Smart Phone Virtualization

VMWare's MVP

“Virtualization”  is one of the hottest buzzwords in the IT world today.  Virtualizing servers has become a common practice in most large IT shops.  We have recently seen the introduction of virtualization with graphics processing cards (GPUs)  And of special interest to executives and IT professionals exploring Bring Your Own Device (BYOD) for their business, smart phone virtualization may present a solution to security and privacy concerns.

Even without the intentional practice of BYOD, the flood of personal smart phones and tablets entering the workplace raises many questions about security.  Today’s workers demand the flexibility to work not just from employer-provided desktops or laptops, but from personal smart phones and tablets. As these devices encourage out-of-office connectivity, productivity and responsiveness, most companies are loath to discourage such behavior.

But when personal devices are used to access corporate email, applications and data, both the personal privacy demands of the user and the enterprise’s security and control requirements are simultaneously in need of control points and protection measures.  The same goes for company provided consumer devices, which end up being used not only for business, but the inevitable access of personal email, data and media.

So how to build a wall between the personal and corporate worlds, even when using just one device? Virtualization may hold the key. One of the industry leaders in virtualization, VMWare, has recently unveiled their  “MVP” (Mobile Virtualization Platform)  that will allow a company to introduce iOS and Android devices securely into the enterprise.  The access is controlled via a separate workspace on the mobile device that is entirely controlled by the company.  Essentially, personal and business applications and usage are separated.

VMWare's MVP

The user of a mobile device MVP-enabled now has 2 personas:  Personal and business.  The user can toggle between the personas and isolate one of the identities in a secure fashion.  Companies have full-control of the mobile workspace, including  VPN, authentication, encryption and directory services.  Corporate IT controls all aspects of the device lifecycle for the corporate persona.

Logging into the business portion on such a device serves up a secure workspace with the applications, data and files used during the workday.  The smart phone is temporary locked in work-only functionality, one that could be served by a different network than the phone owner’s service provider. Once the employee logs off, access to proprietary company data is no longer available, nor can they access non-work related apps (think Facebook) while in the professional workspace.

This class of technology is in its infancy, but the demand for secure control of the ubiquitous mobile device as it enters the workplace is  growing and will surely become a common technology for most enterprises. Both companies and employees see obvious benefits from such an approach, making smart phone virtualization an obvious win-win.

SHARE POST

Facebook LinkedIN

Recent articles

Woman looking sternly into laptop

What to do when CRE feels harder than it should

Many CRE performance issues stem from disconnected systems, not people. Learn where gaps appear across the lifecycle, plus how they increase cost and risk.

02 / 18 / 26

Exterior of multifamily building

2026 multifamily reports: Download the latest from Yardi Matrix

Using with the multifamily industry’s best market intelligence, Yardi Matrix's monthly reports summarize trends and forecasts that support well-informed investment decisions.

02 / 18 / 26

Boston, MA, skyline

Your complete guide to the Yardi Forum

Everything you need to know about the Yardi Forum, a premier technology training event designed specifically for Yardi affordable housing and PHA users.

02 / 12 / 26