Article ( Tapping Into The Growth Of India’s Emerging Mobile Markets

Originally posted by Krish Kupathil on –

Editor’s note: Krish Kupathil is the CEO of Mobiliya.

It took only seconds for Xiaomi phones to sell out on the e-commerce platform Flipkart in India. This feat is staggering considering the Indian e-commerce industry is a relatively new concept for many consumers. In fact, Indian smart phone sales doubled from 156 million sold in 2013 to 364 million units sold thus far in 2014. With a product in such high demand, mobilemanufacturers that want to succeed in India must put three things first: customizable products, regional-market sensitivity and trend incorporation.

Google’s product strategy team, which includes many Indian members, understood the necessities and desires of the Indian market. Google designed the Android One specifically to meet the needs of this Indian market segment — often referred to as “the next billion” — which is still transitioning to smartphone technology.

Android One came equipped with dual-SIM card capability, multimedia features such as a camera with video functions, Google Maps services, a wide ecosystem of apps and a free data pass from leading operators. While this may seem like the perfect answer to the Indian market’s needs, Android One devices failed to meet projected sales. At the time of its launch, there were three devices already on the market with identical hardware configurations as Android One, all priced about $1.62 apart. What could Google and Android have done to stand out from their competition?

First, Google and Android could have been more sensitive to the market’s needs. India is a country of many geographies and diverse consumers. When selling to the Indian market, manufacturers must look at each geography individually, rather than attempt to cater to the country as a singular customer.

For example, language is a selling point where value-differentiated products sell most easily. As there are nine major regional languages and many more open markets within India alone, each language pack can be catered to in the same way that manufacturers support a global language list. So, in a country with more than 300 brands selling to approximately 364 million smartphone users, mobile developers need to break the norm.

Google and Android should have also offered customized features. Successful brands hoping to drive smartphone adoption in India throughout 2015 will ensure that their smartphones are tailored to meet each individual’s requirements. To achieve this, manufacturers need a strong network of services, apps and platforms that allow consumers to fully and uniquely customize their own devices.

Mobile users become more tech-savvy and conscious of desired requirements and expectations of their devices each day — as users everywhere buy their phones for a specific purpose. For example, a consumer purchases a smartphone to stay in touch with his wife, to watch videos because he commutes often on the metro and to take photographs during his overseas travels. This phone and its software should be personalized according to his individual behavior in order to optimize its performance and his user experience.

Finally, Google and Android could have better prepared for growing trends. Operating system security, customized services, multimedia capabilities and wearable technology are significantly affecting the success of mobile device sales throughout India, becoming “must have” features for any manufacturer looking to compete effectively in the market.

Indian consumers have started shopping for and purchasing products on their phones — an online behavior that’s only become prevalent in the last year. As mobile devices are used more and more throughout enterprise operations, a secure operating system is imperative. The mobile devices of today, for both personal and business users, must include a security portfolio to take on the Indian and similar emerging markets.

Location-based apps are poised to change the service industry in India, as Indian consumers are not exclusively buying books and clothes online anymore — the emerging market e-consumer is now purchasing myriad services online, as well. Location-based apps and services will change the way Indians buy vegetables, receive food deliveries, take cabs and rent cars. Personalizing services based upon deep integration of users’ smartphones — an ability only device manufacturers have — will redefine what phones are brought into the market, as consumers will begin to depend more on these customized services than the actual devices.

Indian smartphone users will soon have access to long-term evolution (LTE), a standard for wireless communication of high-speed data. With Reliance Jio and Airtel, two leading operators injecting LTE throughout India, consumers can expect lower prices for large data packs, resulting in higher demand for smartphones with multimedia features and apps running on LTE services. Devices catering to this need will have to be on the product line-ups of any original design manufacturers hoping to serve and thrive within emerging markets.

The wearable technology trend is spreading rapidly among Indian consumers, as thesedevices, such as glasses and watches, will soon be more affordable and accessible for the growing number of smartphone users. According to consulting firm IDTechEx, global spending on wearable technology may rise to $70 billion in 2024 from just $14 billion in 2014. To cater to this growing market, device manufacturers will have to ensure that the platform and app ecosystem is ready to support consumer needs.

