Jump to content

The state of mobile device security: Android vs. iOS


Recommended Posts

Here is an unbiased look at the tewo leading ecosystems for smartphones and non Windows tablets running iOS or Android. It is very well written.




"Android or iOS is one of the biggest decisions you'll make for your company, especially regarding security. Here are the latest security updates from both ecosystems.


Major players in the mobile market have been making leaps and bounds over the past few years in order to position themselves as enterprise-ready. But, no matter how many updates the user experience gets, or what cool new features are added, security remains the ultimate battleground for enterprise mobility.


Nowhere is this seen more clearly than in the two leading mobile ecosystems -- Apple's iOS and Google's Android. Both are fresh from their annual developer events, bringing new approaches to security along with a host of new features.


Let's examine both companies' mobile OS strategies, their recent announcements regarding security, and how they are approaching the enterprise. Is there a clear winner?


The landscape

According to Gartner analyst Dionisio Zumerle, mobile security is in a "relatively good place today." The biggest reason, he said, is that mobile platforms were built from the ground up, with the existing knowledge of the previous few decades of personal computing. Security mechanisms such as app sandboxing, app store distribution, and user permissions are getting stronger.


Still, cyberattackers are getting more sophisticated as well. Zumerle cited the Stagefright vulnerability and xCodeGhost as key examples. However, both Apple and Google have recognized this shift and are taking steps to mitigate the additional risk, said John Pironti, president of IP Architects, LLC.


"They are actively working against motivated and capable adversaries who are attempting to identify and exploit vulnerabilities in their mobile offerings. Both Google and Apple now are accelerating efforts to enhance security, including the integration of third-party offerings and enforced use of leading security practices."


Both parties are addressing security, but their approaches are different.



(The article has all the info in the comparison)



(The article has all the info in the comparison)


The winner"


For the links and examples used in the comparison, and the winner and why, the full article is here:


http://www.rvroadie.com Email on the bottom of my website page.
Retired AF 1971-1998

When you see a worthy man, endeavor to emulate him. When you see an unworthy man, look inside yourself. - Confucius


“Those who can make you believe absurdities, can make you commit atrocities.” ... Voltaire

Link to comment
Share on other sites


This topic is now archived and is closed to further replies.

RVers Online University


RV Destinations

Find out more or sign up for Escapees RV'ers Bootcamp.

Advertise your product or service here.

The Rvers- Now Streaming

RVTravel.com Logo

  • Create New...