Click here to close now.

SYS-CON MEDIA Authors: Pat Romanski, William Schmarzo, Elizabeth White, Carmen Gonzalez, JP Morgenthal

News Feed Item

WidePoint Launches Secured, Cloud Based, Identity-as-a-Service 'Certificate-on-Chip' for All Types of Mobile Devices

New service brings increased security and access management for both employee-owned and corporate-issued devices

MCLEAN, Va., Jan. 9, 2014 /PRNewswire/ -- WidePoint Corporation (NYSE Mkt: WYY), a leading provider of secured, cloud-based, enterprise-wide solutions and services in mobile communications management and identity management solutions, has launched a robust, cloud based, internally developed Identity as a Service (IDaaS) capability. This service provides secure digital certificates to all types of mobile devices (e.g., smartphones, tablets, laptops, IP cameras) in order to enhance the information security assurance level of mobile transactions and access management to corporate networks, databases, and other IT assets.

The combined shipments of PCs, tablets, and mobile phones are projected to reach 2.48 billion units in 2014, with growth being driven predominantly by sales of tablets and smartphones, according to Gartner Group.

Gartner further predicts that by 2017, half of all employers will require employees to bring their own device (BYOD), which will introduce a host of added potential vulnerabilities including:

  1. the introduction of viruses or malware into the enterprise network;
  2. employee access to, and handling of, sensitive data issues; and
  3. compliance issues with regulations related to accessing  restricted proprietary data.

Whether a device is company-issued or BYOD, appropriate security measures will need to be implemented by organizations of all types in addressing the risk that the explosion of workforce mobility places upon an organization's information technology infrastructure as it is pushed to expand beyond traditional boundaries.

WidePoint's IDaaS "Certificate-on-Chip" service can mitigate these problems allowing organizations to:

  • Create a secure VPN connection between the organization's network and the devices used by mobile or home-based employees—without a proprietary software client.
  • Ensure employees download sensitive data only to authorized, properly configured, and protected devices.
  • Remotely revoke certificates of devices that were lost or stolen, or belong to an employee who has left the organization.

WidePoint's IDaaS "Certificate-on-Chip" service provides:

  • a level of federally compliant assured information security far beyond a simple username and password-based VPN solution, and
  • enables organizations to assign different levels of access to employees, consultants, and trading partners, based on the specific BYOD user device being used to establish connectivity.

Daniel Turissini, WidePoint CTO, stated, "Our expertise in building out a Federally authorized credentialing infrastructure to a base of over 3 million users has uniquely qualified us to develop and bring to market a cost effective, scalable, and easily deployed service that addresses the problems that organizations are presently facing as they extend their IT infrastructures into the cloud." 

WidePoint's IDaaS "Certificate-on-Chip" service also allows the use of attribute-based access control (ABAC).  ABAC provides the flexibility organizations need to manage their global mobile workforces for today and tomorrow. 

Further, Gartner predicts that by 2020, 70% of enterprises will use attribute-based access control as the dominant mechanism to protect critical assets, up from less than 5% today.

Steven L. Komar, WidePoint CEO & Chairman, added, "With our long and proven history of expertise in communications lifecycle management and identity assurance solutions, WidePoint is uniquely attuned to providing higher-level security as part of its portfolio of Managed Mobility Solutions offerings to Commercial and Government markets." He continued, "The IDaaS 'Certificate-on-Device' service provides customers with additional security in a manner that can not only increase worker productivity, but that is also complementary to the organization's unique security policies and related compliance requirements."

For more information on this unique new IDaaS 'Certificate-on-Device' Service please contact Mr. John Atkinson, WidePoint Chief Sales and Marketing Officer at [email protected].

About WidePoint:

WidePoint is a leading provider of secured, cloud-delivered, enterprise-wide information technology-based solutions that can enable enterprises and agencies to deploy fully compliant IT services in accordance with government mandated regulations and advanced system requirements. WidePoint has several major government and commercial contracts. For more information, visit www.widepoint.com.

For More Information:

Jim McCubbin, EVP & CFO

Brett Maas or David Fore

WidePoint Corporation

Hayden IR

7926 Jones Branch Drive, Suite 520

(646) 536-7331

McLean, VA 22102

[email protected]

(703) 349-2577


[email protected]




SOURCE WidePoint Corporation

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential. The DevOps Summit at Cloud Expo – to be held June 3-5, 2015, at the Javits Center in New York City – will expand the DevOps community, enable a wide...
The web app is Agile. The REST API is Agile. The testing and planning are Agile. But alas, Data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes which force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software orga...
The world is at a tipping point where the technology, the device and global adoption are converging to such a point that we will see an explosion of a world where smartphone devices not only allow us to talk to each other, but allow for communication between everything – serving as a central hub from which we control our world – MediaTek is at the heart of both driving this and allowing the markets to drive this reality forward themselves. The next wave of consumer gadgets is here – smart, con...
Cloud Expo, Inc. has announced today that Andi Mann returns to DevOps Summit 2015 as Conference Chair. The 4th International DevOps Summit will take place on June 9-11, 2015, at the Javits Center in New York City. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at ...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
CA Technologies has announced it has signed a definitive agreement to acquire Rally Software Development Corp. for $19.50 per share, which equates to approximately $480 million, net of cash acquired. The transaction has been unanimously approved by both Boards of Directors, and is expected to close in the second quarter of CA’s fiscal 2016. Based in Boulder, CO, Rally has approximately 500 employees across four continents and FY 2015 sales of $88 million. “Software applications are changing the...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enter...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...