Android devices recently suffered a spate of attacks. Similar attacks have been made against Apple devices and nearly every other brand of smart device. Does this mean that this is the end of Android or of mobile devices? Or does this mark the rise of mobile device management (MDM) and other software specifically designed to secure end user computing (EUC) devices? EUC security has two failure points: the handheld device and further in the network. But does an insecure device imply loss of data? Perhaps. Loss of credentials? Once more, perhaps. But do we really care? That is not known. So, let us look at a typical use case.
Articles Tagged with Android
For years, the Citrix Systems cheerleading team waved its pom-poms to the resounding chant of “Any, Any, Any!” Any app, anywhere, on any device, knowing all too well that while it could deliver apps anywhere and on any device, its ability to do so for anything other than Windows apps was nothing more than some well-crafted marketing hype.
The mobile device management market has exploded over the past five years with solutions coming from “traditional” mobile management, security and specialty software vendors and fueled by the rapid consumer and corporate adoption of smartphones and tablets. Followers of the Mobile Device Management (MDM) and Mobile Application Management (MAM) space are tracking companies such as AirWatch, MobileIron, Citrix, Good Technology, SAP and nearly three dozen other vendors who provide competing products. Corporate implementers are trying to find the right balance between allowing individuality of a users owned device and the security of corporate data that may be accessed on it. The majority of solutions provide a secure layer, or container, for which the corporate data resides. These layers can, and do, have an effect on the usability of the devices.
Some of us have multiple cloud endpoints in the form of mobile end user computing devices all trying to access our personal and corporate data to do our daily jobs. These incredibly useful enduser computing devices (smartphones, tablets, etc.) are now a part of our organizations life. So how do we protect our data from them. IBM recently took a draconian measure of banning Siri from their employees iPhones. Yet, how can they enforce such a measure?
Not quite ready for prime time, but well beyond the point of speculation, mobile hypervisors are set to start reshaping the way that businesses and consumers will view the mobile devices.