To be successful in emerging mobile markets like India, device manufacturers must connect the “next billion” with next-generation technology. Coupled with preparation for new trends, manufacturers must have considerable technical expertise and a strategy that leverages customizable tools and unique features to meet each market’s specific needs. The potential for breakthrough growth is huge and achievable for companies willing to invest the time, money and resources to innovate and provide distinctive offerings to serve segmented markets.



Article ( Vertical focused solutions – Helping decipher the paradox for mobile manufacturers

Originally posted on –
| March 16, 2015 at 11:22 am

Growing penetration of smart phones into the consumer space has led to the demand for feature rich, consumer like business apps. Parallely, the mobile devices ecosystem, which started with a consumer focused mind-set, is now staring at a saturation point and looking for disruptive methods of capturing and converting a greater market share.

Interestingly, the future of these two segments demands a phase of convergent evolution for both wherein ODM’s design and develop vertical focused solutions for the enterprise audience lead to adoption of mobility in the enterprise and create a demand for devices . This helps ODMs capture a majority slice of the lucrative EMM (Enterprise Mobility Management) market that comprises services like MDM, MAM, Mobile Security and Mobile Content Management. Now this is where we talk of disruption wherein ODMs should focus on providing integrated software and hardware platform on top of which multiple vertical based products can be built and delivered.

Image Credit - Shutterstock

The challenge

Though the realization of the above facts isn’t new, successful implementation of the enterprise device business has been a bottleneck. Apple and Blackberry have been pioneers in this initiative with their iOS Enterprise and the Blackberry Enterprise services. Samsung and LG followed suit with their Knox and LG Gate products. However, a basic challenge for today’s CIO is how they define the usage policy of these various standalone products across the various verticals of their business and how they integrate these disparate offerings into a unified mobility platform across the enterprise.

From an ODM’s perspective, there is this dichotomy of catering to the requirements of two different segments with different feature set requirements. While the consumer segment has been aptly catered to, enterprises are more demanding in terms of hardware and software support. The Achilles heel of today’s ODM is how to deliver on the enterprise expectations without compromising on their consumer focused feature set. This has resulted in ODMs extending their product line and making extensive investments to create enterprise devices but even that approach has failed to deliver. The prime reason behind this is the inflexibility of the ODMs on two fronts: enterprise features and price.


Traditionally, it is a tussle that involves putting together a device which is a perfect fit for organizational requirements but doesn’t compromise on the consumer focused model of the device manufacturer. So where is the opportunity?

The figure above shows that there is a huge untapped opportunity at a lower price point wherein ODMs have not yet made an impact. Neither the business model nor the functional package has been defined for this opportunity. This gap is further amplified by the fact that though major players are active in the EMM space, there is not a single comprehensive solution provider which gives enterprises the flexibility to choose their own device, their own apps and the way they would like to manage those for their individual verticals.

Looking beyond the enterprise horizon

2014 has been the year of custom ROM. It started with CyanogenMod, which disrupted the mobile device market with its OnePlus tie up and brought much needed flexibility at a price point most of us could afford. Same has been the case with OxygenOS, the newly announced OS that will compete with other custom ROMs. But yet again, ODMs are overlooking a very big enterprise segment.

Ideally, a low cost device with a custom ROM which is open enough to integrate seamlessly with enterprise apps and supports enterprise pre-requisites such as VPN, SSO and ADFS would be a perfect fit. Such a solution would also support mobile device management, app wrapping, secure storage, file sharing etc. Existing ODMs in India can utilize this need gap by being the first movers in this space. What is delivered as part of their package is an enterprise ready device coupled with a custom ROM that has SDK to integrate with LOB enterprise apps and/ or gives the flexibility to ODMs to custom build packages targeted at various verticals. Point in case example being a single device that can securely connect to backend ERP systems in the procurement department of a FMCG company. The same device can be made available to the field force of the FMCG company with integrated CRM access wherein customer data gets updated into the backend remotely.

Not only hardware and software, the future of device sales would also be greatly influenced by the business model. In the future, we are looking at an opex based model wherein devices are procured by the enterprise on contractual basis for a specific period during which the entire after-sales service and maintenance is taken care of by the ODM. It is a multipronged approach wherein the ODMs ensure a long term commitment as well as maximize ROI for the enterprise.

