Can you say second-factor authentication in Japanese?

Iikura-san in Japan kindly translates all of our Mobile Helix press releases to Japanese and posts them to his site. Take a look. 

Or, read our press release on our new LINK Second-Factor Authentication in English.

フォト

【LINK Mobileアプリは、弁護士が、スマートフォンやタブレットを使用して、法的なワークフローを、容易で、セキュアにする。】 ‘16.01.14
Continue reading

Crossing Things Off Your To-Do List and Staying In Control While Mobile

Eureka Light Bulb

Now that we understand why it is so difficult to be productive while mobile, in this third post we turn to a potential solution to this frustrating problem.

For several years now, enterprise software has been designed and built to run inside the corporate firewall, accessible from any web browser inside the company network. This made things so much easier – easier for IT to manage and deploy a single installation rather than software on every desktop, easier for a user to be able to use a company desktop, later a company laptop, and now a personal laptop or computer from home.

Those same systems that are so much more connected and convenient than software on our desktops are preventing our mobile devices from being more useful. Mobile devices can’t easily connect to portals and file repositories behind the corporate firewall. The result is that all those systems must be redesigned to work for mobile. So, how can I access the information that I need to cross things off my to-do list when I am mobile?

Redesigning existing systems is costly, complicated and is not feasible for most IT organizations. Fortunately, there is a better way to expose internal systems to mobile devices with a lot less work and effort. Two technologies, when combined, yield the desired functionality without complete rewrites. The first is secure containerization and the second is HTML5.

Secure containers have been in use for several years and are a natural evolution of MDM (Mobile Device Management). MDM enabled IT to lock down an entire device, monitor its location at all times, and even wipe all contents remotely – including any personal apps, pictures, and videos. A secure container enables IT to control just the corporate data on a mobile device, including the ability to wipe and to set policies on its use, without sacrificing personal privacy. This is good for security and is the first part of the solution. However, to be really useful, the container must also provide access to the suite of applications needed to complete the everyday game of Tetris that is our to-do list.

Enter HTML5 – the technology that is already powering many web based portals behind the firewall. With an HTML5 container, accessing internal resources – whether they are documents in a DMS, a corporate intra-net portal, SharePoint, or other web-based technologies becomes much easier.

An HTML5 container is a native app that provides core functionality like offline access and push-notifications. Enterprise web apps run securely inside the container. Very little rewriting is needed, HTML5 is more portable and future proof than native code implementations for mobile. Most IT teams have a good understanding of HTML5 and are able to write apps using it quickly and easily. Many existing apps that run on the corporate intranet run inside an HTML5 container unchanged. In addition, existing legacy systems like Exchange 2003 and SharePoint 2003 have well documented web-based APIs to access them, making it easy for new web apps to be written on top of legacy systems for mobile use.

The world has gone mobile. Now it’s time for corporate systems to catch up. Let me access my files from my mobile phone without sacrificing security. Let me grab a document from DMS and email it to a client over lunch. Let me quickly take an internal attachment, rename it, and send it to an external client while enjoying a cup of coffee. Enable me to get valuable tasks done whenever I have time instead of later when I’m at the office. Let me get more small inter-dependent tasks done on the go – much like I can quickly turn, twist, and move shapes in Tetris. Then I can get more rows cleared from my to-do list and have more time and more patience for my kids.

Thank you for reading. Please comment below and tell us what you think. We would love to hear your thoughts.

Ilya

Mobile App Blacklisting – An Exercise in Futility

sisyphus Image

The theory goes something like this. Mobile apps are the unregulated Wild West. Users are unable to make informed choices about which apps are “safe” and “appropriate” for work and therefore cannot be trusted. IT must assume the worst and create a “blacklist”1 of risky applications that that cannot be downloaded to any personal mobile device “approved” for work. This ensures the enterprise remains safe and free from infection while allowing employees to work using personal mobile devices. IT can sleep easier at night, employees are happy. Well, not really…

The App store had 1.3 million applications available for download in September 20142. This number is growing rapidly, from 1 million in October 2013. Then there is the Google Play store, the Windows store and others. How in practice can the IT team of any average company stay current on this vast app offering, blessing the good and weeding out the bad apples? Well they cannot. As fast as IT blacklists, enticing new apps appear. IT has no choice but to blacklist indiscriminately – preventing employees from using many powerful and completely benign mobile apps to do their jobs. An exercise in futility indeed. So, is app blacklisting worth the considerable effort required to implement and enforce?

Not only is app blacklisting an exercise in futility, it is also directly contrary to the compelling reasons to embrace enterprise mobility in the first place. Recent research from Citrix3 shows that two of the five most commonly blacklisted mobile apps are Dropbox (for file access and sharing) and personal email. Does blacklisting Dropbox and personal email access help or hinder the enterprise?

