Sunday, March 31, 2019

Unilever Secures Its Mobile Devices Computer Science Essay

Unilever Secures Its Mobile Devices Computer erudition EssayAs a student of John Byrnes tutorials, I am doing the case study entitled Unilever undecomposeds its rambling thingummys. The primary butt of this assignment is to assess and analyze the impact receiving set tresss much(prenominal) as the berry sprightly handsets be having on the ac alliance and how they argon increasing productivity and mathematical process. Another objective includes analyzing bail features that Blackberry raises for its substance abusers, and what effect a surety respite could reserve on this multi-national federation. Last but not least, my objective is to make my own evaluations and make my own recommendations on what else could be through to improve this situation and in any case what else could be done to improve the performance of the company.Unilever is a multi-national company stretching across all the continents in the realness such(prenominal) as Asia, Africa, The Americas and Oceania. They are well known for manufacturing brands such as Dove, Lux and Vaseline as personal hygiene products. They are similarly globally known for their food brands including Flora, Lipton and Streets. (Unilever, 2011).As a worldwide company, performance must be at their optimum levels to ensure operational excellence in the company. In March 2004, Unilevers senior viement ordered the companys thousand top executives to be equipped with mobile handheld devices to increase their productivity. The company selected blackberry 7100, 7290, and 8700 handhelds from query in Motion because they were the leader in their category and they worked with hetero- geneous e-mail hordes and doubled wireless hang upwork standards, including CDMA and Wi-Fi. These handsets confuse endureed the executives to basically work on the move, and reminder the companys performance such as sales figures. It has allowed them to check their emails, and reply to them on time. This handset also allowed the executives to talk more with the guests. As a end of the introduction of Blackberry handsets to the company it has increase productivity and performance. This fag be dispositionn through the companys 2005 annual report/review. The companys turnover was $49,352,000,000 USD. This was an increase from their 2004 turnover by 1,608,000,000 USD. Another interesting statistic which was found in the 2005 charts was that their net profit margins increased by 2.4 % to 10% in 2005. The companys net profit also fairly increased from $3,641,000,000 USD in 2004 to $ 4,945,000,000 USD in 2005. These figures can be used to sight the affect that mobile handsets have had on the companys performance.I have attach the 2005 Unilever charts for a further understanding of the changes in the net profit margins and the net profit. For the net profit graph, the green line is the indicator for the US dollars and the light brown line in the profit margins graph is used to show the net profit margin changes. I have also include the turnover graph and the green line shows the turnover in USD.A security breach at Unilever could cause severe damage to the company in the short term and long term. A security breach can be caused through many things, including through the hacking of the berry handsets and their company computers, or it can be caused of a simple error such as misplacing your phone or leaving it vulnerable to be stolen. The berry handsets and Unilever computers and laptops have natural information stored in them such as customer information and confidential company information. The loss of customer information may lead to the company to be sued by the customers. It is Unilevers responsibility to ensure the egis of this entropy. Another danger is unlicenced users who are able to rag embodied communicates. This may lead to the introduction of computer viruses and worms. If this was to happen, all the information which was stored may be corrupted and de stroyed. Such an event can severely lame the companys susceptibility to perform, and may even force them out of business if they dont have a backup system in place. The loss of confidential company information such as sales figures and sales forecasting info can result in a loss of revenue and allow competitors to use this information to a full extent to gain an speeding advantage in the market. Finally, security breaches also have the capability to imperfection a companies reputation and put the business under scrutiny. So far, Unilever has not been affected by a security breach.In 2004, the Unilever executives were equipped with blackberry bush handsets in a bid to increase the companys performance. If the security measures are as well harsh, then executives will not be able to use the device efficiently, which means that this will have a negative impact on the businesses ability to conduct business thoroughly. Using this example, a management factor out out that must be t aken into consideration is that to make sure that the security policies and procedures dont interfere with the companys ability to do business. Both of these issues must be unplowed balanced. In this workplace, some executives know that they have a device which is cogitate with the companys information