Feeds

Software containers for BYOD/mobile device management: Big Tin Can

This baby will never escape from the bit of string back to corporate

  • alert
  • submit to reddit

HP ProLiant Gen8: Integrated lifecycle automation

An environment which runs on a number of mobile platforms seeks to solve lots of the BYOD issues faced by corporates. It creates a balance between locking down a device so completely that people won't or can't use it and leaving the door open to miscreants.

Such environments these days are often known as "containers" (or "containerz" in one case). One such offering which we here on the Reg BYOD/Mobile Device Management desk have been having a squint at lately is known instead as Big Tin Can.

Big Tin Can's David Keane describes his company's software as "secure role based delivery of information and content to mobile devices", which is corporate speak for sending people the info they need to do their work. Big Tin Can runs as an app - it's not usually web based - so that it can be used offline. You don't add general third-party apps; the vast majority of work can be done - word processing, spreadsheet and the like - within the Big Tin Can. There are plug-ins for a number of services including outlook and sharepoint, with integration for SAP and Salesforce.

The idea is that either the company can issue the phone or tablet to the workforce or individual workers can bring their own device and have Big Tin Can installed. Within the Can the company can configure a suite of applications and build content that the workers need. It's common practice to take photos of whiteboards in meetings, for instance, but too many personal devices are set up to automatically post pictures. You don't really want the company's next three year strategy posted straight to Flickr and Twitter.

Corporates used to ban cameraphones but now that's pretty much become impossible to enforce. Big Tin Can ensures that pictures taken within the app are not saved to the camera roll or usual picture storage but instead are held within the secure environment.

Big Tin Can runs on iOS, Android, Blackberry 10, Windows 8 and Windows 8 Pro. The company's holding fire on Windows Phone and says a Windows RT version is unlikely. There is a web app, but that's really not the way Big Tin Can wants the software used.

Content within Big Tin Can is encrypted, can be remotely wiped and works with device side containers. There is location protection so that information cannot be taken into or out of geofenced places. And of course there is remote password change and content wipe for when devices or people are no longer attached to the company. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.