Perimeter

2/24/2011
03:23 PM
Rob Enderle
Rob Enderle
Commentary
50%
50%

FileMaker For Securing iPads At Work

Rather than just saying "no" to the iPad at the office, consider this inexpensive way to secure these tablets

One of the biggest trends in business at the moment is companies using iPads instead of laptops for mobile employees -- and it's driving IT managers nuts.

As with most trendy products, starting from Windows 95 and up to the current iPad, that weren't really designed for business IT, many, if not most, companies just say "no." In fact, I've seen a lot of IT careers end over saying "no," as well as a number enhanced by finding ways to give users, line managers, and, especially, executives, what they want.

There currently are two favored methods of getting the iPad to work securely, particularly in areas like healthcare, which has always favored tablets but has extreme security requirements. The most common way to secure an iPad is by using Citrix, but one I hadn't thought about was using FileMaker -- and it could be the faster and cheaper alternative.

FileMaker is a wholly owned subsidiary of Apple and a database company. The product's primary competition is probably Microsoft Access, and you might be surprised to learn that more of its customers are on Windows than Macs. It's known for ease of use and ease of development.

FileMaker also provides an interface into SQL databases against which you can quickly and cheaply design PC interfaces. The newly released FileMaker Go for the iPad has similar capabilities, allowing a firm to create an interface quickly for an iPad for any existing SQL database like patent records. The records remain on the host server, never moving to the iPad. This last point is important because the iPad does not meet minimal security requirements, yet may not need to if the data never actually resides on the device except the current file for viewing, which isn't archived. In other words, once the current login expires, there is nothing on the device that is confidential were it to be compromised. This is the same advantage of Citrix, which basically screen-scrapes a more secure device, leaving the iPad unexposed. Citrix is more universal, but much more expensive. So if you are being pressured to provide iPad access to secure information. and if it resides in a SQL database, then consider FileMaker as an inexpensive alternative. You may find it is vastly easier to learn than having to code a native iPad client, and far cheaper than Citrix to implement. It won't work everywhere, but it could be the best Apple-sourced alternative in terms of labor and financial cost.

-- Rob Enderle is president and founder of Enderle Group. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20122
PUBLISHED: 2019-02-21
The web interface on FASTGate Fastweb devices with firmware through 0.00.47_FW_200_Askey 2017-05-17 (software through 1.0.1b) exposed a CGI binary that is vulnerable to a command injection vulnerability that can be exploited to achieve remote code execution with root privileges. No authentication is...
CVE-2018-6687
PUBLISHED: 2019-02-21
Loop with Unreachable Exit Condition ('Infinite Loop') in McAfee GetSusp (GetSusp) 3.0.0.461 and earlier allows attackers to DoS a manual GetSusp scan via while scanning a specifically crafted file . GetSusp is a free standalone McAfee tool that runs on several versions of Microsoft Windows.
CVE-2019-8982
PUBLISHED: 2019-02-21
com/wavemaker/studio/StudioService.java in WaveMaker Studio 6.6 mishandles the studioService.download?method=getContent&inUrl= value, leading to disclosure of local files and SSRF.
CVE-2019-8980
PUBLISHED: 2019-02-21
A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.
CVE-2019-8979
PUBLISHED: 2019-02-21
Koseven through 3.3.9, and Kohana through 3.3.6, has SQL Injection when the order_by() parameter can be controlled.