Dual-identity Smartphones Could Bridge BYOD Private, Corporate DivideAdded 27th Nov 2012
Late next year, consumers will be able to buy smartphones that either come with native hypervisor software or use an app allowing them to run two interfaces on the phone: one for personal use, one for work.
The technology could help address an issue that has cropped up with increasing frequency at work: Employees who bring their personal mobile devices to work and use them to communicate with clients and to access corporate data. The issue can cause friction at companies that need to safeguard their data on employee-owned smartphones and tablets and want to be able to remotely wipe the devices of data if they're lost or if an employee quits or is fired.
The bring-your-own-device (BYOD) trend has enabled a more efficient and mobile workforce while exposing companies to a myriad of security and data management quandaries. For example, corporate BYOD policies limit what devices can be used based on the type of mobile device management software their IT shop has deployed.
Next year, software and mobile device manufacturers will enable what are essentially two instances of the same OS on a smartphone. That will give corporations secure control over their data and employees the personal data privacy they want, keeping it from being seen or wiped by corporate IT.
VMware and Red Bend are two of the leading software companies that have already signed OEM agreements with smartphone manufacturers to create dual-identify devices from some of today's most popular models.
The two approaches to the smartphone virtualization market, however, are different and hinge on whether the software provider is using a Type 1 or Type 2 hypervisor.
A Type 1 hypervisor is hardware-based technology that creates a second copy of the OS and runs both instances in two distinct regions of a processor. A Type 2 hypervisor runs as a guest OS on top of the host OS, not in parallel like a Type 1. The guest has to communicate through the host OS in order to access the hardware.
Type 1 hypervisor technology is considered more secure because it's integrated into the processor, said Ken Dulaney, a vice president and distinguished analyst at research firm Gartner.
Red Bend's Type 1 hypervisor will run on a new generation of mobile processors due out next year. It now has a partnership with ARM, which is developing a new Cortex-A15 processor to take advantage of mobile virtualization. "So it's the best security combined with the best performance," said Lori Sylvia, Red Bend's executive vice president of marketing.
ARM has also partnered with AMD to develop new x86 processors that are optimized for virtualized smartphones.
While more secure than today's devices, Dulaney sees a Type 1 hypervisor as kludgy because it requires dual booting of the OS -- one for each smart phone instance. "Most users reject this kind of operation because you have to go back and forth between two OSes," Dulaney said.
Sylvia acknowledged that both OSes need to boot, but said there's no performance issue. "It's the standard Android boot time," she said.
"In Red Bend's solution, the personal virtual phone boots first, and then the virtual work phone boots second. After the first one is running, it takes a few moments and then the second one is good to go, too," Sylvia said. "What goes into the work-phone instance will all be customized on the back end by the IT admins."
During a meeting with Computerworld, Sylvia demonstrated how Red Bend's technology works on an Android-enabled Samsung Galaxy Nexus smartphone prototype.
During the demo, if the phone was displaying the private user interface and a phone call came in from a person listed in the phone's corporate contact list, the device automatically changed interfaces to the business instance. The phone smoothly moved between the two distinct interfaces.
"The performance can be totally optimized because I'm only seeing one instance at a time," Sylvia said. "The other OS is there, but it's not consuming the same resources at the same time."
Some smart phone makers are looking at other UI implementations, such as an icon on the home screen that switches back and forth between private and corporate instances when pressed. "The [ones] we're working with are designing their phones to be virtualized. So the issues of additional RAM, which is the main requirement for this hypervisor, will be addressed on an enterprise-ready phone," Sylvia said.
Red Bend, which got its start in 1999 writing software that enabled AOL browser upgrades, moved into the mobile area in 2003 with its Firmware Over The Air (FOTA) technology. It's now used on 1.6 billion mobile devices for mobile OS and app updates.
Red Bend began developing its mobile virtualization platform after it acquired VirtualLogix in 2010.
When the technology is available in the second half of 2013, a dual-identity smartphone buyer would simply tell their corporate IT admins about the device. If the company has Red Bend's Software Management Center installed on its mobile device management (MDM) servers, the software will initiate an OMA Device Management session and send a delta file to the phone. The delta file copies the Android OS to create a second instance on the device.
