The Pros and Cons of the Google Nexus One As An Enterprise Phone
Written by Alex Williams

So, what are the pros and cons of using the Nexus One in the enterprise?
First off, anyone using the Nexus One in the enterprise will be using a rogue device. That's just the way it is. Perhaps that may change when the enterprise wakes up and realizes that people born after 1982 want to use any device to connect in any way they want. But that's the future, unfortunately. In the meantime, let's look at reality.
Compliance
The Nexus One was not built as a device that meets compliance requirements. As with almost any device, compliance is a reality in the enterprise world. We doubt, though, this will stop most users.You Can Make it Compliant
Dan Dearing of Trust Digital has a few points of advice for the IT manager with the foresight to deal proactively with the inevitability that the Nexus One will become his or her problem to solve:- Make sure that the device can be locked and swiped of its data if a user loses their Nexus One.
- Make sure Exchange ActiveSync is installed on the device so permissions for accessing data can be set up according to the policy set by the enterprise.
- Provide the ability to configure the device to remotely provision application clients and device interfaces used to reach the application source (e.g. Wi-Fi, VPN).
- Allow for PKI support that allows Android devices to receive and ingest digital certificates. The use of certificates helps automate connectivity to enterprise applications via Wi-Fi, VPN and web by making authentication transparent to users.
It's Not an iPhone
The iPhone has tight security features baked into it, and hardware encryption, too. Applications are tightly controlled with a centralized point for distributing applications. This may prove to be a temporary advantage for the iPhone over the Nexus One. According to Dearing:"The Nexus One is less secure than the iPhone 3GS. Nexus One is currently running on Android 2.1, the latest update, so is equivalent to iPhone 1.0. The iPhone 3GS provide the most comprehensive security controls with the addition of hardware-based encryption."
"The iPhone is much more mature in this area than the Nexus One. iPhone configuration profiles provides business IT with a way to configure the iPhone over the air and according to corporate policies. In addition, the iPhone 3GS provides device encryption to help meet corporate compliance requirements, ensuring the protection of sensitive corporate information."
0 comments:
Post a Comment