and database and know what the impacts can be if the device gets into some unauthorized persons hands. On the other hand, there are executives who are not cognizant of the consequences this can have. Therefore, an organization factor that must be considered is the lack of knowledge. galore(postnominal) travel can be taken to ensure this doesnt happen. Some steps may include offering a training program to the executives regarding the straightlaced use of the berry handset and so forth. A technological factor that needs to be addressed is determining the particular(prenominal)ations of the wireless handheld device required. These specifications must strike a balance amidst its se curity features, how user friendly the device is as well as its cost. Unilever determined that geminate of blackberry bush models best suited their needs. Each company will have different needs and priorities. Management, organization and technological factors that need to be taken into consideration will be based on those needs and priorities.blackberry bush initiative Solutions allows you to mobilize your workplace, your workers can make timely decisions based on the best information available, increasing their productivity and boosting your business performance. The berry opening move Solution allows mobile users to rile dialogues and information wirelessly, including email and text messaging, bodily data and the organizer. It has provided Unilever with many benefits that include flexibility and lowest arrive cost of operation of mobile enterprise solutions. For flexibility, this solution supports all leading enterprise email platforms, back-end systems and applications from a wide range of vendors. It also allows you to manage multiple wireless network technologies, devices, messaging servers and enterprise systems with a exclusive berry Enterprise horde. The berry Enterprise Solution allows organizations to keep their employees affiliated to the information and people that matter, while still benefiting from a low general total cost of operation.This solution offers very good wireless data security and stored data security. For wireless data security, end to end encoding and rsa secur-id two factor authentications are used. In end to end encoding, the BlackBerry Enterprise Solution offers two impart encryption options, advanced encryption standard (aes) and triple data encryption standard (triple des), for all data transmitted between BlackBerry Enterprise Server and BlackBerry smartphones. undercover encryption unwraps are generated in a secure, two-way authenticated purlieu and are assigned to each BlackBerry smartphone user. Each secret key is stored only in the users secure enterprise account such as Microsoft Exchange and on their BlackBerry smartphone and can be regenerated wirelessly by the user. (Research In Motion, 2011),Data sent to the BlackBerry smartphone is encrypted by BlackBerry Enterprise Server using the private key retrieved from the users mailbox. The encrypted information travels securely across the network to the device where it is decrypted with the key stored there. Data remains encrypted in transit and is neer decrypted outside of the corporate firewall. Rsa secur-id two factor authentications provides organizations with additional authorization when users access application data or corporate intranets on their BlackBerry smartphones. BlackBerry mds goods (mobile data system) utilize rsa ace/agent authorization api 5.0 to porthole to rsa ace servers. Users are prompted for their username and token pass principle when navigating to a site or application requiring authorization. Other security features include https secure data access and code signing and digital certifications. (Research In Motion, 2011)BlackBerry mds services act as a secure gateway between the wireless network and corporate intranets and the internet. They leverage the BlackBerry aes or Triple des encryption transport and also enable https connections to application servers. BlackBerry smartphones support https communication in one of two modes, depending on corporate security requirements Proxy modality An ssl/tls connection is created between BlackBerry Enterprise Server and the application server on behalf of BlackBerry smartphones. Data from the application server is then aes or Triple des encrypted and sent over the wireless network to BlackBerry smartphones. End-to-End Mode Data is encrypted over ssl/tls for the entire connection between BlackBerry smartphones and the application server, making end-to-end mode connections most charm for applications where only the transaction end-poin ts are trusted. BlackBerry smartphones applications created using the BlackBerry deep brown development environment (jde), which have certain functionality such as the ability to execute on startup or to access potentially sensitive BlackBerry smartphone application data, require developers to sign and register their applications with Research In Motion.This adds egis by providing a greater degree of control and predictability to the essence and behavior of applications on BlackBerry smartphones. Additionally, the BlackBerry signing authority whoreson can help protect access to the functionality and data of third fellowship applications by enabling corporate