As of mid October, 2014, two recent well publicized online security events — one related to Dropbox, the other to SnapChat and an app named SnapSaved — illustrate cloud hosts attempting to distance themselves from app developers providing the SaaS offer in the wake of a public online security event. If they succeed, app developers look likely to hit some marketing head winds.
The odds of this outcome went up when the ISV responsible for SnapSaved.com came forward and disclosed its intentional effort to compromise online security and privacy for consumers of its app. The details can be found in an article written by Mike Isaac, titled A Look Behind the SnapChat Photo Leak Claims (http://bits NULL.blogs NULL.nytimes NULL.com/2014/10/17/a-look-behind-the-snapchat-photo-leak-claims/?ref=technology), which was published on October 17, 2014. Consumers will not likely be reassured as the result of this admission of culpability.
Whether the intentions of the unnamed management team at SnapSaved.com were honorable, or not, has no material importance. But their admission to intentional malicious activity, together with their ability to execute on their objective with an app conforming to SnapChat’s specific requirements for interoperability is of critical importance. Leaving aside the question of how this admission will likely impact on individual consumers of the app, and of SnapChat, itself, let’s focus on likely reaction from larger organizations and the IT teams supporting them to this event. It’s likely larger organizations will take a harder look at their BYOD policies and procedures in the aftermath of these both of these events. Larger organizations do not want to work with lots of technology providers. So the tactics implemented by DropBox and SnapChat to distance themselves from culpability will not help either of these cloud offers to add further momentum to the pace at which consumers from enterprise business sign on and start using services. In fact the opposite is likely to be the case.
One glimmer of opportunity from these otherwise glum and business-depressing events amounts to whether or not EMM solutions like Microsoft InTune can be configured to manage just how consumers interact with an otherwise limitless list of apps, from an equally limitless list of ISVs, within the confines of specific corporate networks. If these EMM solutions can be set up to manage app consumption, independent of the cloud hosting the apps, themselves, perhaps enterprise IT organizations will have more of the stamina to brush off these events as anomalies likely to vanish in the future.
Ira Michael Blonder
© IMB Enterprises, Inc. & Ira Michael Blonder, 2014 All Rights Reserved