Feeds

iPhone secure enough for Japanese enterprise

Makes you wonder what they know

Security for virtualized datacentres

While the iPhone might be not secure enough for American and European enterprises, BrearingPoint has decided to equip 1,000 of its Japanese employees with Apple's uberphone.

Softbank Mobile is providing the handsets to BearingPoint, a technical consultancy that currently issues its consultants in Japan with both a phone and a data card.

The deal is the first major corporate iPhone contract in Japan according to PC World, and is significant as smartphones haven't proved as popular in Japan as elsewhere. That's partly because of the functionality offered by "feature phones", but also because of the control exerted by network operators over handset design and capability.

The iPhone has raised the profile of smartphones, and the Apple-controlled application distribution mechanism provides an intermediate step between the strictly-operator-controlled existing environment and the free-for-all chaos of Windows Mobile, Symbian - or indeed Android - application distribution systems.

The security issues that still afflict the iPhone don't trouble BearingPoint, though many western companies will want to see better security implemented by Apple before they risk their company secrets on the platform. ®

Internet Security Threat Report 2014

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.