Tablet PC enterprise application security is not enough?

As tablet PCs have become popular in the consumer and corporate markets, more and more applications have been developed to enhance usability, but experts believe that resolving security issues will be the next top priority.

Edison Yu of Frost & Sullivan warned that users must begin to realize the risks of information security. Many applications, such as e-mail, may allow criminals to steal and sell your personal privacy during daily use.

JustLogin CEO Kwa Kim Chiong said that the information security issues faced by operating applications on tablet computers and accessing the Internet via web pages are no different. Such as the email application, he said, "When you use the application, the threats also exist."

The company that provides SaaS services in Singapore added that when tablet users log in through a wireless network, communications may also be intercepted by hackers. However, Bryan Ma, who is responsible for computer equipment and surrounding issues IDC Asia Pacific, said that the current information security issues for tablet PCs have not been shaped. For tablets, because of the small number, it is not a big problem compared to other computer devices. "If you want to target threats, the Windows platform is much more threatened in terms of volume."

The use of tablet computers is increasing day by day. A report released by analysts of Gartner last November pointed out that multimedia tablet computers will replace about 10% of personal computers by 2014, and another manufacturer said that there are about 70 million tablet computers this year. When sold, every 2.5 tablet computers sold will lose the performance of a personal computer.

The tablet ecosystem, which is urgently needed to build a secure tablet ecosystem, said that as more and more companies adopt tablets, suppliers will start looking for models with more information security capabilities in communication. He said: "When tablet PCs serve more enterprise front-end applications, information security issues are even more important."

IDC’s Ma said that PlayBook, which RIM has not yet sold, is probably already equipped with information security tablets. Because RIM has worked hard in this field for a long time, it provides a secure communication protocol, which is why many companies and IT managers use it.

Because users may not have complete security capabilities, in the question of who should be responsible for the security of the tablet computer, Yu of Frost & Sullivan said that all hardware and software vendors have the responsibility to contribute their efforts. IDC’s Ma mentioned that hardware vendors must increase the appeal of their products and, in the future, they should add information security as much as possible.

However, Yu also warned that end-users can restrict the sharing of information on webpages, and corporate users must understand that tablet computers still belong to consumer electronics products, and that there is still information security concerns in the corporate environment.

Kwa pointed out that the application must also have security features, such as Apple's check and verification before the application store through the release, than the general network of applications to be safe, because at least through such a program can know that each application is actually Who is responsible for it.

Posted on