Securing mobile devices is incredibly difficult. They often have privileged access to sensitive data that they connect to via unprotected network connections. Virtualization vendors are finding ways to include solutions to these problems in their products and they’re perfect for small businesses.
Mobile device security and virtualization
Huge virtualization partnership is now live
SMBs survive disasters with virtualization
Benefits of virtualizing Windows on your Mac
Azure is getting a new type of container
Citrix features coming to Google Cloud
Faster Amazon Web Services virtual desktops
Quick review: why you need virtualization
Setting the record straight on containers

Virtualization technology and container technology are confusing topics in their own right, and comparing and contrasting them is even harder. Before you can really get into the weeds about how containers differ from virtualization, it’s best to clear up some of the misleading information surrounding how the two technologies work.
NSA to secure phones with virtualization

Corporate smartphones and tablets store a significant amount of valuable data. Combine that with their mobile nature and they’re particularly vulnerable to being compromised or stolen. Everyone, including the National Security Agency (NSA), is looking for the next big thing in mobile security, and it might just be virtualization.