Apple Defies Gravity… Again

iPhone6-34FR-SpGry_iPhone6plus-34FL-SpGry_Homescreen-PRINT

As the story goes, the young Isaac Newton was sitting in his garden when an apple fell onto his head and, in a stroke of brilliant insight, he suddenly invented the theory of gravity.1 The story is almost certainly embellished, though it has found its place in popular culture, and has been taught to generations of young receptive science students ever since.

Winding the clock forward to 2015 brings us to a whole new and different kind of Apple (NASDAQ:AAPL). On January 29th Apple became the most profitable company in history. This is an incredible achievement. Examining how Apple has achieved this milestone is even more amazing.

Apple’s sales and profitability are driven by sales of the iPhone (currently 69% of revenues), and more specifically by the new iPhone 6 and 6 Plus. During the last quarter, Apple sold a staggering 74.5 million iPhones. This equates to 830,000 devices per day or 35,000 per hour for 24 hours per day, 7 days per week. This represents a 46% increase in iPhone sales year-on-year, while simultaneously increasing the iPhone average selling price by $50 to $687 per unit. For reference, average smartphone prices have declined from $440 in 2010 to an estimated $275 in 2015. Apple defies gravity… again, indeed.

To quote from Motley Fool2 “That Apple can deliver both massive sales volume and rising prices in the context of rapidly declining industry prices speaks wonders about Apple’s competitive differentiation and the booming popularity of its new iPhone 6 and 6 Plus models”. Many congratulations to Tim Cook and the whole Apple team on this achievement.

As companies get bigger, continued rapid growth gets much, much harder. It is therefore tempting to assume that Apple’s incredible performance cannot be sustained. The Economist sums the problem up well in “Apple Reigns Supreme”.3

However, Apple’s recent history suggests otherwise. Apple will launch its much awaited (and much hyped) Apple Watch in April. Will this new device completely redefine the watch and show us all the critical things that we have been missing until now, or, will it fade as a niche luxury product that only appeals to the wealthy and tech obsessed?

No one knows for sure. We will have to wait and see. However, I suspect that we will be reading similar glowing coverage later this year as Apple Defies Gravity… Again.

Stay tuned….

– Matt

Links:

1. Isaac Newton and the apple.
2. Motley Fool on Apple’s Results.
3. The Economist – “Apple Reigns Supreme When It Comes to Making Money”.

One of 7 Cool Products Interop NY – LINK by Mobile Helix

Interop Big Apple opens today at the Javits Center.

We are thrilled to announce that LINK was selected by InformationWeek as one of “7 Cool Products” at Interop NY. Thank you very much, InformationWeek, for spotlighting our Link enterprise mobile app as an innovation solution for mobile professionals.

You can see LINK for yourself one of three ways:

1. Attend our session, Enabling Secure Mobile Workflows in the Real World, Weds. 10/1, 11:30 AM at Interop. Details here: http://goo.gl/4Ccucb

2. Visit Booth 429 at Interop to meet us and to see a demo of Link.

3. If you are not at Interop, take a look at our terrific 1 minute videos showing Link Email, Files and SharePoint here: http://goo.gl/V0zZF6

Link frees you from the office. Quickly access your work files, Outlook, SharePoint, and company web applications from a single workspace on your smartphone or tablet. We focus on providing the workflows which you use daily, such as sending a doc from behind the company firewall to a client and editing Office docs while mobile. You can even access your files when you are offline. Link secures sensitive corporate data rather than the mobile device itself and can be deployed on premise or as a cloud service.

See you at Interop – Maureen, Matt, and Ilya

Mobile Helix Introduces Link at INTEROP NYC

Next week we celebrate our New York City roots by bringing Link to Interop NYC. Link is a secure mobile app which makes it easy to work with company files, Outlook, Office, SharePoint, and intranet apps from a single workplace on your mobile device.

See Link in action and learn more about the workflows which Link enables at our Technology Briefing at 11.30am on Wednesday October 1st, in Vendor Tech Session Room 2, located in Booth #745, Expo Floor, Level 3.

