The Nexus One and the Droid testify that theAndroid invasion is fully afoot , and the next front line will be the enterprise . Consumer gadget often storm their way of life into the incorporated civilization , and what is the item of having a smartphone — or a“superphone ” like the Nexus One — if it ca n’t keep you connected with oeuvre ?

For smaller companies , there are no real basketball to alternate through . You buy an Android smartphone , you synchronise it with your PC , you set up your east - mail accounts to update on the gimmick , and voila ! You ’re in business .

For added business functionality , you’re able to throw inDocuments to Go or RoadSyncto enable theAndroid smartphoneto work with Microsoft Office documents and sync with Exchange Server electronic messaging . If you desire some additional certificate , you caninstall Mobile Defenseto get across your smartphone through its GPS , backup your data point , and remotely lock the gimmick or wipe the data in the upshot the phone is lose or stolen .

From the user ’s position , it seems all of the tools are already there . However , larger company have policies , and standards , and security requirements , and compliance mandate . exploiter ca n’t be allowed to justconnect to the mesh with any devicethey choose , no matter how crafty and popular it might be .

One of the primary reasons that the BlackBerry has succeeded in build itself as an indispensable patronage creature in so many enterprisingness is that RIM developed the BlackBerry Enterprise Server ( BES ) to enable corporate IT department tomanage and sustain the devices .

The lack of any such mastery is also one of the principal reasons that the iPhone isstruggling for corporate acceptation — along with the prerequisite that iTunes be instal on every personal computer for users to sync the machine . contribute Exchange electronic messaging helped , but it does n’t address the myriad of issue corporate IT administrator must confront in trying to maintain the mesh and communications infrastructures .

instrument survive , though , to bridge over that gap and cater a political program alike to BES for administering other smartphones in the endeavour . The capably - namedGood for Enterprise , is such a instrument , and now there is a Good for endeavor node for Android smartphones .

Good for Enterprise has been around for a while . The Good for Enterprise waiter is set up in the corporate connection , similar to BES , and each twist require a client approach permit ( CAL).Client program exist to supportPalm , Symbian , Windows Mobile , and iPhone – and now Android .

Good for endeavour allow IT decision maker with the tool they need to securely integrate the various smartphone platforms into the enterprise – like end - to - end encryption of communications and datum , and the power to remotely wipe off data and manage password insurance policy .

IT administrators can deploy and advance the Good for Enterprise customer , as well as keep up policy by user , grouping , smartphone platform , and more . The Good for Enterprise management splasher allow IT administrator track elaborate information such as the type of smartphones connected to the web , the wireless carrier each uses , the current microcode version , and usage stats .

For exploiter , the Good for go-ahead node provides a unmarried app for tocopherol - mail , contact lens , and calendar . Updates for due east - chain mail , contacts , and calendar are pushed to the smartphone . notification of Modern message and meeting reminder are pushed to the twist as well . Functionality varies some by smartphone platform .

Devices like the Nexus One and the Droid will continue to battle the iPhone and other devices for smartphone dominance among consumer . enterprisingness have to accept that they will be assimilated and rule ways to embrace the smartphone revolution without compromise security measures and compliance .

upright for Enterprise represent an intelligent approach because its not platform - specific . With a variety show of client coating spanning all of the popular smartphone operating system of rules , enterprises can allow employees to use the machine of their choosing and still keep up control over the web and bodied data .

[ Tony Bradley tweets as@PCSecurityNews , and can be contact at hisFacebook page . ]