Going forward, the answer for the ODMs lies in creating an ecosystem of managed mobility services for the enterprise on the same lines as one created for the customer through the app store and OTT players. It is only then that we would see penetration in the enterprise space.

Ankush Tiwari

About the Author:

Ankush Tiwari is MD & SVP – Engineering at Mobiliya-India. He has more than a decade of experience in building software for mobility. He was the Lead Architect for Azingo (acquired by Motorola), where he led the Web 2.0 application framework and middleware architecture for the Open Source Linux Platform and the open source browser for embedded systems.

Article ( Smart Cities: The Security Challenge

What Are the Cybersecurity Threats and Opportunities?

Originally published on –
By Geetha Nandikotkur, March 3, 2015.
Smart City
India Prime Minister Narendra Modi envisions 100 smart cities by 2022.

This goal, and the finance ministry’s decision to allocate Rs 7,060 crore toward meeting this objective, has sparked discussion not just about how to build smart cities, but also how to secure them.

Experts say security leaders must evolve a cybersecurity model that future-proofs their networks, not just reacts to risk as an afterthought.

And it’s going to take a significant private/public partnership to succeed, government leaders say.

“We are consulting with state governments, local bodies and those keen on developing smart cities,” says Urban Development Minister Venkaiah Naidu. “We’ve finalised the PPP model.”

The Smart City Model

By definition, smart cities are an urban transformation using the latest information and communications technology to make these communities more efficient with world-class infrastructure, 24-hour power supply, complete Wi-Fi connectivity, green technology as well as the latest water conservation and waste management techniques.

Naidu says 20 cities will be listed for modernisation this year, 40 in 2016 and 40 more by 2017. Starting with Delhi, then Varanasi, India will also develop the proposed new capital for Andhra (as a pilot).

The government will emulate the smart city models of Japan, Spain and Australia, and collaborate with them.

Opportunities for Security Players

Private sector security vendors foresee a huge growth opportunity as the government will collaborate with them via the PPP model.

Already, Cisco plans to release the “Cisco Smart City” blueprint for the future of smart and connected communities using the Internet of Things for connected education, healthcare, smart buildings, transport and smart parking.

Pravin Srinivasan, head of security, India and SAARC, at Cisco Systems, says: “It’s an opportunity to combine information from video surveillance cameras, social media and other sensors, and security frameworks, which enable a higher rate of incident detection, automated incident detection and quicker response for richer safety.”

Mumbai-based Sunder Krishnan, chief information security officer at Reliance Capital, and a member of ISACA’s task force, sees opportunity in evolving a Wi-Fi security/mobile data management strategy, developing a tactical network security architecture plan with IoT, besides log monitoring tools.

FireEye, HP, Cisco, IBM and others will offer support through the PPP model. Private players will design the ICT master plan with Japan, Spain and Australia.

As an immediate step, the ministry of urban development has urged Nasscom (National Association of Software and Services Companies) to develop the reference model on the architecture framework for technology, GIS and Safe City for the 100 smart cities initiative.

What About Security?

And then there are the security concerns.

Security practitioners agree with Symantec’s executive report, which says smart cities can experience different types of cyber-attacks, including phishing, malicious code, website intrusions and DDoS. Administrations and those in charge of designing, building, operating, maintaining and using the smart city and its services must therefore include security from the conceptual stage.

Says Krishnan: “For security leaders, this throws up an interesting challenge, as it requires state-of-the-art deployment of the latest technology, dynamic practices and well-trained staff.”

“Practitioners should re-imagine their approach, creating an adaptive architecture protecting against advanced attacks,” says Ramsunder Papineni, regional director-India and SAARC, at FireEye. “CISOs must focus on early detection, prevention, analysis and appropriate response.”

Pune-based Ankush Tiwari, senior vice president of engineering and managing director, India – Mobiliya, says sharing data in the cloud may raise concerns over the illegitimate use of data for a purpose other than that it’s actually meant for. Controls will be required to identify what data can be cross-processed. “CISOs must ensure data is securely classified, stored and accessed to flag potential risks.”

As the level of granularity increases to the level of data from specific buildings, dwellings and people, the privacy risks and the need for trust and security increase.

Security Challenges

Many experts agree that challenges arise from the higher connectivity, opening up new vulnerabilities. The top challenge is ensuring the fundamental cybersecurity of systems.