In the Expo, visit us in booth 429 to view a quick demo of Link. You will see, for example, how easy it is to compose an email and attach a link to a file which is stored behind the corporate firewall – no need for public cloud solutions.

You can even take the Link iOS Test Drive in our booth. Install Link on your iOS device and try out Link on the spot.

From the IT perspective, the beauty of Link is that it is simple to deploy and maintain. Total cost of ownership is low as Link runs on standard IT infrastructure such as VMs, app servers, and HTTPS connections. Link is encrypted end-to-end, with AES-256 encryption at-rest and TLS over HTTPS in-motion. We will show you Link’s policies to manage security, roles, users and apps in our management console.

Interop has long been the leading conference on infrastructure, the Cloud, security, and mobility. Interop NYC is held at the Javits Center. In fact, it’s not too late to register for a free pass to the Expo (available through Sept. 26th).

Look for Link at booth 429.

–Maureen

Interop_NYC_iny14_160x90

SharePoint 2014 Wrap-up

President Bill Clinton and Danica Patrick are behind us now and we are all back at work, catching up.

I have a few observations about SPC14 before we head off to the American Bar Association Techshow in Chicago.

    1. I am quoting, “They should have called it Office 365 Conference 2014.” Indeed. If you have not seen Office 365 recently, take a good look. The interface is intuitive and friendly. The line between Office 365 and SharePoint 2013 blurs. Maybe SharePoint fades away and the capabilities become part of Office 365?

    2. Yammer. No surprise here. Yammer social leads the way over SharePoint social.

    3. Office 365 provides enhancements in security and control, including second factor authentication and rights management.

    4. Business Intelligence takes a front seat. Analysis is done in Excel. A new product, Power BI, surfaces the data in Office 365 and offers collaboration.

    5. Speaking of collaboration, in Office 365, concurrent users can now collaborate in editing Excel. This was already available in Word.

    6. Oslo and the Office Graph.

Oslo is the code name for the new, powerful search in upcoming in Office 365, based on FAST. But it’s more than searching on a keyword. Oslo is the intelligence behind the Office Graph. The Office Graph understands a user’s relationships to people and content. Then Oslo serves up cards which provide the user with content and news which she is likely to be interested in.

Pictures are helpful: http://blogs.office.com/2014/03/11/introducing-codename-oslo-and-the-office-graph/

It strikes me that Microsoft is moving very rapidly to close the gap in hosted apps and in social. Oslo is slated for release later this year. If Microsoft delivers on the Oslo promise, it will be an almost dizzying leap forward.

Whether it is SharePoint Conference or Office 365 Conference – see you next time.

If you are in legal IT, look for us in booth 104 at ABA Techshow, Chicago Hilton, March 27th and 28th.

– Maureen

Who can you trust in a BYOX world?

Apple has long held the reputation as the most trusted device vendor in the new BYOX World. iPhones and iPads are the devices that corporate executives demand most, and, fortunately, they are also the devices that corporate IT is most likely to trust. Generally that trust relies on Apple’s approach to the app store – a supposed “walled garden” that keeps the malware out, and allows only well-written and productive apps in. Although the actual merit of that trust is open to debate , trust in Apple has endured.

On Friday, Apple released iOS update 7.0.6 and iOS 6.1.6 without much fanfare and with the advice that users should install it to “fix an issue with SSL verification”. So far, the patch has been issued for iOS but not for OSX, which is also impacted by the vulnerability. Read the details of the vulnerability, and it is clear that this is a serious vulnerability that merits a serious response. Should this vulnerability be a wake-up call to IT to rethink that trusted view of Apple?

How significant is the problem? Should users be concerned?

The short answer is, very significant, and yes users should be very concerned.

The problem lies in Apple’s implementation of a critical aspect of the SSL/TLS (secure socket layer, or its newer revision called transport layer security) protocol – a key foundation of Internet security that allows sensitive information to be exchanged securely over public networks. It turns out that Apple software isn’t performing SSL certification verification properly. This vulnerability leaves iPhone, iPad and Mac computer users open to a potentially serious man-in-the-middle (MITM) attack.

