Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:45 AM

Could a Smartphone Solve the Notebook Security Problem?

Maybe instead of looking at them as a new problem, we should consider smartphones as a potential security solution

One of the big trends I’m watching for the next several years is the move to next-generation smartphones instead of laptops as the primary means of mobile access to increasingly cloud-based IT solutions. With the launch of the second-generation iPhone – as well as high-profile competitors based on Google and Microsoft technologies from vendors ranging from HP to Palm to RIM’s own Bold and Thunder – maybe it’s time we took a look at whether a smartphone could be part of the security solution.

Granted, up until recently the smartphone was seen as an unprotected problem. But with improvements to security and centralized management tools from a variety of players, it no longer needs to be. But could a laptop user really live on a smartphone – and what would be the security advantages?

Recently, I’ve been playing with a unique accessory called the Redfly Mobile Companion. What makes this accessory really interesting is that it's a laptop hardware emulator that works with a Windows Mobile phone. It doesn’t run an OS and doesn’t have any persistent storage. It simply re-displays what is on the phone on a laptop-sized screen, which is coupled with a laptop-like keyboard and touch pad. In effect, it turns your Windows Mobile-based smartphone into a laptop-sized device.

What's fascinating is that when you take the Windows Mobile user interface and blow it up to PC size, you actually get a much more livable experience. And although it is limited, the number of things you can do on a smartphone today exceeds what you could do on early laptops. If you are like me and mostly live on email, you can almost live on the result – the only real problems are the limitations of the browser and the bandwidth, both of which are improving rapidly.

There are performance issues with the current generation of smartphones. But both Apple’s new iPhone and Nvidia’s recently announced Tegra promise to address these shortcomings.

But how could smartphones be more secure than laptops? In a word: capacity – or the lack of it. One of the big problems with laptops is that people keep putting large databases of customer information on them – then find them lost or stolen, resulting in a public relations nightmare. And no matter how well this information is encrypted or protected, if we can’t certify that it has been destroyed, we are still pretty much screwed.

Smartphones, on the other hand, don’t have the capacity to hold that sort of data, so the exposure is vastly lower. And, unlike laptops, which are only occasionally connected to the network, smartphones are virtually always connected when they are turned on. They can more easily, and more assuredly, be wiped if they are lost or stolen.

Granted, this last point requires the use of relatively sophisticated management tools. But these tools are readily available, and they are very similar to tools that were developed for PCs. The combination of low memory and more persistent connectivity potentially makes smartphones much more secure than laptop computers.

There are drawbacks with currently available smartphones. I still think most current models are still too heavily reliant on password-based security. They should use biometrics or some other more secure access method.

In the end, though, I think it is past time we started looking at smartphones differently. We have to secure them and pay for them anyway. As the technology gets better – and it will, with Apple's introduction of the new iPhone later this year – we should see them as new, and possibly more secure, alternatives to laptops.

— Rob Enderle is President and Founder of Enderle Group . Special to Dark Reading

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cybersecurity Industry: It's Time to Stop the Victim Blame Game
Jessica Smith, Senior Vice President, The Crypsis Group,  2/25/2020
Google Adds More Security Features Via Chronicle Division
Robert Lemos, Contributing Writer,  2/25/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-02-27
In Wireshark 3.2.0 to 3.2.1, 3.0.0 to 3.0.8, and 2.6.0 to 2.6.14, the LTE RRC dissector could leak memory. This was addressed in epan/dissectors/packet-lte-rrc.c by adjusting certain append operations.
PUBLISHED: 2020-02-27
openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
PUBLISHED: 2020-02-27
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
PUBLISHED: 2020-02-27
openssl_x509_check_ip_asc in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
PUBLISHED: 2020-02-27
Type confusion in V8 in Google Chrome prior to 80.0.3987.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.