The Nexus One is another smart phone that we will inevitably see inside the walls of the enterprise. Smart phones seem to have a way of being used for all kinds of work activities.
So, what are the pros and cons of using the Nexus One in the enterprise?
First off, anyone using the Nexus One in the enterprise will be using a rogue device. That’s just the way it is. Perhaps that may change when the enterprise wakes up and realizes that people born after 1982 want to use any device to connect in any way they want. But that’s the future, unfortunately. In the meantime, let’s look at reality.
Compliance
The Nexus One was not built as a device that meets compliance requirements. As with almost any device, compliance is a reality in the enterprise world. We doubt, though, this will stop most users.
You Can Make it Compliant
Dan Dearing of Trust Digital has a few points of advice for the IT manager with the foresight to deal proactively with the inevitability that the Nexus One will become his or her problem to solve:
- Make sure that the device can be locked and swiped of its data if a user loses their Nexus One.
- Make sure Exchange ActiveSync is installed on the device so permissions for accessing data can be set up according to the policy set by the enterprise.
- Provide the ability to configure the device to remotely provision application clients and device interfaces used to reach the application source (e.g. Wi-Fi, VPN).
- Allow for PKI support that allows Android devices to receive and ingest digital certificates. The use of certificates helps automate connectivity to enterprise applications via Wi-Fi, VPN and web by making authentication transparent to users.
It’s Not an iPhone
The iPhone has tight security features baked into it, and hardware encryption, too. Applications are tightly controlled with a centralized point for distributing applications. This may prove to be a temporary advantage for the iPhone over the Nexus One.
According to Dearing:
“The Nexus One is less secure than the iPhone 3GS. Nexus One is currently running on Android 2.1, the latest update, so is equivalent to iPhone 1.0. The iPhone 3GS provide the most comprehensive security controls with the addition of hardware-based encryption.”
“The iPhone is much more mature in this area than the Nexus One. iPhone configuration profiles provides business IT with a way to configure the iPhone over the air and according to corporate policies. In addition, the iPhone 3GS provides device encryption to help meet corporate compliance requirements, ensuring the protection of sensitive corporate information.”
Hooray – It’s Not an iPhone
The Nexus One is a cloud-connected device, making it a true web-based, data-driven device. This to us is a huge advantage. Apple is playing catch up in developing a cloud infrastructure. Google may lose a bit on security but the ability to use the computing power of the cloud may be what shoots Google way ahead of Apple. Tim O’Reilly goes as far to say that at some point, Apple may never catch up.
A Strong Start
The Nexus One represents a very strong start for Google. It’s not designed as an enterprise phone but generally smart phones are meant to be used universally.
We expect that as more smart phones enter the market, an ecosystem of middleware providers will emerge. These services will provide filters, treating the device as a computer, much like desktops and laptops.