Network with enterprises connected to 1,000 devices, 100 applications talking to millions of others worldwide, it’s open to threats from multiple types of attacks,” Srinivasan says.

Mumbai-based Durga Prasad Dube, chief information security officer at Reliance Industries, says the constraint is that security is considered too late in project development. The challenge, Dube observes, is at the gateway level, risk-prone due to ineffective authentication methods.

Papineni expects threats that are targeted: “It’s likely they’ve never been seen before, custom-designed for information theft, sabotage or espionage.”

Smart Security Model

Although India’s smart city initiative is only in the conceptual stage, security practitioners are geared up to handle the initiative.

Cisco’s Srinivasan believes a smart city requires access to good security services with expertise inmobility, physical security and systems integration. “Security practitioners should be part of an ecosystem to create a set of services around network connectivity, appliances and data analyticsto have effective controls,” he says.

Says Tiwari, “One government body must be responsible for information security for various e-governance projects, aligning with independent software vendors, system integrators and companies creating products for collaboration and communications. These can be monitored through a dashboard and can manage other Internet of Things. Smart cities will require a complex network connectivity; hence new vulnerabilities.”

Dube suggests security planning should begin at the network design stage itself to avoid data leakage. “Every request for proposal going out should have a security aspect well-articulated on the authentication protocols and access controls used to protect the smart gateway,” he says.

Krishnan of Reliance Capital lists some imperatives of a security framework:

  • ISO standards and business processes;
  • Risk assessment tools and procedures;
  • Risk auditing and monitoring process, both internal and external;
  • ISMS framework to handle security risks.

“The project’s starting on a clean slate,” Papineni says. “It’s a huge opportunity to leapfrog to an approach that actually works against new and unknown threats of today and tomorrow.”

Article ( Birth of custom ROM: the Android vs Google story

Originally published on –
March 02, 2015 at 8:00 am | By: Krish Kupathil, CEO, Mobiliya Technologies

I have been invited to speak at various occasions at gatherings of telecom professionals and CEOs wanting to tap the future in mobile and telecom to get their strategies right. It was at one of these events that I debated extensively on how the feature phones market will cease to exist and will be replaced by low-cost smartphones. Incidentally, at the same event, I had also put forth a thought that Android will reach a saturation point. And then Google will wage a war to control Android.

Both of these predictions seem to be coming true. Android has reached a saturation point in the smart phone market (just about 85 per cent as reported in the latest IDC report). And India has reached 920 million telecom users with 111 million smart phones sold in 2014. The only way forward is to convert feature phone users into smart phone users with the lure of simplified user experience and low-cost devices. As the number of devices consolidates and ODMs concentrate on creating differentiation on fewer but better models of phones and tablets, there will be a struggle to deviate from the path shown by Google. Today 37 per cent of the Android devices in the world run on custom ROMs. Amazon, Alibaba and now even OnePlus One have custom ROMs to drive their brands and services.


The Android Vs Google story

With custom ROMs gaining strength, Google is realising that it is losing its grip on Android. There is a move to consolidate the user base of vanilla Android under programs like Android One. There is also increased stringency in the brand guidelines and policies to adopt Google services across Android devices. The increased insistence on uniformity across Android devices from Google is against the basic principles of open source technology. Hence Android, an open source technology which is taking its own shape and forms based on user requirement, is competing with its creator Google, that is now attempting at stifle innovation for uniformity. And this has affected business for Android. It has become increasingly difficult for mobile manufacturers to differentiate their devices, to launch their own services and create user stickiness.

The birth of Android distribution and Custom ROM

Android with its adept capability to ‘distribute’ apps and services to its users on their phones came to be seen as a distribution platform. As the Android ecosystem matured, companies like Mobiliya created Aftermarket Android distribution focused at enterprises and consumers by partnering with world leading device manufacturers and brands. These Android distributions like Mobiliya KratOS provide for secure transactions, secure messaging, encryption, manageability and fill those security gaps that a CIO or a government organization is concerned about. There are others like CynogenMod that were created by Android enthusiasts and hackers to answer their needs. These are also sometimes called Custom ROMs as deviates from the stock Android ROM that is provided by Google.

