Monday, July 27, 2015

What is secure container?


As the BYOD trend has grown, there is an increasing concern about corporate data’s safety and users’ privacy. Containerization is one way to address this problem. (Rouse, 2014)


A secure container is an authenticated and encrypted area of employee’s device that separates corporate data from the owners’ personal data and app. (Rouse, 2014)
Posted on 3:25 PM | Categories:

Sunday, July 26, 2015

Advantages and Disadvantages of Containerization Technology


Advantages 
1. Security. Containerization technology address companies’ top main concern: security. By essentially separating personal ‘apps’ and data from business apps and data on employees’ portable devices, it obviates the possibility of sensitive data leaking from one to the other.
2. Resource consumption. Containerization brings in the use of single instance of operating system with no hardware virtualization. There is only a small application and operating environment in a container.
3. Cost saving. The cost of operating and start of virtual machine is much higher than container and it lowers the transport costs as well.

4. Efficiency: First, it supports resource sharing. In addition, it removes the hassle of code conflicts, application conflicts, multiple restricts and access and so on. Application with all of its dependencies -- code, libraries, configurations, system tool is into a wrapper file system. Because everything is there, it is easy to make changes and updates within a container without impacting adjacent containers. Finally, transitions between development, testing, and production environments are much smoother.

Disadvantages 
1.Theft and losses. Containers move through server memory and there are questions about whether communications might inadvertently be exposed to other containers. Therefore, containers may also bring security issues.

2.Complex installation. When the container applications are installed, changes have to be made on the phone and the terminal’s ROM. Moreover, the containers have to have MAM or mobile device management (MDM) systems to make this approach effective.

3.Reduce battery life. The containers use a lot of energy and processing power, thus reducing battery life and significantly impacting the end user’s experience.

4.Immature. This technology is not mature. The use and management of application containers is not well understood by the broader ops, InfoSec, dev and auditors community yet. This makes the process of marketing for the application becoming harder.    
Posted on 3:09 PM | Categories:

Examples of Companies and Vendors that use containers


                                


Companies:
Google

Android for Work is a containerization app that allows IT admins to create a separate workspace on Android smartphones. Users place their workplace apps into a secure container. It increases security by having IT set the rules and guidelines for the business apps.

Vendors:
Docker

Docker is an open source project. Their goal is to design container platforms for developers and system administration. They require container technology in the underlying OS platform.
Posted on 2:50 PM | Categories:

Additional Disadvantages to Consider


1. The isolation provided by containers is not as robust as the segregation established by hypervisors for virtual machines.
2. The ability of containers to detect “jailbreaking” of Apple iOS devices, which strips out Apple’s security model completely. If you have a rooted device, a container will not protect you. Then there are the problems that arise from enforcing policies on a device that is owned by the user, not the organization
3. Requiring users to switch in and out of an app container between work and personal use is cumbersome, frustrating and generally leads to user abandonment and work-arounds.
Posted on 12:41 PM | Categories:

Friday, July 24, 2015

Future??

Future Use
Destruction of VMs

Could the usage of containers lead to a destruction of Virtual Machines? Containerization technology can store application codes without needing an OS to run like the VMs. Because it is optimal to run containers on “bare metal” servers, it eliminates the need for VMs. This could lead to an end of virtual machines. However, containers are not a one fit for all. The convenience of containers depends on the type of situation.
Posted on 3:28 PM | Categories:

Docker in 5 minutes

Here is a short video that will give you a quick background into Docker. Docker is a key player in the containerization world. Enjoy!

Posted on 3:16 PM | Categories:

Wednesday, July 15, 2015

BYOD & Containers






Containerization technology promises to give IT professionals the control they need over the business data on employee devices to meet corporate security standards and external compliance requirements, while still allowing users the ability to use the device of their choice and keep their personal data secure from prying corporate eyes.

http://www.itbusiness.ca/sponsored/one-device-two-worlds-of-data
Posted on 4:55 PM | Categories: