"Today, we are struggling to secure mobile payments yet trying to convert a wallet full of credit cards into an app that lives on our phone. If we hope to store more and more sensitive information on mobile devices, the current levels of risk are unacceptable. If credit cards are falling prey to hackers, how can we consider adding driver's licenses, passports, health insurance cards and employee IDs to mobile wallets? Can we really trust a phone to store our personal health records and biometric data?", CardNotPresent
Containers Spell Security Threats For Mobile
"Containerized apps are vulnerable because they rely on the same operating system (OS) services used by apps outside the container. Thus, a malicious app located outside the container can intercept data passed back and forth between the containerized apps and the smartphone's screen and keyboard", Network Computing
Your Mobile Wallet Isn’t Safe
"The higher the volume of mobile payments, the more hackers stand to gain from breaches. Unless the mobile industry accepts that business as usual is not an option, we’re effectively waiting for a massive breach to derail the mobile payments train and scare consumers away from financial innovation. To get back on offense and start addressing the challenge at hand, the mobile industry needs to embrace mobile virtualization", IT Briefcase
The Mobile Buzz: Divide and protect
"What we really care about when it comes to mobility and mobile virtualization is the ability to completely isolate one operating system from the other", The Green Sheet
Is containerization the real answer for securing data on mobile devices?
"BYOD is changing the way organizations will be managing corporate data security. In this article, we discuss how exactly mobile virtualization will be impacting data privacy and security on mobile devices", IT WORLD CANADA
A virtual Iron Dome: Israeli cybertech wins fans at home and abroad
"Fortunately, there's a variety of approaches to address the problem, including one offered by the Israeli startup Cellrox, which creates two totally separate work spaces on smartphones — a personal one and a work one.", Ha'aretz
Movius myIDs Secure integrated with Cellrox Hypervisor
Dror demonstrate our powerful solution with Movius.
Cellrox demos their Android Thinvisor mobile virtualization platorm
Watch Dror demonstrating our Thinvisor Mobile Virtualization Platform in MWC 2015, Brian Madden
Cellrox and their mobile virtualisation solution
"Cellrox believe that it is better than the other solutions out there, because unlike some of the other solutions, its virtualisation software was designed and written first and foremost for mobile devices, rather than being based on and derived from server virtualisation solutions", This Mobile Life
Is it Time to Virtualize Your Smartphone?
"No one wants to carry multiple smartphones, but we still have businesses and lifestyles that call for it. To preserve our privacy, to make mobile devices reflect our lifestyles and to protect what matters, we have to embrace mobile virtualization", Mobile Enterprise
Is now the time to deploy embedded hypervisors for BYOD security?
"Companies such as Bromium and Cellrox are offering virtual machine technology for these devices today that is designed to isolate specific applications and their data as well as to control access.", ZDNet
Mobile Virtualization: The Future Of Security
"Smartphones are a prime target for sensitive personal and corporate data, but mobile virtualization can isolate data and protect it from threats.", Network Computing