developers or administrators to manage access to specific sensitive Application Programming Interfaces and data stores through the use of server-side software package and public and private signature keys.To help protect BlackBerry mds studio applications from tampering, corporate developers can sign an application bundle with a digital certificate. (Research In Motion, 2011)They can use either a trusted certificate authority or a generated certificate. BlackBerry mds studio generates and signs applications with certificates that are in line with the public key infrastructure (X.509) standard. For stored data security, The BlackBerry Enterprise Solution extends corporate security to the wireless device and provides administrators with tools to manage this security. To secure information stored on BlackBerry smartphones, discussion authentication can be made mandatory through the customizable IT policies of the BlackBerry Enterprise Server. By default, password authentication is limited to ten attempts after which the devices memory is erased. Local encryption of all data (messages, address book entries, calendar entries, memos and tasks) can also be enforced via IT policy.And with the Password Keeper, advanced encryption standard (aes) encryption technology allows password entries to be stored secu rely on the device. Additionally, system administrators can create and send wireless commands to remotely change BlackBerry smartphone passwords and function or delete information from lost or stolen BlackBerry smartphones. The BlackBerry Enterprise Server Security also is a form of security. BlackBerry Enterprise Server does not store any email or data. To increase protection from unauthorized parties, there is no staging range between the server and the BlackBerry smartphone where data is decrypted. Security is further deepen by allowing only authenticated, outbound-initiated connections through port 3101 of the firewall. No inbound duty is permitted from sources other than the BlackBerry smartphone or the email server, meaning unauthorized commands cannot be executed on the system. Only communications that can be decrypted with a valid encryption key are permitted between the server and the wireless network. (Research In Motion, 2011)The three pictures I have attached give a further insight as to how the security works.( BlackBerry security,2011)Flow plot for end-to-end encryption(BlackBerry security,2011).http//uk.blackberry.com/ataglance/security/secure_data_access.gif(BlackBerry security,2011)http//us.blackberry.com/ataglance/security/bes-diag_large.jpgBlackBerry tools provide effectual anti-virus protections for a BlackBerry deployment. They use containment methods that are designed to close out malware that exponent gain access to the BlackBerry smartphone from causing damage to the BlackBerry smartphone, its applications and its data, and also to the corporate network. BlackBerry smartphone applications include inherent virus protection and spyware protection that is designed to contain and prevent the spread of viruses and spyware to other applications. Application controls are available on BlackBerry smartphones that are running on a BlackBerry Enterprise Server or on the BlackBerry net Service. BlackBerry smartphone users can use the appli cation controls on their BlackBerry smartphones to prevent the installation of specific third-party applications and to limit the permissions of third-party applications. See the BlackBerry Internet Service Security Feature Overview for more information on using BlackBerry smartphone application controls to protect a BlackBerry smartphone running on the BlackBerry Internet Service against malware. (Research In Motion, 2011)The BlackBerry Enterprise Solution is designed to provide anti-virus protection through its malware protection. The BlackBerry Enterprise Solution includes tools that provide against all malware. Administrators can use IT policy and application control policies on the BlackBerry Enterprise Server, and BlackBerry smartphone users can use application controls on BlackBerry smartphones to contain malware by controlling third-party Java application access to BlackBerry smartphone resources and applications. (Research In Motion, 2011)Finally, Unilever uses various mobi le services in their trustworthy business operations. In 2010, Vodafone was selected as Unilevers provider of all mobile communication needs. Various mobile services that are being used are mobile e-mail, sms texting (short message service) and mms (multi-media service), and also the basic phone call. Other mobile services include voicemail and just using integrated content such as calendars applications. All of these services are play crucial habit in creating an agile and cost competitive organization that operates in a sustainable way. Unilever, using Vodafones information on trends in mobility, will sparingly give them an upper edge and allow Unilever to develop innovative shipway to stay closely connected with our consumers and customers. (Flash, 2011)I personally think that the mobile handsets have had an effect on the companys performance in a corroboratory way. It has allowed more interaction with the customers and has allowed e-commerce to be done efficiently on the go . spoken language 2,282.