Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • Mobile
    • Networking

    IBM Bans Apple’s Siri on Big Blue Networks for Security Reasons

    By
    Darryl K. Taft
    -
    May 23, 2012
    Share
    Facebook
    Twitter
    Linkedin

      As well-mannered and well-intentioned as she may be, Apple€™s Siri is not welcome at IBM€”at least not on the company€™s networks.

      According to an MIT Technology Review report, IBM has banned the use of Apple€™s Siri digital assistant on its networks because of security and privacy concerns.

      €œThe company worries that the spoken queries might be stored somewhere,€ IBM CIO Jeanette Horan told MIT Technology Review.

      And, indeed, Wired Enterprise explained:

      “It turns out that Horan is right to worry. In fact, Apple€™s iPhone Software License Agreement spells this out: €œWhen you use Siri or Dictation, the things you say will be recorded and sent to Apple in order to convert what you say into text,€ Apple says. Siri collects a bunch of other information€”names of people from your address book and other unspecified user data, all to help Siri do a better job.“

      More and more enterprises are moving to adopt bring-your-own-device (BYOD) strategies, which tend to enhance employee productivity and job satisfaction as employees can use their own devices to get work done. Yet BYOD is fraught with challenges such as that posed by Siri.

      Not only is security a concern, but as much as BYOD can promote productivity, it also can possibly draw from it if employees want to access media or play their Angry Birds or Words With Friends during working hours.

      Of course, like Siri at IBM, many types of media, apps and games are suppressed or banned on company networks under BYOD policies and acceptable-use agreements. These agreements tend to include clauses in which employees have to agree to allow the company to remotely wipe or delete data on their devices in the event it is lost or stolen.

      Enterprises employ various methods of controlling or managing how employees use their personal devices on the companies€™ systems. For instance, many use geo-fencing, which is the practice of limiting mobile employees€™ access to certain apps and data when they are within the company€™s premises. And when they leave the premises, depending on their role, they may no longer have access to sensitive company information€“so their neighbor on the train home can€™t peer over and see sales figures, revenue forecasts or whatnot.

      In addition to banning Apple€™s Siri, IBM also disallows the use of public file-transfer services such as Dropbox, Horan said.

      Companies have to monitor and control devices in the corporate enterprise€”both those provided by the company as well as personal devices brought in by employees under a BYOD program.

      Speaking on a panel at IBM€™s Impact 2012 conference in Las Vegas on May 1, Bob Sutor, vice president of the IBM Mobile Platform, said: €œPeople lose mobile devices far more often than you think.€ So IBM employs a policy of being able to remotely wipe devices. €œBut we try to differentiate and say these are the general security infrastructure items we have to include. And for people who do want to leave something on the phone, we did encryption.€

      Dale Potter, CIO at The Ottawa Hospital in Ottawa, Canada, said the hospital is so aggressive with mobile and BYOD that he gets calls from the Information and Privacy Commissioner of Ontario about keeping sensitive data secure.

      Potter said the hospital gives iPads to a growing number of its staff, mostly physicians, but others as well. The hospital also provides iPhones to some staff and allows workers to use their own iPads and iPhones on the hospital network in a BYOD environment.

      €œWhat I like about the iOS devices is they have hardware encryption,€ Potter said. €œWe also have Android devices and other mobile devices in our supply and that€™s more of a worry. There€™s potentially more of a problem with Android because of its software encryption.€

      Potter added that the move to more mobile devices has meant a decrease in PCs at the hospital. €œThe world is changing; my PC requests have dropped 50 percent,€ he said. €œWe€™re ripping out PCs because everybody€™s carrying an iPad.€ The hospital has 3,000 iPads, he noted.

      IBM€™s Sutor said demand for BYOD is growing at IBM. €œOf course, IBM has its own corporate rules,€ he said. €œIBM has 440,000 employees. Of those, 120,000 access the network via mobile devices€”and 80,000 come from employee-owned smartphones and tablets.€

      So the move to empower employees with smart mobile devices that enable them to work remotely and access key systems from wherever they may be is clearly growing. For most, it is a function of enhancing productivity. But for Potter and his environment, it could be an issue of life and death.

      €œIf I tried to remove the mobile devices out of our environment, not only would it be life-threatening for me, it would have safety issues for our patients,€ he said.

      Darryl K. Taft
      Darryl K. Taft covers the development tools and developer-related issues beat from his office in Baltimore. He has more than 10 years of experience in the business and is always looking for the next scoop. Taft is a member of the Association for Computing Machinery (ACM) and was named 'one of the most active middleware reporters in the world' by The Middleware Co. He also has his own card in the 'Who's Who in Enterprise Java' deck.

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×