From: Market Watch
Trusted Mobile Devices Based on INTEGRITY Multivisor Security Architecture Available for Trial and Pilot Programmes Today
COMMENT - If not for the fraud which bolstered his faltering career in
1985 Dan O'Dowd and his wife, Amy would today be grubbing around in
Glendale and dealing with the problems confronting the rest of us. The Ethics of Drone Contractors
It is really rather stomach wrenching to see them use the term, 'INTEGRITY.'
ARTICLE
Trusted Mobile Devices Based on INTEGRITY Multivisor Security Architecture Available for Trial and Pilot Programmes Today
LONDON, UNITED KINGDOM and SANTA BARBARA, CA, Dec 18, 2013 (Marketwired via COMTEX) --
Green Hills Software, the largest independent vendor of embedded and
mobile virtualization solutions, today announced that it is teaming
with HP to offer trusted mobile devices built with Green Hills
Software's INTEGRITY(R) Multivisor(TM) virtualization technology for
Android and enabled by HP's secure mobility service, to the UK public
sector.
As part of a new teaming agreement with Hewlett-Packard Enterprise
Services (UK) Ltd, Green Hills Software is piloting a secure mobile
device initiative combining HP's secure mobility end-to-end service
and Green Hills Software's INTEGRITY Multivisor security technology.
The separation kernel-based Type-1 hypervisor delivers security that
cannot be achieved with mobile OS-level mechanisms through
application wrapping, containers, access control and encrypted
workspaces.
These trusted mobile devices demonstrate form factor flexibility,
near-zero impact to OEMs, and the ability to deploy high assurance
isolation technology at the speed of consumer electronics innovation.
"When you consider that there are over 1.3 million mobile devices in
the UK public sector, lowering cost, improving communication and
increasing overall mobile security results is a huge benefit to the
UK Government," said Christopher Smith, vice president of marketing,
Green Hills Software. "Our separation kernel-based Type-1 hypervisor
isolates at the hardware level, providing users with confidence in
personal privacy while ensuring security and protection of critical
enterprise information. Furthermore, the increased security provided
with this solution will enable many new public sector departments to
adopt mobile smartphones and tablets." MORE
hi..Im college student, thanks for sharing :)
ReplyDelete