Feeds

Google woos enterprises to Android with new security offerings

Remote PIN reset comes to users

Choosing a cloud hosting partner with confidence

Google is once again trying to coax large organizations into using its Android operating system, this time by giving the end user the ability to remotely secure lost or stolen devices and admins encrypt data stored on tablets.

In a blog post published Thursday, Product Manager for Google Enterprise Mobility Mayur Kamat said the new features would be available to all Android users who subscribe to Google Apps for Business and Google Apps for Education. The services are designed to help the mobile operating system to better get a foot in the door of businesses, government, and educational settings, where security is key.

Devices that use Android version 2.2 or higher can be remotely accessed by the end user using a new edition of the Google Apps Device Policy app. From there, end users can geographically locate missing devices and reset the device's PIN or password if necessary.

Kamat also announced that admins will be to encrypt data on Android 3.0 tablets using an option on the Google Apps control panel.

The additions follow October's announcement of administrative controls that allowed remote wiping of missing devices.

More than 300,000 Android devices are being activated each day, Kamat said, up from 200,000 devices in October. ®

This article was updated to correct information about geolocating phones and resetting PINs. The ability rests with the end user.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority
Let’s Encrypt to give HTTPS-everywhere a boost in 2015
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.