Welcome!

@CloudExpo Authors: Pat Romanski, William Schmarzo, Elizabeth White, Liz McMillan, Roger Strukhoff

Blog Feed Post

Enhanced Protection for Mobile Devices: gateprotect upgrades Complete Security suite

Hamburg, January 8th 2014 - The German IT security specialist gateprotect is now offering an upgrade for its endpoint solution. "Complete Security - Mobile Protection" provides even better protection against evolving threats, malware and malicious applications on mobile devices. New features include unified management access for controlling both mobile devices and PCs; an application level password and lockout function; a SecureWeb browsing functionality for Android browsers and Google Chrome; as well as more targeted user group management functionality.

A recent survey on mobile security shows: 83 percent of the interviewed decision-makers believe that mobile devices create a high security risk within the corporate environment.* gateprotect firmly believes that the Security threat through mobile devices will continue to become more prevalent which is why we continue to offer our customers with solutions to provide Complete Security.

"Cybercriminals are increasingly targeting employees to gain access to a company's intellectual property", says gateprotect CEO Dr. Peter Smeets. "Because it is common for there to be a lot of confidential corporate data stored on the mobile devices of Executives, businesses must supplement their security parameters with a coherent but simple BYOD protection strategy."

Unified Management for IT Administrators
gateprotect "Complete Security - Mobile Protection" is particularly easy to operate. Both the mobile devices and the PCs connected to the network may be administered quickly via one single interface.

IT administrators have the possibility to create policies that can be updated and duplicated within the console, and create user groups to facilitate the management of end users. Administrators can easily drag-and-drop users into a group, and user devices will automatically pick up the policies associated with that group.

Employees will only be able to change those settings on their mobile devices that are in line with the company policy. If the device password, lock screen timeout, or device administrator access do not meet policy requirements, alerts are sent directly to the console.

The SecureWeb™ browsing feature has been expanded as well to support Google Chrome in addition to the stock Android browser. In addition, the upgrade of "Complete Security - Mobile Protection" includes an enhanced device scanning engine for Android that detects threats in real time and speeds up scans.

Key features of Complete Security - Mobile Protection at a glance:

  • Device and group level policies for Android and iOS devices

  • Alerts sent up to management console for devices out of policy

  • Cloud scanning enhancements powered by Webroot® Intelligence Network™ (WIN™) services

  • User group management

  • Single point of control for mobile devices and PCs

  • New application level password and lockout features

  • SecureWeb browsing functionality for stock Android browser and Google Chrome

  • Increased efficacy with cloud-powered scanning

  • Lower CPU, memory, bandwidth, and battery utilization

* http://www.webroot.com/shared/pdf/byod-mobile-security-study.pdf

Download this press release under: http://www.gateprotect.com

About gateprotect
gateprotect AG Germany has been a leading, globally acting provider of IT security solutions in the area of network security for more than ten years. These solutions comprise next generation firewalls with all commonly used UTM functionalities, managed security as well as VPN client systems. To minimize the risk of operator errors in highly complex security functions, gateprotect has developed the eGUI® interface concept. The patented eGUI® technology (ergonomic Graphic User Interface) and the Command Center based thereon for the configuration and administration of firewall systems for managed security service providers (MSSPs) increase the factual security in companies and allow for an efficient ongoing maintenance of the systems. Reputable companies and institutions in more than 80 countries worldwide are among the users of about 24.000 installed devices.

Since 2010, gateprotect has been listed in the renowned "Gartner Magic Quadrant" for UTM firewall appliances. The gateprotect solutions comply with highest international standards - thus, the firewall packet filtering core of the new development has been certified according to "Common Criteria Evaluation Assurance Level 4+ (EAL 4+)" by the Federal Office for Information Security (BSI) in March 2013. For the easy operability and comprehensive security of the UTM firewall solutions, gateprotect was the first German company to be honored with the Frost & Sullivan Excellence Award.

Further Information:
gateprotect Aktiengesellschaft Germany
Anika Ohlsen -Director Marketing
Valentinskamp 24
D-20354 Hamburg
Tel.: +49 (0) 40 278 85 0
Fax: +49 (0) 40 278 85 105
E-Mail: [email protected]
Internet: www.gateprotect.com

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@CloudExpo Stories
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...