certgate delivers IT security for BYOD environments
Public and private sector solution
The German IT industry association BITKOM observes a growing tendency in the domestic market to use privately owned devices at the workplace: 43% of the companies in the ITC sector allow their employees to use their own devices to connect to the enterprise network. Employer motivations vary: 81% believe it contributes to higher employee satisfaction, 74% expect it to enhance productivity, and 40% believe it helps their image as a modern employer. The new generation of young, qualified employees plays a key role in this tectonic shift. Companies want them, and they in turn want to be able to use their own devices on the job. People who use services such as Dropbox and Evernote and social networks like Facebook and LinkedIn privately aren’t prepared to give them up professionally.
For years now data protection experts have been pointing to the hazards inherent in letting employees connect to company infrastructures with their privately owned ITC devices. Security risks are especially high in the universe of younger, highly qualified employees: a recent Censuswide survey commissioned by Oracle shows that young employees in particular are quite unaware of the security risks associated with handling privileged company information on their mobile devices: although the incidence of lost or stolen devices is much higher in this group than with older employees, accessing privileged company information from privately owned devices is still considered the most natural thing in the world. Is this just another issue specific to millennials – the Digital Natives – who don’t have a feel for what might separate the personal from the professional, and generally have a more carefree attitude toward data security?
Stefan Schmidt-Egermann, Head of Sales & Marketing of certgate, the Nuremberg-based specialist for mobile IT security solutions, still sees the need for action at the IT department level of organizations: “Making sure BYOD works out for both the company and the people working there is a broad undertaking. But if companies want to retain great talent today and keep attracting it tomorrow, they must adapt to the change. It starts with a sound BYOD policy. Ensuring that the company’s data is protected and that devices accessing this data are secure depends on going about the integration of BYOD into the enterprise infrastructure the right way.”
The certgate solution
certgate proposes security products that are highly secure and easy to use for all major mobile device brands (Android, BlackBerry, iOS, Windows). The company’s portfolio ranges from on-device data encryption to securing enterprise communications (e-mail, voice, VPN). Enterprise data is strictly segregated from private data at all times as well as protected with a secure element hardware module – a smartcard chip – certified by the German Federal Office for Information Security (BSI).
certgate’s technology enables companies to block access to their protected data at any time, even remotely. This combination of a device-specific hardware secure element and an enterprise-specific mobile device management (MDM) system is one of the most easiest as well as safest security solutions for companies that intend to create a BYOD environment.
Based in Nuremberg-Germany, certgate is an innovator in mobile IT security. As a cross-platform supplier of high-quality security solutions for mobile terminal devices – for Android, iOS, BlackBerry as well as Windows systems – certgate was the first in the world to fit a flash memory microSD card for use in smartphones, tablets and PCs with the full encryption and signature functionalities of a smartcards. certgate makes mobile IT devices secure – from the hardware to protection of the operating system through to the application level – using patented technology. Together with partners such as MDM manufacturers, application developers, integrators and mobile radio specialists, certgate creates products with the highest security level and additional user comfort. The containment of information abuse is combined with cost-reducing applications to the benefit of the user. With its products and solutions, certgate supports the mobility strategies of its customers throughout the world. For more information please visit www.certgate.com.
Press releases you might also be interested in
Weitere Informationen zum Thema "Sicherheit":
WSUS-Tipps zu Optimierung, Troubleshooting und Scripting
Sobald die WSUS-Serverrolle installiert und eingerichtet ist, müssen in der Verwaltungskonsole einige Einrichtungen vorgenommen werden. Sind auch diese abgeschlossen, sind häufig noch Optimierungen und Fehlerbehebungen notwendig.Die wichtigsten Tipps und Schritte zeigen wir in diesem Video-Tipp.Weiterlesen