IDG News Service - Motorola Mobility said Monday that it has bought 3LM, a company that develops enterprise security and device management products for Android devices.
Motorola said that 3LM's technology addresses ease-of-use, cost-of-management and security concerns for IT managers, and its products allow for the development of enterprise security features.
Motorola Mobility, which was recently formed when Motorola split into two separate companies, completed the deal in late 2010. It didn't disclose terms of the deal.
The security company says 3LM stands for "three laws of mobility" that devices should follow: protect the user from malicious code or content, protect the device itself by securing data and communications, and obey the user unless this would cause a security problem.
While Motorola will use 3LM's technology in its own Android phones, it also hopes to allow other handset makers to use the technology too. That strategy, where a mobile phone vendor hopes to sell technology to competitors, has proved challenging historically.
Motorola has bet big on Android, using the software for all of its smartphones. It has already added security features aimed at enterprises to some of its Android phones.
While BlackBerry phones typically offer the most security features, Apple has worked to make its smartphones meet the basic security needs of enterprises. Many enterprises say that they would like to use Android phones but that the platform doesn't offer enough security features.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Protection for Every Enterprise: How BlackBerry Security Works Get an IT-level review of BlackBerry® Security, addressing data leakage protection, certified encryption, containerization and much more.
- Future Focus: What's Coming in Enterprise Mobility Management (EMM) Find out why Enterprise Mobility Management (EMM) solutions that are truly future-ready must be designed to enable Machine-to-Machine (M2M) capabilities and much more.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Workforce Mobilization for Improved Productivity A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Mobile/Wireless White Papers | Webcasts