Custom ROM gives maximum advantage to the ODM

Device manufacturers need to rise from being device sales companies to a device solution companies. From just being the provider of devices to be able to provide the complete mobile solution for industries like education, enterprise, government including the devices is what will drive the next surge of growth. There is also increased pressure from consumers and prosumers to provide better smart phone devices at lower costs. The ODM will need to control the Android distribution for it to deploy various sets of solutions. This will result in a lot of ODMs adopting custom ROMs to create their own distribution.

It also gives more control on the user experience and the brand across the various devices. Custom ROM have capabilities like theming engine, its own launcher, differentiated apps and services that allow device manufacturers to embed their brands in all of these apps and services.

Securing Custom ROM and Android distribution

More apps and services will give rise to increased financial transaction and personal data on these mobile devices. Even as enterprises adopt custom ROMs they will require security and manageability features. There will be increased demand for securing personal and workspace hardware and software based encryption, secure connection over insecure network and enterprise readiness in the form of integration of VPN, SSO, biometrics and other forms of authentication and control software. Consumers will also be required to protect their data when doing financial transactions or exchanging personal information. Features like women safety, family management and child modes are easily accepted and are becoming a part of daily lives.

Hence it is important that the Custom ROM is secure and security loopholes in Android are plugged in. it is also important to get the right certification readiness with various government bodies so that enterprises and government can adapt to it. It is these areas that Mobiliya KratOS, a secure custom ROM addresses in the market.

Krish Kupathil
Krish is the CEO of Mobiliya and has over 25 years of sales and BD experience. His primary focus is developing and executing AgreeYa Mobility’s embedded and mobility business. Krish has broad experience in building and managing international technology businesses with a special understanding of the IT/telecommunications industry, as well as professional qualifications in finance and accounts.

Article: Buying MDM for the Enterprise

Five things to remember when buying an MDM for the enterprise

Originally published on –
19 Febrruary 2014 | By: Krish Kupathil

Over the past decade, the world has witnessed quantum leaps in the advances of workplace technology. Extending far beyond the ease and flexibility of the laptop or instant access to information provided by the Internet, devices like tablets and smartphones have become permanent fixtures in everyday life and vital tools for directing productivity and efficiency within the workplace. As a result, the lines drawn to distinguish between personal and business use of this rapidly evolving array of technologies have all but disappeared.

This consumerization of technology, coupled with the bring your own device (BYOD) phenomenon, is on an upward trajectory—driven primarily by the proliferation of smart devices and the increasing demand from employees to use their own devices to conduct business and access corporate networks. With no signs of slowing anytime soon, IT administrators and CIOs struggle to find solutions for managing the increasing number of both corporate- and personally-owned devices.

Security is Key
When it comes to choosing the appropriate tools for managing mobile devices, there’s no shortage of mobile device management (MDM) vendors offering to help businesses achieve their objectives of provisioning, registering, configuring, and inventorying mobile devices, as well as setting security policies for protecting sensitive data. Analysys Mason recently forecasted cloud-based mobile device management revenue worldwide to increase at a 27.3 percent compound annual growth rate, climbing from $574.8 million in 2013 to $1.5 billion in 2018.

At the core of this exploding MDM market is the issue of corporate security. IT administrators and CIOs, particularly within small- and medium-sized enterprises, face the daunting challenge of providing employees with freedom of choice in devices and network accessibility, while also guaranteeing compliance with an emphasis on corporate security policies. However, nothing is obvious or easy about meeting these challenges as every enterprise has its own set of goals, policies, and team needs to consider when choosing the appropriate tools.

Even the most basic MDM tools should add value to an enterprise rather than unnecessarily increase costs and burden employees with complex technology that requires intense training and a steep learning curve. After all, MDM tools are intended to give enterprises confidence when deploying mobile devices and provide a defined and securely monitored data protection policy that includes an understanding of which applications are used on particular devices. Following this process not only helps IT comprehend the MDM proposition but also gradually allows for adjustment to a third-party service provider as it enters the corporate mix.

Data Sovereign Solutions
As governments around the world have become increasingly alert to the importance of sovereign data hosted locally with servers inside their territory, adhering to the individual legal policies within each country is crucial in order to conduct business in these geographies. Advanced MDM solutions should be fluid enough to adhere to regional policies and have the capability to be hosted on private servers, as well as be multi-tenant and multi-hierarchical in order to implement specific geographical policies.

