{"id":190616,"date":"2017-05-02T22:42:58","date_gmt":"2017-05-03T02:42:58","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-suggests-using-virtualization-to-secure-smartphones-pcworld-pcworld\/"},"modified":"2017-05-02T22:42:58","modified_gmt":"2017-05-03T02:42:58","slug":"nsa-suggests-using-virtualization-to-secure-smartphones-pcworld-pcworld","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-suggests-using-virtualization-to-secure-smartphones-pcworld-pcworld\/","title":{"rendered":"NSA suggests using virtualization to secure smartphones | PCWorld &#8211; PCWorld"},"content":{"rendered":"<p><p>Thank you                <\/p>\n<p>          Your message has been sent.        <\/p>\n<p>          There was an error emailing this page.        <\/p>\n<p>      The U.S. National Security Agency is now suggesting      government departments and businesses buy smartphones secured      using virtualization, a technology it currently requires only      on tablets and laptops    <\/p>\n<p>      The change comes about with the arrival of the first      virtualization-based smartphone security system on the U.S.      Commercial Solutions for Classified list.    <\/p>\n<p>      CSFC is a program developed by the NSA to help U.S.      government agencies and the businesses that serve them to      quickly build layered secure systems from approved      components.    <\/p>\n<p>      AnHTC      A9 smartphone security-hardened by Cog Systemsusing      its D4 virtualization platform is now on that list, alongside      devices without virtualization from Samsung Electronics, LG      Electronics, and BlackBerry.    <\/p>\n<p>      In the modified A9, communications functions are secured by      running them in separate virtual machines on the D4      virtualization platform.    <\/p>\n<p>      It's the first smartphone on the CSFC list to use      virtualization, which the NSA has only required on more      powerful devices such as tablets and laptops until now.    <\/p>\n<p>      \"If virtualization technology was commonly available in the      smartphone, we could leverage it for some solutions. To date,      the devices that have been considered did not offer that      technology,\" the       NSA's technical guidance reads.    <\/p>\n<p>      Cog Systems' position on the list isn't definitive yet: It's      still seeking certification for the D4\/A9 combination against      the National Information Assurance Partnership's mobile      platform and IPSec VPN Client protection profiles. Vendors      typically have six months to obtain the certification in      order to remain on the list. For now, D4's validation is      ongoing at Gossamer Security Solutions' Common Criteria      Testing Laboratory.    <\/p>\n<p>      Vendors don't seek certification lightly, according to Carl      Nerup, chief marketing officer at Cog Systems. \"It's a very      expensive process,\" he said, between US$500,000 and $700,000      for each new model.    <\/p>\n<p>      Somehow, though, Cog Systems is eating the additional cost of      certification: The price for its security-hardened A9 is the      same as HTC's list price for an unmodified phone, said Nerup.      \"We have multiple groups within the U.S. Department of      Defense that have procured the device,\" he added.    <\/p>\n<p>      A commercial off-the-shelf (COTS) smartphone like the      modified A9 isn't only of interest to government customers,      though, Cog Systems CEO Dan Potts pointed out. \"In the oil      and gas industry, they want to buy COTS. They want it to be      at a competitive price, but with a greater concern for      security.\"    <\/p>\n<p>      Once certification for the modified A9 is in the bag, Potts      is looking forward to seeking certification for D4      virtualization on other smartphones. The first time around      takes time because there is a lot of preparatory work to do,      but much of that work will also apply to other smartphones.      Potts expects certification of D4 on other hardware to go      more quickly.    <\/p>\n<p>      Eric Klein, director for mobile software and enterprise      mobility at analyst firm VDC Research, has had his eye on Cog      Systems since meeting the company at Mobile World Congress.    <\/p>\n<p>      He sees the broadest opportunity for Cog Systems in the      enterprise market -- and expects that its approach to      endpoint security could even take some business away from      enterprise mobility management vendors.    <\/p>\n<p>        Peter Sayer covers European public policy, artificial        intelligence, the blockchain, and other technology breaking        news for the IDG News Service.      <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/3193421\/mobile\/nsa-suggests-using-virtualization-to-secure-smartphones.html\" title=\"NSA suggests using virtualization to secure smartphones | PCWorld - PCWorld\">NSA suggests using virtualization to secure smartphones | PCWorld - PCWorld<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Thank you Your message has been sent.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-suggests-using-virtualization-to-secure-smartphones-pcworld-pcworld\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-190616","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/190616"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=190616"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/190616\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=190616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=190616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=190616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}