For personal data and apps, the employee then relies on the standard mobile carrier. When a notification appears related to the business instance, the employee can return to a home screen and access that platform. To visualize the difference between Type 1 and Type 2 hypervisors: the change form one platform to another might occur at the actual phone lock screen, as opposed to switching apps. This provides more hardware-level security and faster performance.
Of course, the downside is that the process of working with OEMs takes longer. There will be fewer smartphones that can support hardware level virtualization.
IT User Acceptance One of the challenges with mobile virtualization has to do with user acceptance. When an employee beings an iPhone into work, the last thing he or she expects is to have to hand the device over to IT for gatekeeping measures. Fortunately, as Hazelton noted, these employees will be more likely to go along with new mobile virtualization policies if they see the value in their job.
For example, mobile virtualization can help reduce some complexity with unified communication. IT can seamlessly "merge" one device into the enterprise as their business and personal phone become one. Employees will also benefit from more streamlined security: anytime they surf the Web, snap a picture, or chat over instant messaging, they won't have an IT hawk looking over their shoulder.
Yet, Hazelton says, when they do engage in business activities Â such as sharing a secure financial report Â they can use the approved business apps and an OS instance that is governed by IT. There's also no need for a complex password on the device when an employee wants to check the news. Employees are also free to download any app on their phone as long as they do so in the personal virtual OS.
A major hurdle to widespread adoption: Most of the mobile virtualization software works only with Android phones today. That leaves the most popular phone in the world out of the loop: the iPhone. Hazelton says few organizations have standardized on only Android phones.
Virtualization Helps But You Still Need Policies In the end, mobile virtualization does address some critical trends in the enterprise. The one caveat is that, mobile virtualization does not fully address rogue employee activity. There is a clear separation between personal and business activities, and IT can control which apps are approved for business use, but employees can still send personal e-mails that contain business data. They can still nap photos of financial records with their phone and transmit them over Yahoo Mail.
Hazelton advises companies to still go to the root causes of security breaches and develop clear mobile policies. Virtualization can help, but it is not a fool-proof answer to the BYOD problem.