The flaw is caused by a very simple coding mistake in the SSL certificate verification code in Apple’s Secure Transport library. It appears that this flaw has existed since iOS 6, and was still present in the latest beta version of iOS 7.1. Certificate verification is the implementation for one of SSL’s most fundamental precepts – end-to-end trusted communications. The idea behind the SSL certificate mechanism is that an SSL client (e.g., your web browser) can verify the authenticity of a website that it is communicating with by requesting a certificate. This certificate is similar in spirit to a passport – it is a unique, cryptographically secure mechanism for declaring a website’s identity, and, much like passports, certificates are issued by trusted entities called Certificate Authorities. Certificate Authorities take responsibility for ensuring that certificates are only issued to deserving recipients – legitimate businesses whose intentions are not malicious or illegal.
If certificate verification is not functioning properly, the entire system of chained trust falls apart enabling MITM attacks.

In such an attack, a malicious entity is able to intercept “secure” communications between an individual and the intended recipient or website. The attacker is able to read, insert and modify the data in the intercepted communication. The malicious entity can also impersonate a trusted website to install malware or steal valuable data like login credentials and passwords.

A worst-case scenario would look something like this: An unsuspecting user connects to a public WiFi hotspot. If that hotspot had a malicious listener attached to it, that listener could intercept traffic intended for an e-commerce or electronic banking site and steal usernames, passwords, account numbers, credit card numbers, etc. The user would have no warning that this theft was happening, and from the user’s perspective browsing to the malicious site would appear no different than browsing to the legitimate site. This is a dangerous vulnerability indeed.

So what are the implications of this troubling news?

No software is immune from vulnerabilities, and many serious vulnerabilities are uncovered that receive little or no attention in spite of the fact that their impact may be as severe as this issue in iOS and OSX. Apple is perhaps unfairly held on a pedestal, and from that pedestal even the slightest mistake can easily turn into a media storm. However, Apple has made a serious mistake in this case, and it is not the vulnerability itself.

The difference between those vendors that “get” security and those that don’t is in how they respond when vulnerabilities are inevitably discovered. Microsoft has been down this road and back, and prior to Bill Gates’ “Trustworthy Computing” memo Microsoft was the worst offender of all, both in terms of the number of vulnerabilities in their software and their repeated poor responses to them. However, Microsoft realized that growing their business in the enterprise required trust, and building trust with their largest customers meant getting serious about security. The result is not 0 vulnerabilities – that is impossible. The result is proactive, clear processes for communicating vulnerabilities and their impacts to customers and a patching process that allows IT to update effected software without forcing IT to broadly apply major upgrades that may have other, unintended and unwanted consequences.

Unlike Microsoft, Apple’s largest customers are not corporate entities that demand a robust security strategy. Apple builds devices for consumers, and it is these tens of millions of individual customers who are now forcing IT to embrace Apple devices, regardless of whether or not IT has any relationship with or influence on Apple. To some degree, Apple’s response to this issue shows that they are in tune with their customers, and, unfortunately for IT, IT is not Apple’s customer. Apple is not alone in its allegiance to consumers; Google and the Android ecosystem is the same, if not worse. So what is IT to do?

The Answer:

To keep data protected and secure, IT must retain control of the technology that ensures data security and that means entrusting the sanctity of sensitive corporate data with a company that views corporate IT as its most important customer. This does not mean that forcing all end users to Windows Phone is a good, or even viable idea.

Consumerization is here to stay. That means that IT has to adjust to the reality that end users are making device choices, not IT. Device centric security, however, in a consumer-driven mobile market, delivers a very troubling false sense of security.

The solution? A data focused security approach that remains fully under the control of IT and provides the appropriate level of protection and control that IT needs to keep data safe. In this case, when a security vulnerability appears, which it inevitably will, IT has the necessary tools, relationships, and control at their disposal to diagnose and fix the problem on their own timeline for their own users.

Unfortunately, this won’t be the last time that we see stories like this about potentially serious security vulnerabilities in software that we rely on and use every day. However, we do have the option to retake control of the solutions we use to secure our most sensitive data, and to ensure that our sensitive data is fully protected and under our own control.

