ViaSat, Green Hills Software team on 'military-grade' security for Android
Embedded and mobile virtualization solutions provider Green Hills Software is collaborating with military and commercial satellite communications firm ViaSat to deliver military-grade security optimized for Android smartphones and tablets.
ViaSat Secured--a carrier-agnostic mobile enterprise system that addresses security, privacy, manageability and usability demands for dual-use personal/business mobile devices--is integrating Green Hills' Integrity Multivisor, a foundational data protection and isolation firmware layer situated below the mobile operating system.
The Integrity Multivisor architecture is built upon security-certified separation kernel technology that provides highly assured isolation between one or more "guest" operating systems, while also providing a native open standard execution environment bolstered by FIPS 140-2 certified and NSA Suite B-compliant data encryption.
Integrity Multivisor enables either a secure single or dual persona solution across ViaSat Secured devices managed with ViaSat network management, which includes firmware-over-the-air update and enterprise policy management services, along with an open application programming interface for integrating with enterprise mobile device management products.
The secure dual persona and enterprise management technology is designed to give users confidence in the privacy of their photos, contacts, e-mail and other personal information while simultaneously assuring the security of enterprise data both within the device and across the corporate network, the companies said.
"Users have been clamoring for the freedom to use their mobile devices in the workplace, but the wide variety of application-level mechanisms for sandboxing personal and corporate data that have flooded the market over the past few years can not provide a meaningful level of security," said Gordon Jones, Green Hills Software's vice president for secure virtualization. "ViaSat Secured isolates at the mobile device hardware level, below the mobile OS, rendering even root mobile OS exploits completely harmless with respect to enterprise information and network access."
- read this release
Enterprise mobility security risks stress out most IT pros
Mobile security added to National Cyber Security Awareness Month
Hackers find new way to stuff malware in Android mobile devices