Open/close button user menu user menu content login
Solving business issues by integrating IT and management
What is Business + IT?
Login
Newsletter registration
IT Genre
IT Strategy
The reason why Audrey Tan says "digital and IT are completely different things" for Japanese people
2022/03/09
Why is the digitization of medical care delayed? What are Japan's challenges and solutions indicated by the 12,000 person survey?
2022/03/07
Reason why we were able to achieve "120 hours of work reduction" with minor changes in expense settlement
2022/03/07
The core system
More than half of the people in charge are stressed.
Special
2022/03/09
Why should we “respond now” to the “Revised Electronic Book Preservation Law” with a two-year grace period?
2022/02/08
What are the tips for "data linkage that makes the site happy"? How to Drive “Automation” Without Programming
2022/01/24
Information system
The end of retargeting, what is ad delivery using "customer data" required in the post-cookie era?
Special
2022/02/02
What network availability is needed 'post-corona'? How to implement “responsiveness to change”
2021/12/16
How to use webinars to learn more about your customers
2021/12/09
Operation management
Is server power consumption a hindrance to AI and machine learning? What are the pain points unique to high performance?
Special
2022/03/08
How to build a DX platform that takes advantage of the goodness of the cloud while taking advantage of the on-premises
2022/03/07
30% of companies adopt cloud-native, what is the optimal solution for "next-generation infrastructure operation" indicated by ITR survey?
2022/03/03
Security
What can I do if I am infected? Why Backup Data Needs a “Zero Trust” Concept
Special
2022/03/07
How secure is your data in Microsoft 365? How SaaS Is Targeted by Ransomware
2022/03/03
SaaS security measures, Gartner's 3 approaches for advanced ID management
2022/02/28
Network
World market research for IoT investment (Part 2), which is the most interesting? Is the investment standard "cost" after all?
2022/01/26
World market research for IoT investment (Part 1), Top 10 by application? Explanation along with success stories
2022/01/25
6 major trends to watch in the IoT market in 2022, 42% willing to invest aggressively
2021/12/23
Mobile
Is there a more flexible and efficient way to increase device security due to telework?
Special
2021/04/02
The Biggest Concern About Telework…Why “Ensuring Security” Is Not So Easy
2020/08/28
What is IEEE802.11ax (Wi-Fi 6)? Details of the latest wireless LAN standards to understand with 5 advantages
2020/06/03
Hardware
Eight companies including Pana and Honda set up an association, full-scale spread of delivery robots and future issues
2022/03/03
The Possibility of Data Sharing by a Storage Leader, What is a Budding Super City in Tohoku?
2022/02/09
Intelligent robots and data-driven transform warehouses and factories
2022/02/03
Development
No results after introducing RPA? Common points of failed companies
Special
2022/03/04
An easy-to-understand illustration of what CI/CD is, along with specific tools and approaches
2022/03/01
The low-code/no-code development market will increase significantly by 24.3%, reaching 100 billion yen by FY2023
2022/02/18
Events and Seminars
Special
Movies
FinTech Journal
Email Newsletter register
What is Business + IT?
Sales strategy
Cost reduction
Organizational reform
Production and manufacturing
Risk management
Compliance
Energy-saving and environment-friendly
By industry/scale
Core system
Information system
Operation management < /li>
Security
Network
Mobile
Hardware
Development
Related genres
Apple's unique security strategy even in GAFA, will it change with the entry of a subscription
When comparing Android devices and iPhones, many experts say "iPhone (iOS) is more secure" It says. Why is it that only Apple is able to stick to its own security policy when giant platformers tend to be lumped together as "GAFA" (Google, Amazon, Facebook, Apple)? This is because it is the only company in GAFA that has hardware sales as its core business. However, there are some interesting developments. It's a subscription service announced in March.
Freelance Writer Shinji Nakao
Freelance Writer Shinji Nakao
Freelance writer and editor. From editing ASCII books, through O'Reilly Japan, she handles translation, writing, interviews, etc. regardless of whether it is paper or the web. Mostly IT-related, but occasionally writes for automobile-related media. I've been using the Internet (I didn't say that) since UUCP.
Inherent Risks of Platform Business
Related Articles
▲ close▼ Show all
Alex Stamos, CSO of Facebook, pointed out the harmful effects of reduced availability due to excessive protection of security and privacy in his keynote speech at Black Hat USA in 2017. In recent years, in security, operations that hinder work and business have been viewed as a problem, and many experts agree with this opinion. However, the company took the brunt of criticism in 2018 with the Cambridge Analytica scandal.
Google has been fined 6.2 billion yen by the French data protection authority for violating the GDPR regarding the use of user information in some services such as Google Maps.
Amazon was pointed out by Bloomberg that employees were able to listen to conversations between users and Alexa. It is said that the contents of conversations were restricted to work such as functional improvement, and not everyone was free to eavesdrop, but it has also been pointed out that unnecessary sharing of conversations was being carried out.
Each case has its own point of view, but many large platformers rely on personal information and privacy information for advertisements and various service linkages, and it is naturally their responsibility and risks are inevitable.
Strengths of Platformized Hardware
However, Apple, which should be lined up with the above-mentioned companies under the abbreviation GAFA, has been ignoring the scandals and incidents of other companies one after another. We have a different security policy.
Rejecting a request for information disclosure from the Federal Bureau of Investigation (FBI) (more precisely, a request to unlock the suspect's iPhone), or refusing "Privacy is one of the basic human rights of the European Union (EU) We will protect even non-residents,” and “We do not think of customer information as a product to make a profit,” etc.
This is because Apple is the only company in GAFA that has a hardware-based platform. Unlike Google and Facebook, there is no need to monetize with advertising business, that is, personal information and privacy information such as user attribute information and action history. This is Apple's strength.
That's not all. The success of the App Store, an ecosystem that distributes games and music linked to devices such as iPhones and Macs, has set it apart from the mere manufacturing business.
[Next page] Entering subscription service at the "limit" of the product sales model. One Concern That Raises
Recommended Articles
Security Strategy Genre Seminar
To list
Security Strategy Genre Topics
To list
Security Strategy Genre IT introduction support information
To list
PR
SB Creative Inc.
Business + IT is operated by SB Creative Corp. of the SoftBank Group.
By registering as a business + IT member, you can subscribe to members-only content and e-mail newsletters, and be invited to special seminars!