Insecure Android a myth, Motorola exec says
Motorola's enterprise GM says security tools will convince CIOs that Android can be trusted
Computerworld - LAS VEGAS -- It's a myth that Android isn't secure and is difficult for IT managers to control, a Motorola Mobile executive said in an interview at the Consumer Electronics Show here.
Christy Wyatt, general manager of Motorola's recently-created enterprise business unit, said the company has recently started licensing security and management tools designed to bring virtual private networks, encryption and other protections to the Android platform to make it secure.
Motorola gained the security technology with its acquisition of 3LM, a maker of Android security and device management tools last year.
Other makers of Android-based devices, such as HTC and Sony, have struck agreements with Motorola to license the 3LM software, which will make Android more amenable to enterprise customers, Wyatt said.
While Wyatt wouldn't disclose the cost of a business 3LM console and server, she contended that it's not expensive.
Wyatt conceded that Android has faced skepticism from IT managers accustomed to security protections included in the Research in Motion BlackBerry Enterprise Server. "We have to get Android as a whole at a stable and secure place and once Android is behind the firewall [with 3LM],that helps," she said.
"There's a lot of mythology around Android and whether it's secure or not," she said. "IT needs hardware encryption and support for certifications and VPN."
Because Research in Motion has had a hard year with network outages, slow rollouts of new smartphones and financial worries, many in IT face the task converting some existing BlackBerry users to other smartphones platforms -- chiefly Android and Apple's iOS, Wyatt said.
"BlackBerry has been helping us in many ways, with outages and [more]," she said. "We hear people using Android saying they want to stay on Android and iPhone saying they want to stay on iPhone, but BlackBerry users say they might not want BlackBerry when they get another phone."
Meanwhile, the so-called consumerization of IT trend has led to workers who never received a company-issued BlackBerry to use a personal device for business voice and data needs. Many IT organizations used to providing support for 1,000 BlackBerry users might suddenly find they must support 30,000 smartphone users on a variety of platforms, Wyatt noted.
IT managers are also worried about controlling the data usage of workers, to keep costs down, she said.
Motorola's Android phones have for a year included a data management tool that can set policies on data usage. For example, the tool would let managers set a policy requiring that downloads, such as a movie, be done on Wi-Fi rather than 3G or 4G wireless, Wyatt said.
Currently, it's not possible to separate personal data usage from business use on Android devices, but capability is coming, Wyatt said.
Today, generic Android provides IT managers the ability to remotely wipe data from lost or stolen phones, an ability that could "create a lot of issues" for users who don't want to lose precious personal items as family photos, she noted. The 3LM tools do allow partitioning of personal and corporate data, which allows workers using personal smartphones to keep such data, Wyatt said.
Wyatt said she also believes corporate IT shops will be pleased that Motorola Mobility CEO Sanjay Jha recently called for fewer models of Motorola smartphones to be unveiled in 2012.
"Diversity costs money and to have to test an app on 30 models of phones instead of 10 models," she said. "Fewer models helps us with updates and testing and configuration and that applies to corporate IT."
Wyatt has been at Motorola for six years and previously handled OS licensing at Palm. She said her enterprise division is small, but wouldn't reveal how many workers she supervises. In her group are software developers as well as enterprise sales and marketing professionals.
Matt Hamblen covers mobile and wireless, smartphones and other handhelds, and wireless networking for Computerworld. Follow Matt on Twitter at @matthamblen, or subscribe to Matt's RSS feed . His e-mail address is email@example.com.
- Is the 'quantified self' movement just a fad?
- Elgan: Voice, gestures dominate CES
- Windows 8 on ARM: You can look but you can't touch
- Google's Marissa Mayer says more women needed in tech
- Hands on: Sony Xperia Ion smartphone
- New Ford Focus Electric comes with smartphone app
- Insecure Android a myth, Motorola exec says
- For $1000, a chance for tech glory in Vegas
- Buyers hang on for cheaper, faster Windows 8 ultrabooks
- CES: Coming soon, drones for home and office
Read more about iOS in Computerworld's iOS Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Market Overview: Digital Customer Experience Delivery Platforms Forrester states that businesses today struggle to understand and use the tools necessary to create and manage unified, multichannel digital customer experiences across...
- The Growing Demand for Rich Media This white paper discusses how IBM Customer Experience Suite Rich Media Edition can automate rich media workflows, from collaborating with creative agencies and...
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success!
- Transform Your IT Service Management Watch this webinar, to learn how EasyVista can increase IT productivity & efficiency and deliver streamlined & integrated IT Service & Asset Mgmt. All iOS White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!