|By Business Wire||
|February 25, 2014 03:03 AM EST||
The rising number of mobile devices in the workplace, both corporate issued and personally owned, has increased the demand on organizations to enable secure mobile access to company applications, data and resources. As more and more mobile and remote workers use the same devices for both business and personal needs, however, the co-mingling of business and personal data and applications poses an even greater threat to network security. The very real possibility of security breaches from malware-infected devices, company data intercepted in-flight on unsecured public wifi networks, or theft by rogue personal applications or unauthorized users of an organization’s data stored on personal devices exposes organizations to significant risk.
Today, Dell announces the newest release of the Dell SonicWALL secure mobile access solution for both managed and unmanaged BYOD devices, which combines the SonicWALL Mobile Connect 3.0 application and SonicWALL secure remote access (SRA) series appliance 7.5, to enable and increase productivity of the mobile workforce without compromising security.
Enforce Mobile Security while Keeping Users Productive
The new release of Dell’s secure mobile access solution ensures that only authorized users and devices meeting security policy are granted network access, and that an organization’s data in-flight and at rest on the device is secure. With SonicWALL Mobile Connect and the SonicWALL secure remote access appliance, the solution:
- Enables administrators to configure and enforce security policies that provide context-aware authentication. Mobile devices are interrogated for essential security information such as jailbreak or root status, device ID, certificate status, and OS versions prior to granting access. Devices that don’t meet policy requirements are not allowed network access and the user is notified of non-compliance, greatly reducing the chances of malware entering the network from non-IT managed devices
- Enables organizations to deliver policy-enforced SSL VPN access to allowed applications and resources from a multitude of device platforms including iOS, Mac OSX, Android, Kindle Fire, and Windows
- Protects company data at rest on mobile devices. Authenticated users can securely browse and view allowed intranet file shares and files in the app, while administrators can establish and enforce mobile application management policies to control whether files viewed can be opened in other apps, copied to the clipboard, printed, or cached securely within the Mobile Connect app. This allows administrators to isolate business data from personal data stored on the device and reduces the risk of data loss. In addition, if the user’s credentials are revoked, content stored in the Mobile Connect app is locked and can no longer be accessed or viewed
- Secure remote access series management console consolidates network access control of all web resources, file shares and client-server resources into a single location, with central administration and a single rule set for all resources and access methods
- Secure remote access offers web portal access for RDP and VNC that leverages HTML5, allowing devices, including tablets and smartphones, access to RDP or VNC systems through a standard web browser
- Dell SRA series appliances are available through the channel and Dell sales. The Mobile Connect app is available for free download from the Apple Store, Google Play, the Kindle Store, and embedded with Windows 8.1 tablets and laptops. Mobile Connect for MacOSX will be available in Spring 2014.
Patrick Sweeney, executive director, product management, for Dell Security Products
“In today’s mobile workplace, it is vitally important to enable remote and mobile employees to maintain their productivity without compromising network security. The co-mingling of business and personal applications and data on mobile devices presents an even greater challenge to IT when it comes to providing users with mobile access to everything they need to do their jobs, but still protecting corporate data - in-flight, at rest on the device, and on the network - from the multitude of threats posed by mobile devices. The Dell SonicWALL secure mobile access solution provides best-in-class, context-aware authentication for both personal and company-owned devices to protect corporate networks and data from mobile threats. Our converged secure access gateway establishes and enforces granular access control policies for network resources, and further, provides mobile application management policies for our Mobile Connect app to enable secure intranet file browse and caching that protects the data.”
- Twitter: http://www.twitter.com/dellsecurity
- Facebook: http://www.facebook.com/dellsoftware
- LinkedIn: http://www.linkedin.com/groups/Dell-Software-4793472
Delivering Connected Security
Dell Connected Security gives organizations the power to solve their biggest security and compliance challenges today, while helping them better prepare for tomorrow. From the endpoint to the data center to the cloud, Dell helps mitigate risks to enable the business.
Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.
Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Opening Keynote at 16th Cloud Expo, S...
Jul. 27, 2015 09:00 PM EDT Reads: 2,013
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
Jul. 27, 2015 08:45 PM EDT Reads: 173
Delphix, the market leader in Data as a Service (DaaS), has been announced winner of the DevOps Solution Award at the prestigious Computing Vendor Excellence Awards in London. The awards celebrate the achievements of the technology vendors and service providers that are leading the field of enterprise IT. Delphix was recognised as the vendor demonstrating the most effective support of DevOps culture for its ability to improve time to market and collaboration between teams.
Jul. 27, 2015 08:00 PM EDT Reads: 252
"Our biggest growth area has been the security services, the managed services - the things that differentiate us in the market that there is no client that's too small and there's no client that's too big," explained Paul Mazzucco, Chief Security Officer at TierPoint, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 27, 2015 06:30 PM EDT Reads: 302
The Cloud industry has moved from being more than just being able to provide infrastructure and management services on the Cloud. Enter a new era of Cloud computing where monetization’s services through the Cloud are an essential piece of strategy to feed your organizations bottom-line, your revenue and Profitability. In their session at 16th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, discussed how to easily o...
Jul. 27, 2015 06:00 PM EDT Reads: 328
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 27, 2015 06:00 PM EDT Reads: 514
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Jul. 27, 2015 05:30 PM EDT Reads: 1,328
Sysdig has announced two significant milestones in its mission to bring infrastructure and application monitoring to the world of containers and microservices: a $10.7 million Series A funding led by Accel and Bain Capital Ventures (BCV); and the general availability of Sysdig Cloud, the first monitoring, alerting, and troubleshooting platform specializing in container visibility, which is already used by more than 30 enterprise customers. The funding will be used to drive adoption of Sysdig Clo...
Jul. 27, 2015 05:00 PM EDT Reads: 398
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Jul. 27, 2015 03:00 PM EDT Reads: 425
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of pro...
Jul. 27, 2015 03:00 PM EDT Reads: 1,220
"We do data integration for B2B also application to application, and we do data management and enable Big Data," explained Pat Adamiak, Vice President, Product Marketing at Liaison Technologies, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 27, 2015 03:00 PM EDT Reads: 296
"We specialize in testing. DevOps is all about continuous delivery and accelerating the delivery pipeline and there is no continuous delivery without testing," noted Marc Hornbeek, Sr. Solutions Architect at Spirent Communications, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 27, 2015 02:45 PM EDT Reads: 314
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at @DevOpsSummit, Haseeb Budhani, CEO and Co-founder of Soha, shared five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the friction an...
Jul. 27, 2015 02:30 PM EDT Reads: 437
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
Jul. 27, 2015 02:00 PM EDT Reads: 1,032
Discussions about cloud computing are evolving into discussions about enterprise IT in general. As enterprises increasingly migrate toward their own unique clouds, new issues such as the use of containers and microservices emerge to keep things interesting. In this Power Panel at 16th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the state of cloud computing today, and what enterprise IT professionals need to know about how the latest topics and trends affect t...
Jul. 27, 2015 02:00 PM EDT Reads: 1,136