This level of customization is invaluable for government agencies and departments implementing solutions to manage both corporate- and employee-owned mobile devices, as some enterprise customers insist that their data stay in the region.

European companies in particular have been quite stringent about data sovereignty in the wake of recent privacy issues. Similarly, with an up-and-coming market for MDM technology, the new Indian government is showing early signs of strict data regulation and greater control of cloud data through stringent laws. Knowing these international security environments, all new MDM software should cater to these legal frameworks that differ for each geography.

Enterprise Mobility and IT Administrators
As the MDM market soars, IT administrators and CIOs must also consider which type of MDM tools will achieve the most for their enterprise. Whether employees travel the globe to satellite offices or come from various professional segments, retained primarily under contract, choosing the right MDM is critical to providing the enterprise with a competitive and collaborative edge.

A few essential tools every MDM solution should offer include several components including easy on boarding, remote device management, data security, a multi-platform Web console, location services, advanced security, and device provisioning.

Easy on boarding detects device operating systems and presents specific configuration packages to ease new users into the enterprise environment.

Remote device management enforces enterprise policies with the capability to remotely lock, wipe, or reset devices.

Data security protects sensitive corporate data as the enterprise becomes more mobile.

A multi-platform Web Console provides the ability to control and manage devices in administrator or user modes, apply or remove restrictions, and update security features.

Location services can be used as a safety net feature to control and locate devices.

Advanced security is used for simple security deployment in governmental and restricted environments.

Finally, device provisioning permits administrators to configure and provision devices to distribute applications, files, operating systems, upgrades, and settings for any enterprise device.

Extensible Devices for IoT
The enterprise IT teams of today are responsible for managing any mobile device or tablet within the corporate environment. As the Internet of Things catches up to enterprise, IT teams deploy special-purpose devices, like wearables, mobile point-of-sale, set-top boxes, and ruggedized devices specialized for industry use, in droves. To manage this new technology as it is introduced to the enterprise network, innovative MDM tools need to be extensible in order to manage them in a single-window environment.

Minimizing Risks and Maximizing Profits
Ensuring the security of sensitive company data, enforcing compliance with corporate mobile device management policies, and providing simple access to enterprise applications and services for employees allows enterprise users a comprehensive experience to execute any task. These benefits to productivity, security, and collaboration make it critical for any MDM solution to have adaption capabilities for the ever-changing needs of business customers.

When it comes to proactively adopting MDM solutions, industry studies show that innovative enterprises are ahead of the curve, while traditional organizations take a more reactive approach to supporting emerging mobile technologies with simple deployment. However, even in the most restricted environments, mobile devices and mobile employees are here to stay. Once viewed as a convenience, laptops, tablets, and smartphones are now invaluable and necessary tools for conducting business. While MDM is as much about corporate security as it is about employee satisfaction, it must accomplish the most crucial enterprise goal—to minimize risk and maximize profit.

Krish Kupathil is the CEO of Mobiliya, an AgreeYa Mobility company, which delivers leadership mobility solutions from the cloud to devices. Headquartered in Mountain View, CA, Mobiliya delivers targeted and differentiated smartphones and tablets, an enterprise-grade Android platform, flexible and customizable device management, an enterprise mobility platform, and a collaborative e-learning platform.

News Clip ( Mobiliya intros custom Android ROM ‘KratOS’ with enhanced security

Originally posted on – | Feb 20, 2015

Mobiliya, a mobile solutions company, has launched Mobiliya KratOS — a custom read-only memory (ROM) based on Android for differentiated devices such as smartphones, tablets, smart glasses and ruggedized devices.

Built on top of Android and enhanced with advanced device management capabilities, virtual private network (VPN), application security, data encryption and a collection of customized consumer-centric applications, Mobiliya KratOS provides regular updates for both consumer and enterprise features along with bloat-free performance to secure and manage devices, according to the company.


Mobiliya KratOS enables OEMs and ODMs to develop new Android-powered devices targeted at both consumers and enterprise users. Features like secure workspace, remote locking and wiping, remote app installation and uninstallation, camera and Bluetooth blocks are some of the most popular enhancements from Mobiliya KratOS.
With personalisation, a regionalisation framework and software development kit (SDK) for third party app integration, Mobiliya KratOS is adapted to vertical-specific Android devices such as point-of-sale systems, automobiles, set-top boxes and smart TVs.
The company has partnered with Wham! Mobile to release the first set of devices enabled by the custom ROM in India to introduce novel features to the Indian market – including personal safety, family controls, anti-theft and a host of regional customisation features.

