Dual Interface Mobile Devices To Address BYOD Issue 116
Lucas123 writes "Next year, smart phones will begin shipping with the ability to have dual identities: one for private use and the other for corporate. Hypervisor developers, such as VMware and Red Bend, are working with system manufacturers to embed their virtualization software in the phones, while IC makers, such as Intel, are developing more powerful and secure mobile device processors. The combination will enable mobile platforms that afford end users their own user interface, secure from IT's prying eyes, while in turn allowing a company to secure its data using mobile device management software. One of the biggest benefits dual-identity phones will offer is enabling admins to wipe corporate data from phones without erasing end users profiles and personal information."
Not really.... (Score:4, Interesting)
Until they can have dual SIM cards and run on two networks at the same time, it will be useless. If the company wants me to have a cellphone, they can pay for one. I prefer to keep both lines separate so I can completely ignore work the second I leave the office.
Bingo. (Score:3, Interesting)
This is the wrong solution to a very real problem - how can a machine get used for personal as well as private access? The answer is, if I have to boot (or even switch to) a separate account to do my personal activities, either they will get done on the work account (compiling - might as well check ./.) or they won't get done at all. I see no use in the "personal" device usage - if I need that, I'm going to use a tablet or my home device.
The solution is to provide proper incentive, security and usage guidance, and a strong security stance so your employees use the work devices for appropriate personal activity.
Now, get back to work, DIY - I want to see your TPS reports on my desk by tomorrow morning!
Re:like what unix did for the last 40 years? (Score:4, Interesting)
The point is you don't need (or even want) a hypervisor when you have a secure multi-user system with process isolation like Android.
The processes might be isolated, but data access is not. Did you just give the Twitter app SD Card read/write access to the filesystem where the company data is? What could possibly go wrong?