Welcome!

News Feed Item

WidePoint Launches Secured, Cloud Based, Identity-as-a-Service 'Certificate-on-Chip' for All Types of Mobile Devices

New service brings increased security and access management for both employee-owned and corporate-issued devices

MCLEAN, Va., Jan. 9, 2014 /PRNewswire/ -- WidePoint Corporation (NYSE Mkt: WYY), a leading provider of secured, cloud-based, enterprise-wide solutions and services in mobile communications management and identity management solutions, has launched a robust, cloud based, internally developed Identity as a Service (IDaaS) capability. This service provides secure digital certificates to all types of mobile devices (e.g., smartphones, tablets, laptops, IP cameras) in order to enhance the information security assurance level of mobile transactions and access management to corporate networks, databases, and other IT assets.

The combined shipments of PCs, tablets, and mobile phones are projected to reach 2.48 billion units in 2014, with growth being driven predominantly by sales of tablets and smartphones, according to Gartner Group.

Gartner further predicts that by 2017, half of all employers will require employees to bring their own device (BYOD), which will introduce a host of added potential vulnerabilities including:

  1. the introduction of viruses or malware into the enterprise network;
  2. employee access to, and handling of, sensitive data issues; and
  3. compliance issues with regulations related to accessing  restricted proprietary data.

Whether a device is company-issued or BYOD, appropriate security measures will need to be implemented by organizations of all types in addressing the risk that the explosion of workforce mobility places upon an organization's information technology infrastructure as it is pushed to expand beyond traditional boundaries.

WidePoint's IDaaS "Certificate-on-Chip" service can mitigate these problems allowing organizations to:

  • Create a secure VPN connection between the organization's network and the devices used by mobile or home-based employees—without a proprietary software client.
  • Ensure employees download sensitive data only to authorized, properly configured, and protected devices.
  • Remotely revoke certificates of devices that were lost or stolen, or belong to an employee who has left the organization.

WidePoint's IDaaS "Certificate-on-Chip" service provides:

  • a level of federally compliant assured information security far beyond a simple username and password-based VPN solution, and
  • enables organizations to assign different levels of access to employees, consultants, and trading partners, based on the specific BYOD user device being used to establish connectivity.

Daniel Turissini, WidePoint CTO, stated, "Our expertise in building out a Federally authorized credentialing infrastructure to a base of over 3 million users has uniquely qualified us to develop and bring to market a cost effective, scalable, and easily deployed service that addresses the problems that organizations are presently facing as they extend their IT infrastructures into the cloud." 

WidePoint's IDaaS "Certificate-on-Chip" service also allows the use of attribute-based access control (ABAC).  ABAC provides the flexibility organizations need to manage their global mobile workforces for today and tomorrow. 

Further, Gartner predicts that by 2020, 70% of enterprises will use attribute-based access control as the dominant mechanism to protect critical assets, up from less than 5% today.

Steven L. Komar, WidePoint CEO & Chairman, added, "With our long and proven history of expertise in communications lifecycle management and identity assurance solutions, WidePoint is uniquely attuned to providing higher-level security as part of its portfolio of Managed Mobility Solutions offerings to Commercial and Government markets." He continued, "The IDaaS 'Certificate-on-Device' service provides customers with additional security in a manner that can not only increase worker productivity, but that is also complementary to the organization's unique security policies and related compliance requirements."

For more information on this unique new IDaaS 'Certificate-on-Device' Service please contact Mr. John Atkinson, WidePoint Chief Sales and Marketing Officer at [email protected].

About WidePoint:

WidePoint is a leading provider of secured, cloud-delivered, enterprise-wide information technology-based solutions that can enable enterprises and agencies to deploy fully compliant IT services in accordance with government mandated regulations and advanced system requirements. WidePoint has several major government and commercial contracts. For more information, visit www.widepoint.com.

For More Information:

Jim McCubbin, EVP & CFO

Brett Maas or David Fore

WidePoint Corporation

Hayden IR

7926 Jones Branch Drive, Suite 520

(646) 536-7331

McLean, VA 22102

[email protected]

(703) 349-2577


[email protected]




SOURCE WidePoint Corporation

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, attendees learned about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how ...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “Desktop-as-a-Service Buyer’s Guide, 2016,” which provides a comprehensive comparison of DaaS providers, including CloudJumper, Amazon, VMware, and Microsoft.
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...