to authenticate. In this case, the eToken from Aladdin combines with a secure screensaver Pointsec for PC, and the user is authenticated only if the eToken is in place, and the correct password supplied. There's no network communication, so the device is secured even when no network is present, or required. However there is a Remote Help function so that an administrator can help authorised users to regain access to their data if locked - but how do they know the user is who they say they are?

So does the network know who you are?

The announcement from Ericsson demonstrates the other side of mobile data security, from a telecom perspective. Here, Ericsson has announced support in the Ericsson Service Delivery Platform (ESDP) for the latest specifications from the Liberty Alliance. This Alliance, you may remember appeared as a response to Microsoft's Passport network identity management system, and Ericsson are a sponsor member, alongside companies such as Nokia, Novell, Sony and Sun. Project Liberty is all about creating, managing and authenticating online identities and brokering services based on information related to that identity.

This type of authentication operates as a service on the network and relies on the connection being present. It encourages the use of open, federated identities across multiple service providers, whilst providing the users with a single point of sign on.

While the initial noise from the Liberty Alliance revolved around Web Services, it's clear from membership and announcements like this, there is huge impact in the mobile data world. To make mobile data services operate like a utility will require identities to be managed seamlessly and efficiently.

Of course the mobile data world is not made safe by a single product, but products and procedures acting together, backed up by law enforcement and even insurance. The network centric view of it as a utility is too simplistic, as the devices connected are too smart, too independent, too personal. The personal computer is inherently an insecure device. As enterprises move from desktops and fixed offices to laptops, PDAs and mobile networks the problems intensify.

What becomes important is the ease in which mobile devices are made secure and services can be delivered to those who are entitled to receive them. Strong security is worthless is it's difficult to implement or use. Both the IT and Telecoms communities must talk closely and work together to ensure they combine the best of both worlds.

© IT-Analysis.com

Beginner's guide to SSL certificates

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.