RSA Conference Europe 2012 - Podcast: Smartphone Security Winners and Losers.





The interactive transcript could not be loaded.



Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Sep 17, 2012

Cesare Garlati: interview with Jeanne Friedman, content manager for RSA Conference.


RSA Conference Europe 2012 - Podcast: Smartphone Security Winners and Losers.

Jeanne Friedman: This is Jeanne Friedman, content manager for RSA Conference. I'm speaking with Cesare Garlati, Vice President of Mobile Security at Trend Micro. His session in the mobile security track is titled "Smartphone Security Winners and Losers." Hello, Cesare.

Cesare Garlati: Hello Jeanne, how are you?

Jeanne: I'm good. As Vice President of Mobile Security at Trend Micro, Cesare
Garlati is responsible for raising awareness of Trend Micro's vision for security solutions in the consumerized IT world. Prior to Trend Micro, he held director positions within leading mobility companies, such as Smith Micro, iPass and Wave Market. Can you tell us more about your study that you did on mobile platform security?

Cesare: Yes, absolutely. We wanted to really at Trend Micro, get the sense of how secure and manageable are the new mobile platforms out there. This has been a recurring question, because the traditional mobile platforms, namely Nokia Symbian and RIM Blackberry, were actually designed for the enterprise. Now, the new mobile platforms, Windows Phone, Android and Apple iOS, are, in fact, quite different in terms of design criteria. The security and manageability requirements that the enterprise expects are still not quite there. So what we wanted to do was to poll a group of independent experts, and ask them to rank each of these three new platforms with regard to security and manageability, and that's what we did.

Jeanne: That sounds really interesting. So, can you let us know or do you want to wait for your session to tell us what mobile brands were the winners and losers?

Cesare: Well ... I don't want to spoil the surprise to the people who will join my session, but what I can tell you is that while I was running this study with mobility experts, I also asked our marketing department to run a parallel survey and ask the very same question, but to the IT manager. Basically, we wanted to compare perception out there versus reality. What I can tell you is that the answers that we got were quite different. So, for the people who are interested in joining my session: you might think that some of the platforms out there are secure while our mobility experts actually think differently. Something else that I can add is that as a group, as an aggregate, the new mobile platforms still has a long ways to go in terms of manageability and security. So, I think people who really want to learn who the winners are will have to join my session.

Jeanne: Well that's fair. However, can I ask you specifically about Android right now? Are there any Android exploits that make organizations with BYOD policies the most vulnerable?

Cesare: Yes, that's a great question Jeanne. Let me start with a mobile security fact. Android is the number one platform in the world. It is also the most vulnerable to attack. In fact, it is the most exploited. So, IT managers are there, but really, every consumer who is rarely benefiting from this new technology - from Android - really needs to understand that the system itself is designed with very strong security criteria. There are some built in security features that really make Android one of the most solid platforms out there. However, the overall ecosystem around Android is quite different than the one that we are familiar with Apple iOS. The main key difference is that Android is an open system and, therefore, that the Android Market and the various websites where Android applications can be bought and download is open. This somehow removes some of the filters, some of the scrutiny that Apple with iOS is in fact capable of. As a consumer, as an IT manager, you have to understand that when you download an application, no one really checks what the application is actually going to do with your personal data, with the financial information you stored in your device, with the privacy of your communications and your text messages. I think this is the message really with regard to Android: very well designed in terms of security - built in security features -- but the ecosystem is probably too open to really grant that level of security and trust that consumers and IT managers would expect.

Jeanne: That's really interesting. But, I'm going to ask you about Apple as well because are there any vulnerabilities related to the Apple jailbreak devices that also make companies vulnerable?

... read the rest of the interview at http://BringYourOwnIT.com


When autoplay is enabled, a suggested video will automatically play next.

Up next

to add this to Watch Later

Add to

Loading playlists...