Android devices recently suffered a spate of attacks. Similar attacks have been made against Apple devices and nearly every other brand of smart device. Does this mean that this is the end of Android or of mobile devices? Or does this mark the rise of mobile device management (MDM) and other software specifically designed to secure end user computing (EUC) devices? EUC security has two failure points: the handheld device and further in the network. But does an insecure device imply loss of data? Perhaps. Loss of credentials? Once more, perhaps. But do we really care? That is not known. So, let us look at a typical use case. Continue reading Should We Care If the Handheld Is Secure?
For years, the Citrix Systems cheerleading team waved its pom-poms to the resounding chant of “Any, Any, Any!” Any app, anywhere, on any device, knowing all too well that while it could deliver apps anywhere and on any device, its ability to do so for anything other than Windows apps was nothing more than some well-crafted marketing hype.
The mobile device management market has exploded over the past five years with solutions coming from “traditional” mobile management, security and specialty software vendors and fueled by the rapid consumer and corporate adoption of smartphones and tablets. Followers of the Mobile Device Management (MDM) and Mobile Application Management (MAM) space are tracking companies such as AirWatch, MobileIron, Citrix, Good Technology, SAP and nearly three dozen other vendors who provide competing products. Corporate implementers are trying to find the right balance between allowing individuality of a users owned device and the security of corporate data that may be accessed on it. The majority of solutions provide a secure layer, or container, for which the corporate data resides. These layers can, and do, have an effect on the usability of the devices. Continue reading Red Bend – Mobile Device Virtualization for the Enterprise
If Mobile Device Management (MDM) vendors needed any further notice this entire technology category is defunct, then VMware has kindly obliged, finally making good on its promise to offer a viable mobile virtualization platform with the announcement at VMworld 2012 of Horizon Mobile iOS. Continue reading VMworld 2012 – Horizon Mobile (Application Management)
Some of us have multiple cloud endpoints in the form of mobile end user computing devices all trying to access our personal and corporate data to do our daily jobs. These incredibly useful enduser computing devices (smartphones, tablets, etc.) are now a part of our organizations life. So how do we protect our data from them. IBM recently took a draconian measure of banning Siri from their employees iPhones. Yet, how can they enforce such a measure? Continue reading End User Computing: Protecting Data From the Device
Not quite ready for prime time, but well beyond the point of speculation, mobile hypervisors are set to start reshaping the way that businesses and consumers will view the mobile devices. Continue reading Mobile Hypervisors Will Spur BYOD Adoption, but not this year