-
Notifications
You must be signed in to change notification settings - Fork 0
Capabilities
{| ! style="text-align:left;"| Case ! User Benefit ! Admin Benefit ! User Owns Device ! Current Solution
! Alternatives |
---|
Alex's Enterprise-Supplied Laptop |
Internet Access |
Enhanced Enterprise Security |
No |
MITM |
None |
- |
Bobbie-Sue's BYOD at Work |
Per Site Trust |
BYOD support |
Yes |
None |
None |
- |
Charlie's Coffee Shop |
Internet Access |
Legal Protection |
Yes |
MITM inadequately* |
None currently but I did hear some discussions in Zurich on how so-called captive portals might be improved. |
- |
Darlene's Mobile Network |
Lower Priced Service |
Bandwidth savings |
Yes |
Nokia Xpress and Opera Mini [http://en.wikipedia.org/wiki/Nokia_Xpress#Privacy are doing this for HTTPS traffic] on a per application basis |
Front end optimizers (reverse proxies) are able to deliver some of this functionality on a site-by-site basis. |
- |
Eliot's Village Internet Connection |
Optimized Internet access |
Bandwidth savings |
Yes |
MITM inadequately* |
CDNs potentially but not for very small user communities. |
- |
Francine's Virus Scanner |
Malware detection |
Security |
Yes |
MITM |
Virus scanners can deploy per application plugins for specific applications as a partial solution. |
- |
Grant's Debugging Proxy |
HTTPS site debugging |
None |
Yes |
MITM |
None |
- |
Henrietta's Jailhouse Schoolroom |
Internet Access |
Prohibiting access to certain sites |
No |
MITM |
A custom browser or a parental control plugin could potentially provide this functionality. |
- |
Ian's Compliance Mission (see Alex's Enterprise-Supplied Laptop) |
| | | | | |- |Jane's Thing |Internet Access |N/A |Yes |MITM inadequately* |None |- |Kirk's Kids (See Henrietta's Jailhouse Schoolroom) | | | | | |- |Liam's Mobile Identity Proxy |?? |?? |Yes |?? |?? |- |Mike's Music Service |Unlimited Music |Source of revenue, happy users |Yes |MITM inadequately* |CDN/reverse proxy architecture could potentially solve. |- |Nancy's kids' mobile devices |Internet access control |Source of revenue, happy users |Yes |MITM inadequately* | |- |Oscar's Certification Company (see Alex's Enterprise-Supplied Laptop) | | | | | |- |Peter's Flowers delivery company |Access to certain sites does not count against data usage |Source of revenue, happy users |Yes |MITM inadequately* |None unless service provider partnered with CDN, or deployed their own |- |Rick's Fast in-flight Wifi |Fast web browsing |Happy users |Yes |MITM inadequately* |None |- |Students' Shared Cache (see Eliot's Village Internet Connection | | | | | |- |Tom's Rural Broadband (See Rick's Fast in-flight Wifi) | | | | | |}
* MITM is inadequate because it does not support per-site control to allow users to prevent decryption by the proxy for select sites. In addition, not all devices support user installed CAs. And lastly because there is no discovery mechanism or established UI to interact with the user and request trust.