|By RealWire News Distribution||
|January 8, 2014 08:53 PM EST||
Hamburg, January 8th 2014 - The German IT security specialist gateprotect is now offering an upgrade for its endpoint solution. "Complete Security - Mobile Protection" provides even better protection against evolving threats, malware and malicious applications on mobile devices. New features include unified management access for controlling both mobile devices and PCs; an application level password and lockout function; a SecureWeb browsing functionality for Android browsers and Google Chrome; as well as more targeted user group management functionality.
A recent survey on mobile security shows: 83 percent of the interviewed decision-makers believe that mobile devices create a high security risk within the corporate environment.* gateprotect firmly believes that the Security threat through mobile devices will continue to become more prevalent which is why we continue to offer our customers with solutions to provide Complete Security.
"Cybercriminals are increasingly targeting employees to gain access to a company's intellectual property", says gateprotect CEO Dr. Peter Smeets. "Because it is common for there to be a lot of confidential corporate data stored on the mobile devices of Executives, businesses must supplement their security parameters with a coherent but simple BYOD protection strategy."
Unified Management for IT Administrators
gateprotect "Complete Security - Mobile Protection" is particularly easy to operate. Both the mobile devices and the PCs connected to the network may be administered quickly via one single interface.
IT administrators have the possibility to create policies that can be updated and duplicated within the console, and create user groups to facilitate the management of end users. Administrators can easily drag-and-drop users into a group, and user devices will automatically pick up the policies associated with that group.
Employees will only be able to change those settings on their mobile devices that are in line with the company policy. If the device password, lock screen timeout, or device administrator access do not meet policy requirements, alerts are sent directly to the console.
The SecureWeb™ browsing feature has been expanded as well to support Google Chrome in addition to the stock Android browser. In addition, the upgrade of "Complete Security - Mobile Protection" includes an enhanced device scanning engine for Android that detects threats in real time and speeds up scans.
Key features of Complete Security - Mobile Protection at a glance:
Device and group level policies for Android and iOS devices
Alerts sent up to management console for devices out of policy
Cloud scanning enhancements powered by Webroot® Intelligence Network™ (WIN™) services
User group management
Single point of control for mobile devices and PCs
New application level password and lockout features
SecureWeb browsing functionality for stock Android browser and Google Chrome
Increased efficacy with cloud-powered scanning
Lower CPU, memory, bandwidth, and battery utilization
Download this press release under: http://www.gateprotect.com
gateprotect AG Germany has been a leading, globally acting provider of IT security solutions in the area of network security for more than ten years. These solutions comprise next generation firewalls with all commonly used UTM functionalities, managed security as well as VPN client systems. To minimize the risk of operator errors in highly complex security functions, gateprotect has developed the eGUI® interface concept. The patented eGUI® technology (ergonomic Graphic User Interface) and the Command Center based thereon for the configuration and administration of firewall systems for managed security service providers (MSSPs) increase the factual security in companies and allow for an efficient ongoing maintenance of the systems. Reputable companies and institutions in more than 80 countries worldwide are among the users of about 24.000 installed devices.
Since 2010, gateprotect has been listed in the renowned "Gartner Magic Quadrant" for UTM firewall appliances. The gateprotect solutions comply with highest international standards - thus, the firewall packet filtering core of the new development has been certified according to "Common Criteria Evaluation Assurance Level 4+ (EAL 4+)" by the Federal Office for Information Security (BSI) in March 2013. For the easy operability and comprehensive security of the UTM firewall solutions, gateprotect was the first German company to be honored with the Frost & Sullivan Excellence Award.
gateprotect Aktiengesellschaft Germany
Anika Ohlsen -Director Marketing
Tel.: +49 (0) 40 278 85 0
Fax: +49 (0) 40 278 85 105
E-Mail: [email protected]
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Dec. 1, 2015 08:00 AM EST Reads: 394
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at Built.io, examined how Docker has evolved into a highly effective tool for application del...
Dec. 1, 2015 08:00 AM EST Reads: 396
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
Dec. 1, 2015 08:00 AM EST Reads: 250
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
Dec. 1, 2015 06:30 AM EST Reads: 513
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
Dec. 1, 2015 06:00 AM EST Reads: 271
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Dec. 1, 2015 05:00 AM EST Reads: 620
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNu...
Dec. 1, 2015 05:00 AM EST Reads: 359
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
Dec. 1, 2015 04:45 AM EST Reads: 458
SYS-CON Events announced today that Catchpoint, a global leader in monitoring, and testing the performance of online applications, has been named "Silver Sponsor" of DevOps Summit New York, which will take place on June 7-9, 2016 at the Javits Center in New York City. Catchpoint radically transforms the way businesses manage, monitor, and test the performance of online applications. Truly understand and improve user experience with clear visibility into complex, distributed online systems.Founde...
Dec. 1, 2015 04:15 AM EST
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
Dec. 1, 2015 03:30 AM EST Reads: 532
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
Dec. 1, 2015 03:00 AM EST Reads: 110
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Dec. 1, 2015 03:00 AM EST Reads: 469
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
Dec. 1, 2015 03:00 AM EST Reads: 470
Most of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipelining software with the clear notion of supporting immutability. In his session at @ThingsExpo, Shashank Jain, a development architect for SAP Labs, discussed the objective, which is to automate the IoT deployment proces...
Dec. 1, 2015 01:15 AM EST Reads: 125
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
Dec. 1, 2015 01:00 AM EST Reads: 436