|By Business Wire||
|February 25, 2014 03:03 AM EST||
The rising number of mobile devices in the workplace, both corporate issued and personally owned, has increased the demand on organizations to enable secure mobile access to company applications, data and resources. As more and more mobile and remote workers use the same devices for both business and personal needs, however, the co-mingling of business and personal data and applications poses an even greater threat to network security. The very real possibility of security breaches from malware-infected devices, company data intercepted in-flight on unsecured public wifi networks, or theft by rogue personal applications or unauthorized users of an organization’s data stored on personal devices exposes organizations to significant risk.
Today, Dell announces the newest release of the Dell SonicWALL secure mobile access solution for both managed and unmanaged BYOD devices, which combines the SonicWALL Mobile Connect 3.0 application and SonicWALL secure remote access (SRA) series appliance 7.5, to enable and increase productivity of the mobile workforce without compromising security.
Enforce Mobile Security while Keeping Users Productive
The new release of Dell’s secure mobile access solution ensures that only authorized users and devices meeting security policy are granted network access, and that an organization’s data in-flight and at rest on the device is secure. With SonicWALL Mobile Connect and the SonicWALL secure remote access appliance, the solution:
- Enables administrators to configure and enforce security policies that provide context-aware authentication. Mobile devices are interrogated for essential security information such as jailbreak or root status, device ID, certificate status, and OS versions prior to granting access. Devices that don’t meet policy requirements are not allowed network access and the user is notified of non-compliance, greatly reducing the chances of malware entering the network from non-IT managed devices
- Enables organizations to deliver policy-enforced SSL VPN access to allowed applications and resources from a multitude of device platforms including iOS, Mac OSX, Android, Kindle Fire, and Windows
- Protects company data at rest on mobile devices. Authenticated users can securely browse and view allowed intranet file shares and files in the app, while administrators can establish and enforce mobile application management policies to control whether files viewed can be opened in other apps, copied to the clipboard, printed, or cached securely within the Mobile Connect app. This allows administrators to isolate business data from personal data stored on the device and reduces the risk of data loss. In addition, if the user’s credentials are revoked, content stored in the Mobile Connect app is locked and can no longer be accessed or viewed
- Secure remote access series management console consolidates network access control of all web resources, file shares and client-server resources into a single location, with central administration and a single rule set for all resources and access methods
- Secure remote access offers web portal access for RDP and VNC that leverages HTML5, allowing devices, including tablets and smartphones, access to RDP or VNC systems through a standard web browser
- Dell SRA series appliances are available through the channel and Dell sales. The Mobile Connect app is available for free download from the Apple Store, Google Play, the Kindle Store, and embedded with Windows 8.1 tablets and laptops. Mobile Connect for MacOSX will be available in Spring 2014.
Patrick Sweeney, executive director, product management, for Dell Security Products
“In today’s mobile workplace, it is vitally important to enable remote and mobile employees to maintain their productivity without compromising network security. The co-mingling of business and personal applications and data on mobile devices presents an even greater challenge to IT when it comes to providing users with mobile access to everything they need to do their jobs, but still protecting corporate data - in-flight, at rest on the device, and on the network - from the multitude of threats posed by mobile devices. The Dell SonicWALL secure mobile access solution provides best-in-class, context-aware authentication for both personal and company-owned devices to protect corporate networks and data from mobile threats. Our converged secure access gateway establishes and enforces granular access control policies for network resources, and further, provides mobile application management policies for our Mobile Connect app to enable secure intranet file browse and caching that protects the data.”
- Twitter: http://www.twitter.com/dellsecurity
- Facebook: http://www.facebook.com/dellsoftware
- LinkedIn: http://www.linkedin.com/groups/Dell-Software-4793472
Delivering Connected Security
Dell Connected Security gives organizations the power to solve their biggest security and compliance challenges today, while helping them better prepare for tomorrow. From the endpoint to the data center to the cloud, Dell helps mitigate risks to enable the business.
Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.
Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively.
Oct. 9, 2015 10:15 AM EDT Reads: 136
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Oct. 9, 2015 10:00 AM EDT Reads: 287
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
Oct. 9, 2015 10:00 AM EDT Reads: 149
SYS-CON Events announced today that Harbinger Systems will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Harbinger Systems is a global company providing software technology services. Since 1990, Harbinger has developed a strong customer base worldwide. Its customers include software product companies ranging from hi-tech start-ups in Silicon Valley to leading product companies in the US a...
Oct. 9, 2015 10:00 AM EDT Reads: 770
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
Oct. 9, 2015 10:00 AM EDT Reads: 230
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Oct. 9, 2015 10:00 AM EDT Reads: 225
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
Oct. 9, 2015 10:00 AM EDT Reads: 1,257
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 9, 2015 10:00 AM EDT Reads: 220
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Oct. 9, 2015 10:00 AM EDT Reads: 170
In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at Logz.io, and Tomer Levy, co-founder and CEO of Logz.io, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in developing a processing engine that can handle petabytes of data. They will also discuss the requirements of such an engine in terms of scalability, resilience, security, and availability along with how the archi...
Oct. 9, 2015 10:00 AM EDT Reads: 403
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 17th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity
Oct. 9, 2015 10:00 AM EDT Reads: 486
In his session at DevOps Summit, Bryan Cantrill, CTO at Joyent, will demonstrate a third path: containers on multi-tenant bare metal that maximizes performance, security, and networking connectivity.
Oct. 9, 2015 10:00 AM EDT Reads: 157
Docker is hot. However, as Docker container use spreads into more mature production pipelines, there can be issues about control of Docker images to ensure they are production-ready. Is a promotion-based model appropriate to control and track the flow of Docker images from development to production? In his session at DevOps Summit, Fred Simon, Co-founder and Chief Architect of JFrog, will demonstrate how to implement a promotion model for Docker images using a binary repository, and then show h...
Oct. 9, 2015 09:45 AM EDT Reads: 108
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Oct. 9, 2015 09:45 AM EDT Reads: 109
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driv...
Oct. 9, 2015 09:45 AM EDT