Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Cellphones GUI Privacy Security Virtualization IT

Dual Interface Mobile Devices To Address BYOD Issue 116

Lucas123 writes "Next year, smart phones will begin shipping with the ability to have dual identities: one for private use and the other for corporate. Hypervisor developers, such as VMware and Red Bend, are working with system manufacturers to embed their virtualization software in the phones, while IC makers, such as Intel, are developing more powerful and secure mobile device processors. The combination will enable mobile platforms that afford end users their own user interface, secure from IT's prying eyes, while in turn allowing a company to secure its data using mobile device management software. One of the biggest benefits dual-identity phones will offer is enabling admins to wipe corporate data from phones without erasing end users profiles and personal information."
This discussion has been archived. No new comments can be posted.

Dual Interface Mobile Devices To Address BYOD Issue

Comments Filter:
  • Not really.... (Score:4, Interesting)

    by Lumpy ( 12016 ) on Tuesday November 27, 2012 @06:22PM (#42110189) Homepage

    Until they can have dual SIM cards and run on two networks at the same time, it will be useless. If the company wants me to have a cellphone, they can pay for one. I prefer to keep both lines separate so I can completely ignore work the second I leave the office.

  • Bingo. (Score:3, Interesting)

    by rsborg ( 111459 ) on Tuesday November 27, 2012 @06:22PM (#42110199) Homepage

    This is the wrong solution to a very real problem - how can a machine get used for personal as well as private access? The answer is, if I have to boot (or even switch to) a separate account to do my personal activities, either they will get done on the work account (compiling - might as well check ./.) or they won't get done at all. I see no use in the "personal" device usage - if I need that, I'm going to use a tablet or my home device.

    The solution is to provide proper incentive, security and usage guidance, and a strong security stance so your employees use the work devices for appropriate personal activity.

    Now, get back to work, DIY - I want to see your TPS reports on my desk by tomorrow morning!

  • by bill_mcgonigle ( 4333 ) * on Tuesday November 27, 2012 @07:15PM (#42110749) Homepage Journal

    The point is you don't need (or even want) a hypervisor when you have a secure multi-user system with process isolation like Android.

    The processes might be isolated, but data access is not. Did you just give the Twitter app SD Card read/write access to the filesystem where the company data is? What could possibly go wrong?

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...