Welcome!

@CloudExpo Authors: Pat Romanski, Carl J. Levine, Elizabeth White, Liz McMillan, Lori MacVittie

News Feed Item

Enjoy Guaranteed Mobile Security with Huawei's AnyOffice Mobile Security Solution

LAS VEGAS, Jan. 10, 2014 /PRNewswire/ -- One of the hottest IT policies among enterprises, Bring Your Own Device (BYOD) has gained sustained momentum and increasing popularity around the world over the past year. According to Gartner's prediction[1] by 2017, about half of the world's companies will enact BYOD programs and will no longer provide computing devices to employees. While BYOD brings tremendous benefits to both individual employees and companies at large, it also brings about challenges and concerns, such as security risks, that hinder its prevalence. 

(Infographic: http://photos.prnewswire.com/prnh/20140110/CN44159-INFO )

According to a survey conducted by IDC, 61% of enterprises adopting BYOD consider mobile security as their top security concern[2]. Such mobile security concerns are mainly focused on three core aspects: identity, privacy, and compliance. To address these concerns, Huawei launched the AnyOffice Mobile Security Solution -- a vulnerability-free mobile security solution that offers ubiquitous security features, covering a full spectrum of mobile elements, including devices, networks, as well as services and management.

Identity: Effective Authentication and Access Control

Huawei's AnyOffice Mobile Security Solution adopts refined, flexible security authentication and access control policies for user and mobile device identification. By adopting a "5W1H" (Who, Whose Device, What Device, Where, When, and How) matching approach, the solution helps enterprise IT management verify user identity authentication based on individual users, user groups, bandwidth usage, priorities, access time, or network zones. This helps enterprises effectively prevent unauthorized user access or resource misuse, mitigate regulation breach caused by network misuse, minimize information leakage, and protect enterprise core information assets.

Privacy: Ensuring Secure Data Usage, Storage and Transmission

Privacy has been a key consideration for BYOD adoption among companies. Leveraging advanced technologies, the Huawei AnyOffice Mobile Security Solution helps enterprises mitigate privacy concerns by ensuring secure data usage, storage and transmission. For instance, by adopting unique sandboxing technology, the solution separates encrypted corporate applications and data from those of individual users. In addition, in the event when a mobile device is lost or misplaced, the device owner can remotely wipe all data from the device using the Mobile Device Management (MDM) technology empowered by the solution. To ensure secure data transmission, the solution features Layer 3 Virtual Private Network (L3 VPN) and Layer 4 Virtual Private Network (L4 VPN) protection technologies, providing network-layer and application-layer encrypted tunnels respectively, which help to fend off interceptions, tampers and other threats during data transmission.

Compliance: Regulations throughout Mobile Devices Lifecycle

Another key factor triggering security risks when a company goes mobile is policy compliance. Huawei's AnyOffice Mobile Security Solution adopts leading regulatory compliance technologies, which enable establishment of comprehensive compliance management regulations. This ensures that mobile devices are compliant with regulations throughout an Acquire-Deploy-Run-Retire device lifecycle, as defined by the company.

Successful Implementation Reduces Costs and Enhances Operational Efficiency

Huawei, a leading global information and communications technology (ICT) solutions provider has been experiencing fast business growth and rapid global expansion over the past few years. Amidst the rapid expansion, Huawei has been facing challenges brought about by its core IT systems. In order to reduce response time and improve operational efficiency of IT systems, Huawei introduced the initial phase of its self-developed BYOD program in 2009. With the implementation of the Huawei's AnyOffice Mobile Security Solution, about 30,000 employees have enjoyed secure global mobile office operations by the end of 2013. This greatly improved average operational efficiency by up to 37 minutes per day, which translated into over US$10 million savings every year. The centralized mobile security management featured in the solution also helped mitigate IT maintenance pressure, resulting in reduced IT operational costs.

Since 2009, Huawei has been rolling out its BYOD program across the whole company, aiming to enhance operational efficiency and eliminate security concerns. According to Huawei's latest BYOD adoption timeline, over 80 percent of Huawei's 150000 employees will be enjoying BYOD by the end of 2015, which is expected to generate a significant increase in cost savings and further enhance the company's productivity.

Constant Changes Ahead

In an era where the evolution of mobile technologies and applications are inevitable, enterprises will need to remain open to the adoption of innovative technologies and undergo constant internal technological enhancements. Foreseeable changes in mobile technologies include device virtualization, emergence of explicit security ratings, shift from BYOD to Bring Your Own Application (BYOA), as well as a focus on Mobile Application Management and Mobile Content Management. To enable seamless management and maintenance of mobile applications and security, Huawei will continue to offer customer-centric one-stop mobile security and virtualization solutions and services, empowering enterprise customers with more flexible and efficient operations, without security concerns.



[1] "Half of Companies Will Require BYOD By 2017, Gartner Says", CIO, May 1, 2013: http://www.cio.com/article/732649/Half_of_Companies_Will_Require_BYOD_By_2017_Gartner_Says?source=cio_top5


[2] IDC Asia/Pacific Future Workspace Study, May 2013

SOURCE Huawei

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...