Click here to close now.




Welcome!

@CloudExpo Authors: Pat Romanski, Elizabeth White, Dana Gardner, Liz McMillan, Stefan Bernbo

News Feed Item

Enjoy Guaranteed Mobile Security with Huawei's AnyOffice Mobile Security Solution

LAS VEGAS, Jan. 10, 2014 /PRNewswire/ -- One of the hottest IT policies among enterprises, Bring Your Own Device (BYOD) has gained sustained momentum and increasing popularity around the world over the past year. According to Gartner's prediction[1] by 2017, about half of the world's companies will enact BYOD programs and will no longer provide computing devices to employees. While BYOD brings tremendous benefits to both individual employees and companies at large, it also brings about challenges and concerns, such as security risks, that hinder its prevalence. 

(Infographic: http://photos.prnewswire.com/prnh/20140110/CN44159-INFO )

According to a survey conducted by IDC, 61% of enterprises adopting BYOD consider mobile security as their top security concern[2]. Such mobile security concerns are mainly focused on three core aspects: identity, privacy, and compliance. To address these concerns, Huawei launched the AnyOffice Mobile Security Solution -- a vulnerability-free mobile security solution that offers ubiquitous security features, covering a full spectrum of mobile elements, including devices, networks, as well as services and management.

Identity: Effective Authentication and Access Control

Huawei's AnyOffice Mobile Security Solution adopts refined, flexible security authentication and access control policies for user and mobile device identification. By adopting a "5W1H" (Who, Whose Device, What Device, Where, When, and How) matching approach, the solution helps enterprise IT management verify user identity authentication based on individual users, user groups, bandwidth usage, priorities, access time, or network zones. This helps enterprises effectively prevent unauthorized user access or resource misuse, mitigate regulation breach caused by network misuse, minimize information leakage, and protect enterprise core information assets.

Privacy: Ensuring Secure Data Usage, Storage and Transmission

Privacy has been a key consideration for BYOD adoption among companies. Leveraging advanced technologies, the Huawei AnyOffice Mobile Security Solution helps enterprises mitigate privacy concerns by ensuring secure data usage, storage and transmission. For instance, by adopting unique sandboxing technology, the solution separates encrypted corporate applications and data from those of individual users. In addition, in the event when a mobile device is lost or misplaced, the device owner can remotely wipe all data from the device using the Mobile Device Management (MDM) technology empowered by the solution. To ensure secure data transmission, the solution features Layer 3 Virtual Private Network (L3 VPN) and Layer 4 Virtual Private Network (L4 VPN) protection technologies, providing network-layer and application-layer encrypted tunnels respectively, which help to fend off interceptions, tampers and other threats during data transmission.

Compliance: Regulations throughout Mobile Devices Lifecycle

Another key factor triggering security risks when a company goes mobile is policy compliance. Huawei's AnyOffice Mobile Security Solution adopts leading regulatory compliance technologies, which enable establishment of comprehensive compliance management regulations. This ensures that mobile devices are compliant with regulations throughout an Acquire-Deploy-Run-Retire device lifecycle, as defined by the company.

Successful Implementation Reduces Costs and Enhances Operational Efficiency

Huawei, a leading global information and communications technology (ICT) solutions provider has been experiencing fast business growth and rapid global expansion over the past few years. Amidst the rapid expansion, Huawei has been facing challenges brought about by its core IT systems. In order to reduce response time and improve operational efficiency of IT systems, Huawei introduced the initial phase of its self-developed BYOD program in 2009. With the implementation of the Huawei's AnyOffice Mobile Security Solution, about 30,000 employees have enjoyed secure global mobile office operations by the end of 2013. This greatly improved average operational efficiency by up to 37 minutes per day, which translated into over US$10 million savings every year. The centralized mobile security management featured in the solution also helped mitigate IT maintenance pressure, resulting in reduced IT operational costs.

Since 2009, Huawei has been rolling out its BYOD program across the whole company, aiming to enhance operational efficiency and eliminate security concerns. According to Huawei's latest BYOD adoption timeline, over 80 percent of Huawei's 150000 employees will be enjoying BYOD by the end of 2015, which is expected to generate a significant increase in cost savings and further enhance the company's productivity.

Constant Changes Ahead

In an era where the evolution of mobile technologies and applications are inevitable, enterprises will need to remain open to the adoption of innovative technologies and undergo constant internal technological enhancements. Foreseeable changes in mobile technologies include device virtualization, emergence of explicit security ratings, shift from BYOD to Bring Your Own Application (BYOA), as well as a focus on Mobile Application Management and Mobile Content Management. To enable seamless management and maintenance of mobile applications and security, Huawei will continue to offer customer-centric one-stop mobile security and virtualization solutions and services, empowering enterprise customers with more flexible and efficient operations, without security concerns.



[1] "Half of Companies Will Require BYOD By 2017, Gartner Says", CIO, May 1, 2013: http://www.cio.com/article/732649/Half_of_Companies_Will_Require_BYOD_By_2017_Gartner_Says?source=cio_top5


[2] IDC Asia/Pacific Future Workspace Study, May 2013

SOURCE Huawei

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
So you’ve heard how click-to-call widgets can really enhance a website’s potential for customer interaction and you want to try it out for yourself. Or you’re considering offloading pieces of your VoIP infrastructure, but want to see how that would unfold first. Where can you find this technology, that’s free and available to try out? Spotting the potential in a space where customers can experiment with these types of features, Voxbone is launching The Workshop.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, discussed how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He also discussed how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors ...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
"We work in the area of Big Data analytics and Big Data analytics is a very crowded space - you have Hadoop, ETL, warehousing, visualization and there's a lot of effort trying to get these tools to talk to each other," explained Mukund Deshpande, head of the Analytics practice at Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location. In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...
The initial debate is over: Any enterprise with a serious commitment to IT is migrating to the cloud. But things are not so simple. There is a complex mix of on-premises, colocated, and public-cloud deployments. In this power panel at 18th Cloud Expo, moderated by Conference Chair Roger Strukhoff, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Commvault; Dave Landa, Chief Operating Officer at kintone; William Morrish, General Manager Product Sales at Interou...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Dialogic has announced that ZVRS chose Dialogic® PowerMedia™ XMS software media server as part of its latest video relay and translation service offering. ZVRS uses Dialogic’s PowerMedia XMS technology to provide a robust solution that supports a broad range of legacy devices and any-to-any video capabilities with its flagship Z70 videophone. ZVRS selected Dialogic’s solution to facilitate a release of Z70 that met its stringent requirements for legacy device support (H.263 and H.264) with high...
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
Edge Hosting has announced a partnership with and the availability of CloudFlare, a web application firewall, CDN and DDoS mitigation service. “This partnership enhances Edge Hosting’s world class, perimeter layer, application (layer 7) defensive mechanism,” said Mark Houpt, Edge Hosting CISO. “The goal was to enable a new layer of customer controlled defense and compliance through the application of DDoS filters and mitigations, the web application firewall (WAF) feature and the added benefit ...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...