Security is the main use case for virtual mobile infrastructure.
With virtual mobile infrastructure (VMI), a mobile application and its data remain safely protected in a data center. A special client app renders the app on an endpoint device, but the app does not run locally. So if a device is lost or stolen, or an individual leaves an organization, all an administrator needs to do is revoke access to the virtualized app. Even if someone manages to get unauthorized access, he cannot copy and paste sensitive data out of the app or even take screenshots.
The biggest roadblock to VMI adoption is that it requires the client to be constantly tethered to network access. When connectivity can be guaranteed, however, any organization in which security is a top priority can potentially benefit from VMI.
Some organizations might also turn to virtual mobile infrastructure to satisfy compliance requirements, which often go hand-in-hand with security. For example, the healthcare industry can use VMI to comply with Health Insurance Portability and Accountability Act regulations, and retailers might turn to VMI for point-of-sale operations to comply with the Payment Card Industry Data Security Standard, which specifies how credit card data should be handled.
Virtual mobile infrastructure can also ease the burden of implementing mobile apps, because developers need to build only one version of an app, instead of building a different version for each mobile operating system. All current VMI offerings use the Android platform, but their apps can run on any type of client devices in use.
Dig Deeper on Application modernization and mobile app delivery
The complete guide to mobile application management: Understanding different MAM techniques
VMI security benefits could drive adoption, but roadblocks remain
What's going on in Virtual Mobile Infrastructure? An update on Hypori, Avast, Nubo, and more
VMI won’t find a long-term role in mobile app deployment
Related Q&A from Robert Sheldon
It's important to consider current and future business needs when choosing a server to ensure you'll have adequate CPU, memory, storage and network ... Continue Reading
The average organization may not require military-grade security for its endpoint management platform, but IT pros should take note of which products... Continue Reading
Here are smartphone battery tips that admins should keep in mind. Find out all the factors that could affect the battery life and how IT can mitigate... Continue Reading