Israel Lifshitz

Different. The word can arouse quite the spectrum of reactions. Excitement. Curiosity. Fear. Rejection. And everything in between. Like tasting asparagus for the first time, to welcoming that new spectacled kid in school, our initial assumptions often end up being quite different than our impressions once we learn more about that new person, place or thing we thought we had all figured out.
These assumptions are natural and they follow us into our workplaces and into the business world, where we’re consistently bombarded about the newest, the latest and greatest products and services. In the world of IT security, that’s especially true when you’re exposed to emerging technologies that take on a completely different philosophy than the current standard.
With disruptive technologies like Virtual Mobile Infrastructure (VMI), questions and assumptions are to be expected until people are actually able to get beneath the surface and see the how this approach changes the larger picture. A recent article did a great job of expressing some of these assumptions, chief amongst them the view that VMI isn’t actually more secure than other approaches in the market.
I’m all too happy to dispel this myth and shed light on how VMI impacts your security capabilities. In that article, a reference to the teen classic Mean Girls likened VMI to a certain catch-phrase that the popular ‘Queen Bee’ was sure that would never catch on, so her followers should just, you know, drop it. The author went on to contend that running remote apps in the data center doesn’t ensure higher security, because instead you could pave the road to your enterprise network for attackers.
Sure, hackers are going to try to breach your enterprise network regardless of where your sensitive corporate data rests, be it wrapped in an app and insulated inside a container on the end user’s device, or installed on a cloud or on-premises server. Password/passcode security will always be a risk on end user devices. But the overarching fact of life in mobile security is this: the weakest link in your network, and by a huge margin, is the link you don’t own – the mobile devices of your employees. In today’s BYOD world, you can’t restrict which apps employees can download or install intrusive policies infringe on their freedom or privacy. What you can do is re-locate your prized assets to a much more fortified location.
With VMI, enterprises own the OS and can therefore apply additional patches and encryption to mobile apps before they’re deployed. Your enterprise servers are much better equipped and much more invested in, and that’s for good reason. They’re also much better suited to deal with threats than the virtual jungle of BYOD devices connecting to your network and the unsecured personal apps running inside of them.

The National Institute of Standards and Technology (NIST) recently issued a draft guidance for telework, remote access and BYOD security. The recommendation? That government agencies use VMI for all teleworking employees.
It’s no coincidence that VMI is being adopted by the DoD and public safety agencies, financial and legal firms and healthcare providers – these industries have the most to lose in case of a data breach. Skeptics at first, they applied a critical eye, but what they found in the end was how this innovative approach enhances their security (and almost every aspect of BYOD management) above and beyond their current EMM solutions.
So if you’ve seen Mean Girls, you may remember what happens with the popular and shallow queen bee who judges the new girl harshly… she doesn’t wind up on top now does she? That new kid may appear odd and it may not seem advantageous to befriend them at first. But often it’s that kid that proves the skeptics wrong and ends up being the biggest success.

Chen Landau

Taking in the security buffet that is the RSA Conference is a real eye-opening experience into the tremendous effort and resources that is put into securing the technologies we need to move forward as businesses and customers.
At the Nubo exhibit, we’ve been listening to many stories from security and mobility professionals at different levels about their sore spot – the Achilles’ heel if you will, of their enterprise data security and how this limits their ability to move forward with their greater enterprise strategy. But there’s been a running theme that ties these weak points together, and it’s very much a four-letter word to CISO’s, CIO’s, and IT professionals. You guessed it: B-Y-O-D.
While most enterprises have already accepted BYOD as a necessity for their future growth, most are far from comfortable with how well-positioned they are to deal with the plethora of vulnerabilities, malware and attacks that target their mobile endpoints. Since joining the enterprise ecosystem, employee smartphones and tablets have fast become the weakest link in enterprise security. These current-day mobile computers have become the home for security risks. These risks exploit device OS vulnerabilities, malicious and malware-infested consumer apps, and the unsecured networks they connect to every day, just to name a few examples. Where does that leave your company’s attempts to secure all of the devices and apps in your network? Doesn’t feel very, well, secure does it?
Over 70 percent of enterprises recently admitted in a survey by Ponemon they believe they incurred a data breach because of insecure mobile devices. A recent scan by security firm Webroot of over 20 million apps from app stores reported that more than half were risky if not malicious.
Concerning? Extremely. Surprising? Hardly. Neither is the BYOD reality that you can’t fully protect data on devices that you don’t own. The myth of Achilles’ heel is real, and it lives in the smartphones, tablets and apps of your enterprise mobility program!
So how can your organization go out essentially in to battle against mobile threats day in, day out with greater security? Leave Achilles off of the battlefield! Corporate data is far too valuable and sensitive to leave inside your weakest endpoint.
It’s that motivation that helped us develop Virtual Mobile Infrastructure (VMI) – leave zero data on mobile devices. Keep apps remote where you have full control over your environment, and where you can reinforce and patch your network against vulnerabilities. Under VMI your apps are transferred as a display only to your employees’ devices, but a highly mobile-centric remote display protocol will make them feel as if they’re working with native apps on the device.
MDM (Mobile Device Management) or MAM (Mobile Application Management) approaches use multiple protocols (one for each app). VMI uses just one flat protocol, this greatly reduces attack points that hackers will no doubt try to breach.
It’s been great seeing the reaction of people working with the Nubo player live here at RSA, and seeing their reaction to the combinations of maximum security and native user experience that is available today.
Try Nubo out for yourself on your handheld and let us know what you think at!