– Seth

Seahawks, Microsoft and the mobile web revolution

Today is a huge day in Seattle – congratulations Seahawks fans! And with the apparently impending announcement of Microsoft’s new CEO it seemed a good time to comment on our perspective on Microsoft’s position in enterprise software and the demands for mobility.

It’s always refreshing to get out of my local market, the San Francisco Bay area. Here in the land of Google, Apple, Salesforce.com and Box there are plenty of people who have written off Microsoft. To be sure, Microsoft has a lot of work to do to ensure that its products retain, and regain, relevance in the next three to five years. Microsoft has missed the boat in consumer software. Still, it is important to keep in mind that in the enterprise Microsoft is doing colossal business. For their second quarter Microsoft reported posted profits of $6.6 billion on record quarterly revenue of $24.5 billion, beating the street. There were strong gains in the enterprise services sector, which includes Azure and Office 365 for business users.

In many verticals including financial, insurance, energy and professional services, Outlook and Office are the life blood for many of the largest companies in North America. Small and medium-sized business may have more flexibility to try something new. However, many don’t have huge security teams and therefore don’t want to go out on a limb with technology which may present new security challenges.

Moreover, visit enterprises outside of North America. Microsoft is a long established, trusted entity in many regions. Some regions are very reticent to move files to the public cloud or to use web-based apps.

Windows 7 (or its non-Metro successor) on the desktop, Office and Outlook, Active Directory/LDAP, Exchange, and SharePoint – in large enterprise firms and regions outside North America I see no rush to replace these products. Therefore, we provide intuitive mobile access to these solutions. We receive high praise for our SharePoint and Email (MS Exchange-based) user interfaces.

Yet, our Link Unified Endpoint Architecture APIs are flexible. Link is well-positioned to support the mobile web revolution. We can, and do, support other web applications, including SaaS applications, such as ECM and issue tracking, inside of our secure Link Container.

In summary – Microsoft is bread and butter for us in the enterprise. At the same time, Link is a simple and secure way to mobilize any web app, including SaaS apps. We embrace both.

– Maureen

ILTA Catalyst 2013

ILTA 2013 logoVisit Us at ILTA 2013: The Catalyst – Booth 720

We are headed to the Catalyst, the International Legal Technology Association’s annual conference.  This year it takes place at Caesar’s Palace, Las Vegas, from August 18th through 22nd. The Catalyst is very popular because legal technology professionals can count on sessions which are relevant to the challenges particular to legal IT.

We will be demoing our secure mobile apps which allow attorneys to be productive no matter where they are working, with secure access to resources behind the firm’s firewall.

– Link Filebox App – Provides secure access to file directories. Attorneys can save files for offline access as well as edit WORD and EXCEL docs.

– Link SharePoint List App – For easy access to files, tasks, blogs, calendars and any list items. Attorneys can save files for offline access as well as edit WORD and EXCEL docs.

– Link Email, Contacts & Calendar AppLink Email is integrated with Microsoft exchange to provide attorneys with secure mobile access to Outlook from our intuitive user interface. The secure integration of our Email app with the firm’s intranet prevents data loss. For example, an email with a link to a document behind the firm’s firewall is opened within our secure container and cannot be saved outside of the container on the device. However, the document can be saved within the secure container for review later. WORD and EXCEL files may also be edited, while remaining encrypted.

– Link HTML5 SDK Many law firms are ahead of the curve in developing HTML5 mobile apps.  Our HTML5 SDK is open source, standards-based and no-cost.  Built on jQuery/jQuery Mobile and with Apache Cordova/Adobe PhoneGap incorporated, our SDK streamlines HTML5 development.  The SDK includes our libraries for advanced features including offline access, multi-tab browsing, split screen scroll and real-time push notifications.  To secure HTML5 apps you have the option of licensing our secure Helix Browser but there is no lock-in to our products.

The Catalyst is a terrific conference with a friendly focus on networking and technology.  We’ll be tweeting at #ILTA13.

Stop by booth 720 to see a demo, to get your Bingo card stamped and to enter our drawing for a popular Apple product.

You can still register and read all about the Catalyst here:  http://conference.iltanet.org/

Maureen