The IT administrator can then customize the "corporate image" on the smartphone with whatever applications the company has chosen for its employees. For example, the corporate image could include a VPN, meeting apps, and access to the company email system.
VMware's Horizon Mobile software
VMware has also been working on the idea of a Type 1 hypervisor on mobile phones. Four years ago,VMware purchased France-based Trango Virtual Processors, a maker of Type 1 hypervisor technology. After several years of development, however, VMware decided not to use Trango's technology because it didn't see support among smartphone manufacturers for hardware-based virtualization, according to Srinivas Krishnamurti, VMware's senior director of Mobile Solutions.
"Type 1 hypervisors for mobile phones are hard to build and maintain in a scalable manner," Krishnumurti said. "The chip makers -- the Qualcomms and the Texas Instruments of the world -- were like, 'Why should I invest in rewriting all my device drivers, and doing a bunch of battery, graphic and performance optimizations that no [systems manufacturer] is asking me for?'
"So it's hard to do it without an ecosystem, and the ecosystem is not going to do it unless their customers are asking for it," Krishnamurti added.
VMware chose a Type 2 hypervisor product, Horizon Mobile, which will either be embedded on a smartphone and awaiting activation or a free, downloadable app. It will be available to U.S. smartphone users next year.
VMware already has deals in place with LG, Samsung and Motorola to embed its Horizon Mobile software on their devices. Motorola is already selling its Droid Razr M smartphone in Japan with VMware's hypervisor technology.
"Our expectation is there will be multiple devices from each vendor available in the U.S. in 2013," Krishnamurti said. "And there are three or four other vendors we've not yet announced. Our expectation is there will be a lot of Android phones that will have our hypervisor on them."
On the corporate side, IT administrators who want to enable employee smartphones for business use can buy VMware's administrative interface, Horizon Mobile Manager. When an employee with a Horizon Mobile-enabled smartphone wants to activate the "corporate" interface, all he or she needs to do is choose the app; it will ask them to log in with their corporate name and password.
The Horizon Mobile Manager server on the backend will then recognize the log-in, and a pre-configured Android or iOS instance (with all the work apps) will be pushed to the smartphone. If an employee tries to transfer data or apps between the corporate instance and the private instance, the transfer is automatically blocked.
"So, we basically monetize on the management side and not on the app or the hypervisor side," Krishnumurti said. "Enterprises are the ones who are having the problems with security and making sure data doesn't leak. So they're quite willing to pay for that."
Currently, VMware's Horizon Mobile supports Apple's iOS and Android-based smartphones. VWware hasn't announced its plans for Windows phones yet. It's currently waiting to see how adoption rates scale before moving to modify the hypervisor for that platform, Krishnumurti said.
iOS products are relatively easy to support, Krishnumurti said, because Apples devices at the factory are updated when that operating system is upgraded. And typically, 50% to 60% of iPhone and iPad users download an upgrade in the first two weeks it's out. By contrast, the Android phone market is more fragmented, he said. Some OEMs upgrade to the latest version of the OS, others don't, he said.
"It's hard for us to put our arms around it. By virtualizing, we normalize and abstract away all that fragmentation and give IT their own version of Android to manage," he said. "And, there's no chance a Type 2 hypervisor will show up on an Apple device" because of the proprietary nature of Apple's hardware.
Other mobile virtualization players
Like VMware's Horizon Mobile software, CellRox's ThinVisor is a kernel-enabled hypervisor that runs on the smartphone and creates multiple "personas" to keep corporate data and private data separate. In September, CellRox announced it had launched its BYOD Multi-Persona app toolkit for Android Ice Cream Sandwich-enabled mobile device manufacturers to embed the capability on their smartphones.
Good Technology places encrypted containers in a sandboxed segment of a file system on the phone, where corporations can run their own apps securely and separate from a user's personal apps. Gartner's Dulaney said Good Technology's product isn't truly a hypervisor because it has basically built an application development container.
ARM and AMD plan new hypervisor processors
For many dual OS-instance technologies to succeed, today's mobile processors will have to become more powerful to handle the added workload and incorporate native data management and security features.
Red Bend has signed a partnership agreement with chip maker Advanced RISC Machines Ltd. (ARM) to produce processors powerful enough to run dual-OS phones. Those are expected out in the second half of 2013.
