Feeds

Analysts slam iPhone security and battery life

Gartner puts brakes on biz takeup

Internet Security Threat Report 2014

Industry analysts have decreed that the new iPhone's lack of security and poor battery life make it unsuitable for all but the lightest enterprise use.

The conclusions come in a nine-page research note from Gartner, as reported by Computerword. Entitled iPhone 2.0 Is Ready for the Enterprise, but Caveats Apply, it is based on analysis of the new iPhone version 2.0 software and 3G handset.

According to Ken Dulaney, author of the report, the lack of battery life on the 3G iPhone makes it impossible to maintain synchronisation with an Exchange server for a full day even if no calls are made. That's a serious issue, but the lack of security is the biggest impediment to enterprise adoption.

The iPhone does now offer a remote wipe option allowing your local BOFH to clear data from lost or stolen handsets, but the lack of encryption on the device itself worries Ken, who believes it will also scare enterprise users.

Apple is hopeful that third-party applications will come along to provide encryption services, and assured Gartner that an API exists to provide encryption. However no applications are yet taking advantage of it, so there's no way to judge how that's going to impact battery life or usability.

Dulaney also highlights the high cost of roaming, and the usual niggles about lack of clip-board functionality - pointing out that if someone emails you appointment details then "the quickest way to [get them into the calendar] on the iPhone today is to write the details down on a piece of paper and re-enter them".

iPhones may already be found in many board-rooms, where senior managers have overridden IT department objections, but Apple would like to sell to the middle managers who lack that power, and that would be a lot easier with Gartner's seal of approval. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
YOU are the threat: True confessions of real-life sysadmins
Who will save the systems from the men and women who save the systems from you?
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Ofcom snatches 700MHz off digital telly, hands it to mobile data providers
Hungry mobe'n'slab-waving Blighty swallows spectrum
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.