Oracle Mobile Security Suite Provides Advanced Security for Corporate and BYOD Devices

<< back Page 2 of 2

“What we have done is taken the container technology that Bitzer was building and essentially extended that and integrated it with the Oracle technology and we are releasing the Mobile Security Suite as the first Oracle offering for Mobile App Management,” explained Jasuja.

Managed Container Approach Handles Personal and Corporate Data Differently

All of the key things that you would expect from a managed container are provided as part of the client-side solution, and then, there is Identity Management infrastructure on the back end, so the overall deployment is simpler, explained Jasuja.

By using a managed container, users can keep their personal data separate without the need for a MDM profile to manage the device. “We just create a secure workspace and within the workspace we provide out of the box, productivity, file browsing, file editing, and browser-type of applications. But the more important part is that we allow you to wrap any application whether  is one that you have built yourself or one that you acquired from a third-party vendor - including Oracle applications like Oracle BI or Oracle document management. You can take any of these applications - whether they are iOS or Android - and by executing a simple wrap command we inject all the security hooks in the binary to trap and enforce the security policies.” This could include disabling email and printing for business intelligence approach or cut, copy, paste between a personal workspace and corporate workspace, and the ability to encrypt files in local storage.

And, said Jasuja, because the Oracle technology is being scoped to the container there is no need to worry about what else is going on in the device and whether a device manufacturer like LG or Samsung provides a set of hooks to do something. “We just focus on the container.”

Oracle Approach Does Not use a NOC or VPN

The Oracle approach provides a number of key advantages, said Jasuja. For example, unlike some of the other MAM solution providers that require that all data and access has to go through their NOC (network operations center), the Oracle technology does not require that. This is important, he noted, from a privacy standpoint for many European companies that don’t want their data to go through a U.S. NOC. “In our case, the identity management technology includes a gateway product, and the gateway is deployed in your data center and that is where all the container application traffic terminates.” The Oracle approach also does not use device VPN (virtual private network), which is constantly on in the background draining the device battery, and places personal traffice through the VPN as well. “Our view is that only when the app that you are using for corporate work is on the foreground is when the SSL connection is turned on to the gateway and all the traffic is secured.”

Available as Part of a Suite or Standalone

As part of the Oracle Mobile Platform, Oracle Mobile Security Suite is integrated with Oracle’s Mobile Suite for application development, integration and deployment in addition to being available standalone.

<< back Page 2 of 2

Related Articles

There's no doubt that the management at Target had a miserable holiday season at the end of last year, between all the bad PR that came out about the online theft of 40 million customers' data records—later revised to be even higher—and the costs of providing disclosures and working with banks, and the headaches of potentially expensive lawsuits that are being filed. Such is every organization's nightmare, the price of openness and accessibility. According to a new survey of 322 data and IT managers, there is a growing awareness among enterprise executives and managers about the potential issues to enterprise data security.

Posted February 10, 2014