142 Wooster St.
10012 New York, us
+1 (781) 237-0341
Trusteer Secure Web Access Protects Enterprises from Smart Phone and Tablet-Based Attacks
Performs Security Assessment of Mobile Devices and Controls Access to Web Applications to Prevent Data Theft and Security Breaches(PresseBox) ( New York, )
According to the RSA 2011 Cybercrime Trends Report, the number one trend this year will be mobile malware and the exploitation of mobile phones to commit fraud. The explosive growth of mobile devices as a general purpose computer "on the go" has made them an attractive target for cybercriminals to exploit. However it is not just consumers and their banks that must consider the risks of mobile malware. The consumerization of IT has laid the bridge for the crossover of consumer technology into the enterprise. Organizations are providing their employees with mobile devices, or employees are using their own personal devices to conduct work-related activities - potentially opening up a backdoor for malware to make its way onto the corporate network.
Transparent Security for all Mobile Platforms
Tablets and mobile devices, most of which are not managed by corporate IT departments, are easily infected with malware and may be vulnerable to attack. Allowing these mobile endpoints to connect to enterprise resources via the web can expose sensitive corporate information to criminals and lead to network security breaches. Trusteer Secure Web Access ensures tablets and mobile devices requesting a connection to secure web applications are free from malware and security vulnerabilities. It supports all leading tablets and mobile devices including iPad, iPhone, Android, BlackBerry and more.
To enforce enterprise policies on mobile devices, Trusteer Secure Web Access assesses the security posture of each device requesting access to secure resources before it can connect to applications or the network. Trusteer evaluates whether the service is installed on the device, if any malware is present, and whether it has any unpatched vulnerabilities. Only devices that meet security policy requirements are allowed to connect to enterprise resources. In addition, the status of each device is logged and transmitted in real-time to the enterprise IT department. Trusteer Secure Web Access also allows organizations to define and apply access control policies based on the security status of the device, such as blocking access to all or only select resources.
"IT departments are under pressure from the executive suite all the way to the departmental level to allow employees to use tablets and mobile devices to connect to secure web resources," said Mickey Boodaei, CEO of Trusteer. "The Trusteer Secure Web Access Service is an elegant, quick and easy to deploy solution for enterprises that want to minimize the threat associated with mobile device connectivity to business applications."
"Many CISOs face a huge challenge when it comes to managing smartphones, and realize that they need to quickly and securely embrace this ever more popular endpoint or they could see their data and systems trashed by malware ridden devices," said Nigel Stanley, Practice Leader- security, Bloor Research. "Secure access services are one way in which users can be encouraged to use their own smartphones while protecting the company network and hopefully make this one less thing a CISO need worry about".
Availability and Pricing
Trusteer Secure Web Access is available immediately from Trusteer and its business partners worldwide. Pricing starts at $35 / £25 per device per year.
Die Nutzung von hier veröffentlichten Informationen zur Eigeninformation und redaktionellen Weiterverarbeitung ist in der Regel kostenfrei. Bitte klären Sie vor einer Weiterverwendung urheberrechtliche Fragen mit dem angegebenen Herausgeber. Bei Veröffentlichung senden Sie bitte ein Belegexemplar an firstname.lastname@example.org.