Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/3/2015
01:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Hypori Unveils Virtual Mobile Infrastructure at Mobile World Congress

First Public Demonstration of Android Cloud Environment Ushers in Next-Generation of Secure BYOD

BARCELONA, Spain--(BUSINESS WIRE)--Hypori today unveiled its Android Cloud Environment (ACE) virtual mobile infrastructure platform at the 2015 Mobile World Congress in Barcelona. The company’s ACE platform, co-developed with the U.S. Department of Defense (DoD), shields enterprises from the risks of BYOD by separating the physical mobile device from applications and data of concern. To showcase its new platform, Hypori is hosting a VIP demo cloud environment for select users to utilize the ACE platform at Mobile World Congress. To request access to the demo cloud, please visit http://hypori.com/mwc.

“Organizations of all sizes and in all sectors understand the potential benefits of BYOD, but security, compliance and privacy continue to be a major concern,” said Justin Marston, CEO of Hypori. “The Hypori ACE platform was developed to shield enterprises from the risks of BYOD by eliminating data at-rest, and the inherent conflict between personal and business personas. With our new ACE platform we are ushering in the world of BYOD 3.0 that protects enterprises while still delivering a rich, responsive end-user experience.”

Hypori’s ACE platform is a mobile-first thin client solution that provides remote access to virtual mobile devices running in a private, public or hybrid cloud that can be accessed from iPads, iPhones and Android end-point devices. With support for multiple platforms and seamless integration with off-the-shelf mobile apps and Enterprise Mobile Management (EMM) technologies, Hypori’s highly scalable Android-based infrastructure helps commercial and public sector organizations bridge the gap between mobile productivity and mobile security.

Benefits include:

  • Security: Separate OS running in the cloud, clean and easy instrumentation, and Defense in Depth architecture.
  • Policy: Complies with U.S. Teleworking Enhancement Act, HIPAA and Asian banking regulations.
  • Support: One central gold disk image of Android to manage and support, instead of thousands of different mobile end points.
  • Cost Savings: Replace an enterprise-owned physical mobile device with an enterprise-owned virtual mobile device (costs approx. 80% less).
  • Privacy: No need to proactively manage the employee’s device; it’s just another mobile app to the end user.
  • Reimbursement: Measure data traffic per user over carrier connection; compensate $5 per GB (similar to $0.575 per mile driven).

Hypori was selected as one of only six companies to present at MWC’s Mobile Innovation program which features young companies creating the next wave of innovation in the mobile industry. In addition, Hypori CEO Justin Marston will join industry experts at AirWatch Connect to discuss "Staying Ahead of Security Threats" on Tuesday, March 3, 2015 at 5pm.

Organizations interested in a demo or learning more can visit Hypori in the AirWatch Connect Pavilion at Mobile World Congress in Hall 3, Stand 3D10 or by visiting: http://hypori.com.

About Hypori

Hypori provides virtual mobile infrastructure (VMI) solutions to shield enterprises from the risks of BYOD. Trusted by defense organizations and Fortune 1000 companies around the world, Hypori safeguards enterprise data without impacting the user experience. Founded in 2011, Hypori is headquartered in Austin, Texas and backed by Green Visor Capital as well as numerous private equity investors. For more information, visit http://hypori.com.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23281
PUBLISHED: 2021-04-13
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated remote code execution vulnerability. IPM software does not sanitize the date provided via coverterCheckList action in meta_driver_srv.js class. Attackers can send a specially crafted packet to make IPM connect to ro...
CVE-2021-27598
PUBLISHED: 2021-04-13
SAP NetWeaver AS JAVA (Customer Usage Provisioning Servlet), versions - 7.31, 7.40, 7.50, allows an attacker to read some statistical data like product version, traffic, timestamp etc. because of missing authorization check in the servlet.
CVE-2021-27600
PUBLISHED: 2021-04-13
SAP Manufacturing Execution (System Rules), versions - 15.1, 15.2, 15.3, 15.4, allows an authorized attacker to embed malicious code into HTTP parameter and send it to the server because SAP Manufacturing Execution (System Rules) tab does not sufficiently encode some parameters, resulting in Stored ...
CVE-2021-27601
PUBLISHED: 2021-04-13
SAP NetWeaver AS Java (Applications based on HTMLB for Java) allows a basic-level authorized attacker to store a malicious file on the server. When a victim tries to open this file, it results in a Cross-Site Scripting (XSS) vulnerability and the attacker can read and modify data. However, the attac...
CVE-2021-27602
PUBLISHED: 2021-04-13
SAP Commerce, versions - 1808, 1811, 1905, 2005, 2011, Backoffice application allows certain authorized users to create source rules which are translated to drools rule when published to certain modules within the application. An attacker with this authorization can inject malicious code in the sour...