"BYOD is not just about running two OSes," said Ron Perez, an AMD fellow and the director of its security architecture organization. "It's [also] about what to do with the data produced in that corporate environment that's on the device."
In a move away from its traditional server market space, AMD earlier this year also partnered with ARM to develop x86 chips that will have ARM microcontrollers dedicated to mobile security.
ARM, and now AMD, are also working with the non-profit standards organization, GlobalPlatform, to develop the Trusted Execution Environment (TEE) API Specification. Founded in 1999, GlobalPlatform has its roots in the smartcard and payment market with member organizations such as Visa, MasterCard and American Express.
Using the ARM microcontroller on the x86 chip, the TEE would create a separate area on a mobile phone's main processor that uses data encryption algorithms to secure sensitive data stored on the device. Mobile capabilities already on smartphones would allow IT organizations to track mobile devices and erase only corporate data if the device is lost or compromised, or if the employee has left the company. For example, geo-sensor technology on smartphones would allow corporations to track where employee-owned mobile phones are and wipe the devices if they left a specified region.
"So, essentially this comes down to encryption key management. How do we protect the data from one operating system so that another operating system doesn't have access to it," Perez said. "The security processor would have that responsibility."
AMD expects its news secure mobile processors to begin shipping in the second half of 2013.
Although AMD also plans to use its new x86 chips in the server and storage industry, mobile will be first.
"The mobile platform is the most exposed," Perez said. "It's the weakest link in the entire ecosystem. That's where greater levels of separation through virtualization is needed."
V.S. Shridhar, head – India Enterprise Business, Tata Communications, set the context at WeConnect 2013-2014 with his keynote on the rapid growth of the "prosumer" trend and how it had already begun impacting enterprise IT.
WeConnect 2013-2014 hosted panel discussions which looked into bridging the IT-business gap within the enterprise segment in a new light. The event provided a platform to premier IT leaders to gain insights and understand the challenges that plague their contemporaries .
China is working on a Linux operating system that can replace the now-vulnerable Windows XP and protect the country's networking infrastructure.
An IBM project to widen the use of its Power server chips inched forward Wednesday with Big Blue trying to challenge Intel for a bigger role in the hyperscale data centers run by the likes of Google and Facebook.
Chinese smartphone maker Xiaomi plans to enter ten foreign markets later this year, including Brazil, Mexico and Russia, in a bid to expand globally with its low-cost but cutting-edge phones.
A new report has revealed more than half of cybercriminal attack traffic in the first quarter of 2014 was aimed at the media and entertainment industry.
Revelations about U.S. secret surveillance programs have left China's Huawei Technologies exhausted on the public relations front, a top company executive said Wednesday.
Enterprise workloads are shifting to cloud and hosting environments in ever greater numbers and attacks that have historically targeted on-premises environments are following them, according to a new report.
Nine basic attack patterns constituted 92 per cent of cybersecurity incidents over the last ten years according to the latest report from Verizon.
Cisco today announced Managed Threat Defense, a set of security services for the enterprise that Cisco is providing through two new operations centers to remotely support intrusion-detection, incident response and forensics, among other services.
Sometimes a security patch isn't all it's cracked up to be. The security researcher who first found a vulnerability affecting more than 20 different router models says the patch meant to fix it only hides the initial weakness and doesn't remove it whatsoever.
Salesforce.com recently celebrated its 15th year in existence, and as the SaaS (software-as-a-service) vendor races toward US$5 billion in revenue its influence on the industry is being felt more than ever. At the same time, some signs indicate that Salesforce.com is having a few growing pains, as well as showing some trappings of the mega-vendors it once mocked with its "End of Software" marketing campaign.
Can your tablet withstand a 2-meter drop or be submerged in water for 30 minutes and keep functioning? The new $5,000 tablets from Xplore Technologies can.
A malware campaign of yet-to-be-determined origin is infecting jailbroken iPhones and iPads to steal Apple account credentials from SSL encrypted traffic.
Mainframe operators using BMC software may now be able to enjoy the speedy, devops-style development pace that is quickly becoming the norm for customer-facing mobile applications and Internet services.