Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Mobile
    • Networking

    IBM Bans Apple’s Siri on Big Blue Networks for Security Reasons

    Written by

    Darryl K. Taft
    Published May 23, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As well-mannered and well-intentioned as she may be, Apple€™s Siri is not welcome at IBM€”at least not on the company€™s networks.

      According to an MIT Technology Review report, IBM has banned the use of Apple€™s Siri digital assistant on its networks because of security and privacy concerns.

      €œThe company worries that the spoken queries might be stored somewhere,€ IBM CIO Jeanette Horan told MIT Technology Review.

      And, indeed, Wired Enterprise explained:

      “It turns out that Horan is right to worry. In fact, Apple€™s iPhone Software License Agreement spells this out: €œWhen you use Siri or Dictation, the things you say will be recorded and sent to Apple in order to convert what you say into text,€ Apple says. Siri collects a bunch of other information€”names of people from your address book and other unspecified user data, all to help Siri do a better job.“

      More and more enterprises are moving to adopt bring-your-own-device (BYOD) strategies, which tend to enhance employee productivity and job satisfaction as employees can use their own devices to get work done. Yet BYOD is fraught with challenges such as that posed by Siri.

      Not only is security a concern, but as much as BYOD can promote productivity, it also can possibly draw from it if employees want to access media or play their Angry Birds or Words With Friends during working hours.

      Of course, like Siri at IBM, many types of media, apps and games are suppressed or banned on company networks under BYOD policies and acceptable-use agreements. These agreements tend to include clauses in which employees have to agree to allow the company to remotely wipe or delete data on their devices in the event it is lost or stolen.

      Enterprises employ various methods of controlling or managing how employees use their personal devices on the companies€™ systems. For instance, many use geo-fencing, which is the practice of limiting mobile employees€™ access to certain apps and data when they are within the company€™s premises. And when they leave the premises, depending on their role, they may no longer have access to sensitive company information€“so their neighbor on the train home can€™t peer over and see sales figures, revenue forecasts or whatnot.

      In addition to banning Apple€™s Siri, IBM also disallows the use of public file-transfer services such as Dropbox, Horan said.

      Companies have to monitor and control devices in the corporate enterprise€”both those provided by the company as well as personal devices brought in by employees under a BYOD program.

      Speaking on a panel at IBM€™s Impact 2012 conference in Las Vegas on May 1, Bob Sutor, vice president of the IBM Mobile Platform, said: €œPeople lose mobile devices far more often than you think.€ So IBM employs a policy of being able to remotely wipe devices. €œBut we try to differentiate and say these are the general security infrastructure items we have to include. And for people who do want to leave something on the phone, we did encryption.€

      Dale Potter, CIO at The Ottawa Hospital in Ottawa, Canada, said the hospital is so aggressive with mobile and BYOD that he gets calls from the Information and Privacy Commissioner of Ontario about keeping sensitive data secure.

      Potter said the hospital gives iPads to a growing number of its staff, mostly physicians, but others as well. The hospital also provides iPhones to some staff and allows workers to use their own iPads and iPhones on the hospital network in a BYOD environment.

      €œWhat I like about the iOS devices is they have hardware encryption,€ Potter said. €œWe also have Android devices and other mobile devices in our supply and that€™s more of a worry. There€™s potentially more of a problem with Android because of its software encryption.€

      Potter added that the move to more mobile devices has meant a decrease in PCs at the hospital. €œThe world is changing; my PC requests have dropped 50 percent,€ he said. €œWe€™re ripping out PCs because everybody€™s carrying an iPad.€ The hospital has 3,000 iPads, he noted.

      IBM€™s Sutor said demand for BYOD is growing at IBM. €œOf course, IBM has its own corporate rules,€ he said. €œIBM has 440,000 employees. Of those, 120,000 access the network via mobile devices€”and 80,000 come from employee-owned smartphones and tablets.€

      So the move to empower employees with smart mobile devices that enable them to work remotely and access key systems from wherever they may be is clearly growing. For most, it is a function of enhancing productivity. But for Potter and his environment, it could be an issue of life and death.

      €œIf I tried to remove the mobile devices out of our environment, not only would it be life-threatening for me, it would have safety issues for our patients,€ he said.

      Darryl K. Taft
      Darryl K. Taft
      Darryl K. Taft covers the development tools and developer-related issues beat from his office in Baltimore. He has more than 10 years of experience in the business and is always looking for the next scoop. Taft is a member of the Association for Computing Machinery (ACM) and was named 'one of the most active middleware reporters in the world' by The Middleware Co. He also has his own card in the 'Who's Who in Enterprise Java' deck.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×