Employees need access to their enterprise files to work. Accessing personal email on a personal mobile device is a critical need. Why are users downloading Dropbox and personal email to their personal mobile devices? Is it so they can maliciously infect enterprise networks and threaten sensitive corporate data or is it so they can work more and be more productive in their personal time while outside the office? The answer is pretty obvious.

The majority of employees are motivated by good. They want to work as productively and effectively as possible. They want to use their down-time efficiently and get work done. This is why they are willing to use personal mobile devices that they purchase and pay for themselves to do so.

Blacklisting is a brute force approach that provides a false sense of security for IT. Blacklisting penalizes the most committed and valuable workers, punishing them for wanting to be more productive using their own personal mobile device. Something is very wrong here.

We have written previously about the “Legal Mobility Disconnect”. App blacklisting contributes to this significant productivity gap. The answer is for IT to lead and provide users with the mobile tools they need to do their job and get work done. This starts with file access and email. These IT provided solutions must be intuitive and easy to use. They must be secure and they must be readily available without imposing unreasonable restrictions on personal mobile device use outside of work.

If this post resonates, please explore Link by Mobile Helix and see if it offers you an alternative and more practical path to sustained, secure enterprise productivity. For those who remain unconvinced and plan to continue blacklisting, then you may want to read about Sisyphus4, who was engaged in a similar exercise in futility thousands of years ago – in his case for eternity.

We would love to hear what you think so please let us know.

– Matt

Notes and Links:

1. What is Application Blacklisting?
2. Statista App Store Statistics.
3. Citrix Mobile Analytics Report – February 2015.
4. The Myth of Sisyphus.

The Legal Mobility Disconnect

DeathtoStock_Wired6 (small)

Some interesting and thought provoking data on legal use of Mobile Technology from the ABA Techreport 2014¹, highlighting a significant “Legal Mobility Disconnect”. Though 91% of lawyers use a smartphone, and 49% are increasingly using tablets, work related mobile device use by lawyers remains limited to checking email (95%) only.

This is surprising. The ABA Legal Technology Survey shows that lawyers, like the rest of us, use mobile devices increasingly frequently in their personal lives. For example, camera (used by 66% of legal smartphone users), GPS/Maps (77.5% of legal smartphone users), Instant messaging /Chat (44% of legal smartphone users), and Text Messaging (73% of legal smartphone users).

In addition, though lawyers regularly download apps to their mobile devices for personal use (as reference, by October 2014, 85 billion apps had been downloaded from the App Store²), the majority of lawyers have never downloaded a legal-specific app (57%) or a business app (55%) to their smartphone or tablet. This highlights a significant Legal Mobility Disconnect. Most lawyers surveyed are failing to use their mobile devices to their fullest potential for work.

Why is this and what will it take to reverse this trend? Security, cost and complexity are the most often cited barriers to mobile adoption in studies of mobile enterprise adoption³. These are good reasons why lawyers have been reluctant to embrace mobility for their work.

However, there is another critical reason for the “Legal Mobility Disconnect” that has yet to be discussed. That is usability / ease of use. Since the mobile computing revolution began in 2007 with the arrival of the iPhone, we have become very sophisticated and discerning mobile users. We are quick to embrace new capabilities that are truly valuable and are easy and intuitive to use. Until this is true, new capabilities remain niche and unused, embraced only by the most geeky early adopter users.

What do we mean by usability / ease of use in a legal context? Well, we have a lot to say on this topic that we will share in blog posts to come. In addition, we are working hard to deliver a new mobile app designed specifically for lawyers that addresses this problem.

Please stay tuned – there is a more coming soon on the Legal mobility disconnect.

– Matt

1. ABA Techreport 2014 – Mobile Technology by Tom Mighell.
2. Statista Mobile Internet & Apps Portal – October 2014.
3. Fierce Mobile IT, IBM CIO Survey.

Interview: Seth Hallem, Mobile Helix – the right way to mobile security

Abstract: Most firms have made great efforts to catch up and deal with this issue, but Seth Hallem, founder and CEO of security firm Mobile Helix, thinks that the majority of them are looking at the problem in the wrong way.

This interview by Steve Mansfield-Devine with Mobile Helix CEO and Co-founder, Seth Hallem, originally appeared in Science Direct, Volume 2013, Issue 10, October 2013


Pages 18-20,
ISSN 1353-4858,
https://doi.org/10.1016/S1353-4858(13)70116-8.

https://www.sciencedirect.com/science/article/abs/pii/S1353485813701168

Posted 12/25/2023