MokaFive M5 makes BYOD using iPads/iPhones secure

MokaFive M5 makes BYOD using iPads/iPhones secure

Summary: Secure and encrypted workspace, secure browsing and secure corporate or cloud-based storage are requirements for organizations having "Bring Your Own Device" programs. MokaFive's M5 uses virtualization technology to create a secure corporate environment using staff-member's own devices.

SHARE:

MokaFive just announced M5, an update to their technology for IOS-based devices. By encapsulating processing and data within secure, virtualized environments, it is more easily possible for organizations to allow staff-members to use their own iPads, and iPhones in a secure corporate environment.

Here's what MokaFive has to say about M5

M5 effectively transforms iPhones and iPads into true Enterprise-class, business computing devices with all the security and manageability IT requires with the ease of use and app selection that users now expect.

The M5 platform delivers a secure, device aware, digital workspace across any network — creating a highly elastic and mobile Enterprise perimeter with significantly less management overhead than legacy VDI or mobility solutions.

Updates to M5 for iOS include:

  • Secure, Encrypted Workspace Container — Deploy a corporate AES-256 bit encrypted workspace on any iOS device, and remotely wipe it without affecting the rest of the device.
  • Secure Web Browsing — Securely browse internal corporate websites, SharePoint, or intranet pages from public networks without the need for a VPN client from personal iPhones/iPads.
  • Cloud Storage — Securely browse and access files in a public or private cloud from any location.
  • SharePoint Access — Collaborate with co-workers anywhere, anytime with remote access to SharePoint files.
  • Corporate Data Store — Add intranet directories and file sharing for users to browse while online.
  • Document Annotation — Make changes to documents with annotation-style editing.
  • Universal Search — Search for documents across all data sources.
  • Application Whitelisting — Whitelist specific personal apps and websites for inclusion in the corporate workspace.

Snapshot analysis

From time to time, I have the opportunity to speak with MokaFive. Each time I do, I'm always impressed how they are using processing, application and access virtualization technology to create an easy-to-manage, safe computing environment for Windows, Mac and smart handheld devices. I can see how their technology would be of great help to organizations whose staff, consultants or customers need a secure, reliable way to access corporate applications and data.

For example, one of my Kusnetzky Group clients requires a very high level of security, and this has offered some challenges for me and my analysts. MokaFive would have been a great solution to those challenges.

The client sends encrypted data and requires interim reports, spreadsheets and presentation decks to be sent to them in the same form.  Unfortunately, this client has selected an out-of-date, Windows-only encryption product and we use a combination of devices that include Macs, iPads and other smart handheld devices. At the time this project started, we had no Windows-based devices in the company.

During the start-up phase of the project, we tried a number of virtualization technologies to run the required encryption product. The available application virtualization tools failed to support this out-of-date encryption product. (I think died in disgrace would be the best way to say it.) The use of virtual machine software to run Windows on our Mac systems required we acquire Windows licenses as well as acquire a virtual machine software product that would allow very low level access to storage resources. In the end, we decided that purchasing a low-cost Windows 7-based laptop just to run this software would be less costly and complex.

Now we have a laptop that sits on a shelf and is run for a few minutes every month or so.

Had the client been using MokaFive's product, it would have been easy for us to encapsulate the data and deliver it to us in a form that would have been easily usable on Windows, Mac and, now, on IOS devices.

 

Topics: Mobility, Cloud, Virtualization

About

Daniel Kusnetzky, a reformed software engineer and product manager, founded Kusnetzky Group LLC in 2006. He's literally written the book on virtualization and often comments on cloud computing, mobility and systems software. In his spare time, he's also the managing partner of Lux Sonus LLC, an investment firm.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

1 comment
Log in or register to join the discussion
  • BYOD

    MokaFive's M5 seems to offer a good package that will fit many large businesses, but I think it will be too much for most SMB's. A trend I am starting to see grow in the SMB segment, is making custom BYOD data security apps for their employees phones. Example, Tigertext now has a secure texting API called TigerConnect that companies are integrating into their own data security apps for SOX and HIPAA compliance, which I think is very telling in that companies are taking this option seriously. For SMB's, and maybe even the larger companies, IT managers are going to have to be creative to meet the right technology and budget balance needed to deal with BYOD.
    parmerjanessa