“We were looking for software differentiation in the Indian market, which became extremely chaotic over the past couple of years,” said Subhash Chandra, managing director of Wham! Mobiles
. “We wanted to create a unified-user experience across Wham! Branded devices and decided to go for a custom ROM. Mobiliya KratOS fit everything we needed with consumer-and security-focused features like Child Mode, Anti-Theft, Parental Control, Women Safety, Map Me, etc.”

News Clip ( Mobiliya Disrupts Custom ROM Market With Enhanced Security and Manageability of Mobiliya KratOS

Originally posted on – | February 16, 2015

MOUNTAIN VIEW, CA–(Marketwired – Feb 16, 2015) – Mobiliya today announced the launch of the Mobiliya KratOS, a secure, enhanced and custom read-only memory (ROM) based on Android for differentiated devices such as smartphones, tablets, smart glasses and ruggedized devices. Built on top of Google’s open source Android and enhanced with advanced device management capabilities, virtual private network (VPN), application security, data encryption and a vast collection of customized consumer-centric applications, Mobiliya KratOS provides regular updates for both consumer and enterprise features along with enhanced, bloat-free performance to secure and manage devices. With personalization, a regionalization framework and software development kit (SDK) for third party app integration, Mobiliya KratOS is easily adapted to vertical-specific Android devices such as point-of-sale systems, automobiles, set-top boxes and smart TVs.

Mobiliya KratOS
Mobiliya KratOS

Mobiliya KratOS enables OEMs and ODMs to develop new, innovative Android-powered devices targeted at both sophisticated consumers and enterprise users. Mobiliya has partnered with Wham! Mobile to release the first set of devices enabled by the custom ROM in India to introduce novel features to the Indian market — including personal safety, family controls, anti-theft and a host of regional customization features. These devices have the ability to bank securely over unsecure networks and come bundled with consumer-centric, customized apps and a theming engine that allows for the personalization of features to suit the taste and working environment of end users.

“We were looking for software differentiation in the Indian market, which became extremely chaotic over the past couple of years,” says Subhash Chandra, managing director of Wham! Mobiles. “We wanted to create a unified-user experience across Wham! branded devices and decided to go for a custom ROM. We evaluated the leading custom ROMs and realized that while some ODMs were dependent on theming engines, other ROMs like CyanogenMod were made by hackers — creating a clear gap in the market. Mobiliya KratOS fit everything we needed with consumer- and security-focused features like Child Mode, Anti-Theft, Parental Control, Women Safety, Map Me, etc.” Mobiliya KratOS helps device manufacturers target multiple geographies and create unique devices for any targeted market. It also comes with a bouquet of cloud-based services like mobile device management, equipped with more than 300 policies that can be applied on end-user devices. Features like secure workspace, remote locking and wiping, remote app installation and uninstallation, camera and Bluetooth blocks are some of the most popular enhancements from Mobiliya KratOS.

“In today’s competitive global environment, device differentiation is becoming increasingly imperative,” says Krish Kupathil, CEO of Mobiliya. “Mobiliya KratOS aims at creating a comprehensive ecosystem to enable OEMs and ODMs to tap into the emerging connected device market — while introducing novel features to the broader consumer segment. Mobiliya KratOS powers customized and localized devices, while empowering OEMs and ODMs to tout software differentiation in an increasingly crowded market — giving them a clear market advantage and fast time to market.”

Editor’s Note: Free demos of Mobiliya KratOS will be made available to North American press upon request. To schedule your demo, please contact Kristen Evans at or 949.733.8679.

ABOUT MOBILIYA: Mobiliya designs and builds differentiated devices for a variety of vertical industries, consumers and enterprises. These devices run the custom Mobiliya Secure Android platform and other Mobiliya IP to provide customers a compelling, sustained market advantage. Devices incorporating Mobiliya technology and platform are used in education, defense, security, manufacturing, oil and gas and other niche verticals that require specialized devices. For more information, visit