Security is the main use case for virtual mobile infrastructure.
With virtual mobile infrastructure (VMI), a mobile application and its data remain safely protected in a data center. A special client app renders the app on an endpoint device, but the app does not run locally. So if a device is lost or stolen, or an individual leaves an organization, all an administrator needs to do is revoke access to the virtualized app. Even if someone manages to get unauthorized access, he cannot copy and paste sensitive data out of the app or even take screenshots.
The biggest roadblock to VMI adoption is that it requires the client to be constantly tethered to network access. When connectivity can be guaranteed, however, any organization in which security is a top priority can potentially benefit from VMI.
Some organizations might also turn to virtual mobile infrastructure to satisfy compliance requirements, which often go hand-in-hand with security. For example, the healthcare industry can use VMI to comply with Health Insurance Portability and Accountability Act regulations, and retailers might turn to VMI for point-of-sale operations to comply with the Payment Card Industry Data Security Standard, which specifies how credit card data should be handled.
Virtual mobile infrastructure can also ease the burden of implementing mobile apps, because developers need to build only one version of an app, instead of building a different version for each mobile operating system. All current VMI offerings use the Android platform, but their apps can run on any type of client devices in use.
Dig Deeper on Application modernization and mobile app delivery
Related Q&A from Robert Sheldon
When picking an application virtualization tool, IT pros must understand the app types they are dealing with, determine their security needs and more. Continue Reading
IT can use the servicing channels for Windows 10 to assign different deployment cadences to different devices and defer updates where necessary. Continue Reading
There are features in Windows Server 2016 that are specific to hyper-converged infrastructure, but many of the more basic functions also can be used ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.