Google Buys Divide: BYOD Play - InformationWeek
IoT
IoT
Mobile // Mobile Business
News
5/20/2014
09:06 AM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
Threat Intelligence Overload?
Aug 23, 2017
A wide range of threat intelligence feeds and services have cropped up keep IT organizations up to ...Read More>>

Google Buys Divide: BYOD Play

To boost Android's business appeal, Google is investing in mobile device management.

Google I/O 2014: 8 Things To Watch
Google I/O 2014: 8 Things To Watch
(Click image for larger view and slideshow.)

Moving to strengthen Android's appeal to enterprise customers, Google on Monday acquired Divide, a mobile device management platform, for an undisclosed sum.

Divide announced the deal on its blog, noting that the company will become part of Google's Android team and that its software will continue to work for existing customers. Divide also supports Apple iOS devices.

Google declined to comment beyond confirming the accuracy of Divide's statement.

The deal represents Google's 14th known acquisition this year. And a 15th acquisition, Twitch, is reportedly pending. If Google continues to acquire companies at this rate, it will surpass its 2010 high water mark, when it made 26 acquisitions.

Divide, as its name suggests, offers software that divides mobile devices into separate partitions. This is a popular strategy for placing business software on personal devices under corporate management without limiting personal apps. Divide also provides a cloud-based management console to handle administrative tasks like pushing group policies, restricting apps, setting screenlock requirements, and erasing data.

[Want to learn more about Google's interest in Twitch? Read YouTube Courts Twitch.]

Security remains a pressing concern among the growing number of companies that rely on mobile devices, which may be lost, stolen, or comprised. To further complicate matters, these devices may be employee-owned, an arrangement commonly know as "bring-your-own device" or BYOD.

While Apple's attentive oversight of its App Store has helped limit iOS malware and led to extensive iOS adoption among enterprises, Google's more relaxed policy has led to greater Android market share and has given third-party mobile security companies an opportunity to sell more extensive defenses.

To turn the openness of Android (and iOS) into something more suitable for security-conscious organizations, mobile security companies have rushed to market under the banner of mobile device management (MDM), enterprise mobility management (EMM), mobile application management (MAM), and mobile content management (MCM).

While there are arguable distinctions in these various acronyms, they're all basically ways to make mobile devices more secure. Good Technology and MobileIron are two of the independent companies still standing. Other mobile security companies such Airwatch and Fiberlink have been acquired by the likes of VMware and IBM. Device maker Samsung is addressing mobile security directly through its KNOX software.

Forrester analyst Ted Schadler, co-author of the forthcoming book The Mobile Mind Shift, said in an email that Apple, Google, and Microsoft need to do what BlackBerry already does by supporting OS features and services that partition devices.

Google, Schadler said, appears to be heading in that direction with the purchase of Divide.

"The key to BYOD lies in letting employees run personal apps and business apps on the same smartphone or tablet while keeping a hard line between personal data and business data," said Schadler. "The challenge with overlay solutions like MDM is that employees don't like having their personal data and apps exposed to business prying eyes."

What do Uber, Bank of America, and Walgreens have to do with your mobile app strategy? Find out in the new Maximizing Mobility issue of InformationWeek Tech Digest.

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Stratustician
50%
50%
Stratustician,
User Rank: Ninja
5/28/2014 | 12:14:31 PM
A strong step towards BYOD?
This will definitely alleviate many of the security fears that BYOD has brought. The ability to support dual desktops in the sense that corporate applications and data can be segregated has long been one of the biggest hurdles, especially when it comes to Android which has mutiple devices from multiple vendors.  For many organizations, if this is well executed, this might just be the differentiator that allows for corporate BYOD policies for Android to be fully adopted.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll