HYPORI: Crypo and The Imitation Game

Posted on Nov 4, 2015
HYPORI: Crypo and The Imitation Game

Cryptography is an old game of secrecy with a storied history that millennia later, secures information in the digital age. Encryption, or the conversion of […]

HYPORI: Derived Credentials and The Lord of the Rings

Posted on Sep 29, 2015
HYPORI: Derived Credentials and The Lord of the Rings

If you are not a fan of The Lord of the Rings, the executive summary is that you can simplify life and improve security for […]

HYPORI: Attestation and Inception – Deciphering Secure Reality from a Dream

Posted on Sep 8, 2015
HYPORI: Attestation and Inception – Deciphering Secure Reality from a Dream

This is the first in a a series of blogs Hypori CEO Justin Marston will pen on some of the terms he often addresses. To […]

HYPORI: Digging into virtual mobile infrastructure – What are the right use cases for VMI?

Posted on Aug 14, 2015
HYPORI: Digging into virtual mobile infrastructure – What are the right use cases for VMI?

When people learn about VMI for the first time, once they understand what it actually is there reaction is usually something along the lines of. […]

HYPORI: Why the U.S. military uses virtual mobile infrastructure

Posted on Aug 7, 2015
HYPORI: Why the U.S. military uses virtual mobile infrastructure

VMI is gaining momentum in the corporate world, but the Department of Defense has long seen the security value of delivering virtual mobile applications.

HYPORI: ‘Delete’ Seems to be the Hardest Word

Posted on Jul 17, 2015
HYPORI:  ‘Delete’ Seems to be the Hardest Word

Roll back the clock to 2009. With great fanfare, General Dynamics and L-3 announced the now infamous (in government circles) Secure Mobile Environment Portable Electronic […]

HYPORI: Top Five Reasons to Deploy a Virtual Mobile Infrastructure

Posted on Jun 26, 2015
HYPORI: Top Five Reasons to Deploy a Virtual Mobile Infrastructure

Despite the kicking and screaming from IT departments, organizations have largely resigned themselves to the fact that BYOD is here to stay. Whether the flavor […]

HYPORI: VMI – Secure the data and apps, in lieu of the device

Posted on Jun 18, 2015
HYPORI: VMI – Secure the data and apps, in lieu of the device

VMI offers an effective, efficient way to provide access to sensitive mobile apps and data without compromising security or user experience

HYPORI: Top Five Reasons to Deploy a Virtual Mobile Infrastructure (VMI)

Posted on Jun 16, 2015
HYPORI: Top Five Reasons to Deploy a Virtual Mobile Infrastructure (VMI)

Despite the kicking and screaming from IT departments, organizations have largely resigned themselves to the fact that BYOD is here to stay. Whether the flavor […]

HYPORI: The insider threat in employees’ pockets

Posted on May 22, 2015
HYPORI: The insider threat in employees’ pockets

Although organizations like the FBI might be restricting their employees to agency-issued mobile devices, a growing number are embracing at least some degree of a […]