Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:30 PM
Dark Reading
Dark Reading
Products and Releases

Hypori Unveils Virtual Mobile Infrastructure at Mobile World Congress

First Public Demonstration of Android Cloud Environment Ushers in Next-Generation of Secure BYOD

BARCELONA, Spain--(BUSINESS WIRE)--Hypori today unveiled its Android Cloud Environment (ACE) virtual mobile infrastructure platform at the 2015 Mobile World Congress in Barcelona. The company’s ACE platform, co-developed with the U.S. Department of Defense (DoD), shields enterprises from the risks of BYOD by separating the physical mobile device from applications and data of concern. To showcase its new platform, Hypori is hosting a VIP demo cloud environment for select users to utilize the ACE platform at Mobile World Congress. To request access to the demo cloud, please visit http://hypori.com/mwc.

“Organizations of all sizes and in all sectors understand the potential benefits of BYOD, but security, compliance and privacy continue to be a major concern,” said Justin Marston, CEO of Hypori. “The Hypori ACE platform was developed to shield enterprises from the risks of BYOD by eliminating data at-rest, and the inherent conflict between personal and business personas. With our new ACE platform we are ushering in the world of BYOD 3.0 that protects enterprises while still delivering a rich, responsive end-user experience.”

Hypori’s ACE platform is a mobile-first thin client solution that provides remote access to virtual mobile devices running in a private, public or hybrid cloud that can be accessed from iPads, iPhones and Android end-point devices. With support for multiple platforms and seamless integration with off-the-shelf mobile apps and Enterprise Mobile Management (EMM) technologies, Hypori’s highly scalable Android-based infrastructure helps commercial and public sector organizations bridge the gap between mobile productivity and mobile security.

Benefits include:

  • Security: Separate OS running in the cloud, clean and easy instrumentation, and Defense in Depth architecture.
  • Policy: Complies with U.S. Teleworking Enhancement Act, HIPAA and Asian banking regulations.
  • Support: One central gold disk image of Android to manage and support, instead of thousands of different mobile end points.
  • Cost Savings: Replace an enterprise-owned physical mobile device with an enterprise-owned virtual mobile device (costs approx. 80% less).
  • Privacy: No need to proactively manage the employee’s device; it’s just another mobile app to the end user.
  • Reimbursement: Measure data traffic per user over carrier connection; compensate $5 per GB (similar to $0.575 per mile driven).

Hypori was selected as one of only six companies to present at MWC’s Mobile Innovation program which features young companies creating the next wave of innovation in the mobile industry. In addition, Hypori CEO Justin Marston will join industry experts at AirWatch Connect to discuss "Staying Ahead of Security Threats" on Tuesday, March 3, 2015 at 5pm.

Organizations interested in a demo or learning more can visit Hypori in the AirWatch Connect Pavilion at Mobile World Congress in Hall 3, Stand 3D10 or by visiting: http://hypori.com.

About Hypori

Hypori provides virtual mobile infrastructure (VMI) solutions to shield enterprises from the risks of BYOD. Trusted by defense organizations and Fortune 1000 companies around the world, Hypori safeguards enterprise data without impacting the user experience. Founded in 2011, Hypori is headquartered in Austin, Texas and backed by Green Visor Capital as well as numerous private equity investors. For more information, visit http://hypori.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: "The truth behind Stonehenge...."
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-02
Dell EMC OpenManage Server Administrator (OMSA) version 9.5 Microsoft Windows installations with Distributed Web Server (DWS) enabled configuration contains an authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to gain admin acces...
PUBLISHED: 2021-03-02
Dell EMC OpenManage Server Administrator (OMSA) versions 9.5 and prior contain a path traversal vulnerability. A remote user with admin privileges could potentially exploit this vulnerability to view arbitrary files on the target system by sending a specially crafted URL request.
PUBLISHED: 2021-03-02
Blackboard Collaborate Ultra 20.02 is affected by a cross-site scripting (XSS) vulnerability. The XSS payload will execute on the class room, which leads to stealing cookies from users who join the class.
PUBLISHED: 2021-03-02
A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4.
PUBLISHED: 2021-03-02
An issue was discovered in app/Model/SharingGroupServer.php in MISP 2.4.139. In the implementation of Sharing Groups, the "all org" flag sometimes provided view access to unintended actors.