Tag : mobile security

VMware, LG Implement Virtualization on Android Based Phone

As smart phones are becoming the standard these days, it becomes challenging for businesses to keep track of and handle all of the personal devices that are compatible with the corporate environment. Well that quite soon could become something of the past as VMware and LG have teamed up to bring you virtualization on the smart phone.

At the Mobile World Congress in Spain, VMware and LG showed off a technology that essentially allows you to run multiple instances of the Android OS on a single phone. You immediately think of virtualization and say there is nothing new here, but I would say you are wrong. Basically what this technology presents to businesses both small and large is the ability to easily manage and control access to their corporate systems. You can run your own personal apps, check email, and make calls on your personal profile while almost instantly switching to your corporate profile. This would allow you to then access work contacts, run business applications, and connect safely to your corporate network. The best part of this is that the virtualized instance runs directly from an SD card. Check out the video below.

Personally I think this is great news for IT firms and businesses that have tried dealing with the ever so difficult task of monitoring and managing smart devices and their access to the network. It allows them to simply load the necessary applications and email accounts onto the virtual machine that resides on the SD card and put it in a user’s phone instantly allowing them secure access to the network.

Then in case of termination, losing employees, and lost devices, the IT staff can remotely lock or wipe your profile. This all can happen without affecting any of your personal data. If you leave the company, all they have to do is remove your smartcard and they are done.

This sounds like a very cost effective and easily controllable solution for a lot of businesses that are worried about mobile security. I really would love to try this hands on if the opportunity ever presented itself and I am really eager to see where they go with this.

Check out the video here!

[youtube]http://www.youtube.com/watch?v=LkUfKgsUbns[/youtube]

Mobile Security

Have you ever thought about mobile security for your business? Well you should? Mobile security is going to be a huge concern for companies in the next few years because of the masses of new smartphones and tablets coming to the market.

According to a Q4 2010 report done by McAfee, cybercriminals have a “window of opportunity” to attack multiple mobile platforms. The biggest of the threats is Nokia’s Symbian OS. The report also included the fact that there is a direct correlation between device popularity and criminal activity.

The new mobile devices are hitting the market months before security software even exists for them. The sheer amount of mobile devices without security could lead hackers to target these devices for botnet infections. According to McAfee there has been a 46 percent increase in the amount of threats than in 2009.

What can you do? Well at BVA, we believe that your network is first priority whether it be your server, workstations, or mobile devices. We suggest that you thoroughly evaluate the devices that you are allowing on your network. Don’t be afraid to do a little research and look into possible security holes that may be found, or if anyone has found issues with the devices. It is not a bad thing to standardize the devices that are allowed on your network, especially when there are so many that it is hard to keep up with them all. It is always a good idea to ask your IT vendor if devices are safe.

Also, establishing a company wide mobile security policy is another great feature. When using ActiveSync, you have the option of setting certain security features on your mobile devices, such as allowing or denying the use of removable storage, cameras, Wi-Fi, internet sharing and more. You can also allow or deny the use of unprovisional devices and enforce password policies. In today’s small to medium sized businesses, these policies are often overlooked and can potentially put your network and data at risk.