Android Smartphones are in high demand by workers, but they lack key security features. Here are the top five things you can do to make sure your Android Smartphone
in your organization doesn’t create a security nightmare.
Use a service to secure data
Android's open market and few security features open the door to hackers, leaving critical corporate data at risk. The best security comes from providers like Good Technology, which secures Android Smartphones using its own network operations center, software on the Smartphones, and a server behind a firewall. Technology like Good's encrypts data as it travels to and from the device, and stored data is also encrypted. IT administrators are not required to open a hole in the corporate firewall.
Ask smartphone makers for help
Some manufacturers, including Motorola and Samsung, have developed little-marketed products and services for enterprises. Samsung, for instance, is developing a version of its Touch Wiz software that will support advanced encryption standard security and VPN connections. Motorola recently acquired 3LM, a company developing software that resides on the phone and in a corporate server, to encrypt data travelling to and from the device and set up a VPN to corporate data. 3LM's software is expected to be available on other Android Smartphones, not just those made by Motorola.
Restrict users to models with better security
Motorola, for instance, has a line aimed at enterprise users-business-ready android smartphones that include enhanced security features. The Droid Pro, for example, allows for remote wipe of SD cards, and comes with a VPN client and the ability to force users to create new passwords after a set time.
Wait for mobile virtual machine technology to mature
VMware is working on a mobile virtual machine that lets users toggle between two android smartphone personas: one for corporate use and one for personal use. The company plans to also offer a management tool so IT departments can set policies for the corporate persona on the android smartphone. So far, LG and Samsung say they hope to make android smartphones capable of using the VMware tool. Other companies, like Open Kernel Labs, are offering tools that let developers build applications that can run inside a virtual machine, isolating them from threats.
Use a management tool that enforces basic security
Sybase, BoxTone, Zenprise, Mobile Iron and Fiber link are among the many companies offering mobile device management-and in some cases, additional mobile security-products and services. Even a basic Android mobile device management product will at the very least help IT administrators enforce policies like a password requirement and remotely erase important corporate data if a device is lost or stolen.