Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/3/2015
01:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Hypori Unveils Virtual Mobile Infrastructure at Mobile World Congress

First Public Demonstration of Android Cloud Environment Ushers in Next-Generation of Secure BYOD

BARCELONA, Spain--(BUSINESS WIRE)--Hypori today unveiled its Android Cloud Environment (ACE) virtual mobile infrastructure platform at the 2015 Mobile World Congress in Barcelona. The company’s ACE platform, co-developed with the U.S. Department of Defense (DoD), shields enterprises from the risks of BYOD by separating the physical mobile device from applications and data of concern. To showcase its new platform, Hypori is hosting a VIP demo cloud environment for select users to utilize the ACE platform at Mobile World Congress. To request access to the demo cloud, please visit http://hypori.com/mwc.

“Organizations of all sizes and in all sectors understand the potential benefits of BYOD, but security, compliance and privacy continue to be a major concern,” said Justin Marston, CEO of Hypori. “The Hypori ACE platform was developed to shield enterprises from the risks of BYOD by eliminating data at-rest, and the inherent conflict between personal and business personas. With our new ACE platform we are ushering in the world of BYOD 3.0 that protects enterprises while still delivering a rich, responsive end-user experience.”

Hypori’s ACE platform is a mobile-first thin client solution that provides remote access to virtual mobile devices running in a private, public or hybrid cloud that can be accessed from iPads, iPhones and Android end-point devices. With support for multiple platforms and seamless integration with off-the-shelf mobile apps and Enterprise Mobile Management (EMM) technologies, Hypori’s highly scalable Android-based infrastructure helps commercial and public sector organizations bridge the gap between mobile productivity and mobile security.

Benefits include:

  • Security: Separate OS running in the cloud, clean and easy instrumentation, and Defense in Depth architecture.
  • Policy: Complies with U.S. Teleworking Enhancement Act, HIPAA and Asian banking regulations.
  • Support: One central gold disk image of Android to manage and support, instead of thousands of different mobile end points.
  • Cost Savings: Replace an enterprise-owned physical mobile device with an enterprise-owned virtual mobile device (costs approx. 80% less).
  • Privacy: No need to proactively manage the employee’s device; it’s just another mobile app to the end user.
  • Reimbursement: Measure data traffic per user over carrier connection; compensate $5 per GB (similar to $0.575 per mile driven).

Hypori was selected as one of only six companies to present at MWC’s Mobile Innovation program which features young companies creating the next wave of innovation in the mobile industry. In addition, Hypori CEO Justin Marston will join industry experts at AirWatch Connect to discuss "Staying Ahead of Security Threats" on Tuesday, March 3, 2015 at 5pm.

Organizations interested in a demo or learning more can visit Hypori in the AirWatch Connect Pavilion at Mobile World Congress in Hall 3, Stand 3D10 or by visiting: http://hypori.com.

About Hypori

Hypori provides virtual mobile infrastructure (VMI) solutions to shield enterprises from the risks of BYOD. Trusted by defense organizations and Fortune 1000 companies around the world, Hypori safeguards enterprise data without impacting the user experience. Founded in 2011, Hypori is headquartered in Austin, Texas and backed by Green Visor Capital as well as numerous private equity investors. For more information, visit http://hypori.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Chinese Attackers' Favorite Flaws Prove Global Threats, Research Shows
Kelly Sheridan, Staff Editor, Dark Reading,  10/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27652
PUBLISHED: 2020-10-29
Algorithm downgrade vulnerability in QuickConnect in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
CVE-2020-27653
PUBLISHED: 2020-10-29
Algorithm downgrade vulnerability in QuickConnect in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
CVE-2020-27654
PUBLISHED: 2020-10-29
Improper access control vulnerability in lbd in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to execute arbitrary commands via port (1) 7786/tcp or (2) 7787/tcp.
CVE-2020-27655
PUBLISHED: 2020-10-29
Improper access control vulnerability in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to access restricted resources via inbound QuickConnect traffic.
CVE-2020-27656
PUBLISHED: 2020-10-29
Cleartext transmission of sensitive information vulnerability in DDNS in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors.