|By Business Wire||
|February 25, 2014 03:03 AM EST||
The rising number of mobile devices in the workplace, both corporate issued and personally owned, has increased the demand on organizations to enable secure mobile access to company applications, data and resources. As more and more mobile and remote workers use the same devices for both business and personal needs, however, the co-mingling of business and personal data and applications poses an even greater threat to network security. The very real possibility of security breaches from malware-infected devices, company data intercepted in-flight on unsecured public wifi networks, or theft by rogue personal applications or unauthorized users of an organization’s data stored on personal devices exposes organizations to significant risk.
Today, Dell announces the newest release of the Dell SonicWALL secure mobile access solution for both managed and unmanaged BYOD devices, which combines the SonicWALL Mobile Connect 3.0 application and SonicWALL secure remote access (SRA) series appliance 7.5, to enable and increase productivity of the mobile workforce without compromising security.
Enforce Mobile Security while Keeping Users Productive
The new release of Dell’s secure mobile access solution ensures that only authorized users and devices meeting security policy are granted network access, and that an organization’s data in-flight and at rest on the device is secure. With SonicWALL Mobile Connect and the SonicWALL secure remote access appliance, the solution:
- Enables administrators to configure and enforce security policies that provide context-aware authentication. Mobile devices are interrogated for essential security information such as jailbreak or root status, device ID, certificate status, and OS versions prior to granting access. Devices that don’t meet policy requirements are not allowed network access and the user is notified of non-compliance, greatly reducing the chances of malware entering the network from non-IT managed devices
- Enables organizations to deliver policy-enforced SSL VPN access to allowed applications and resources from a multitude of device platforms including iOS, Mac OSX, Android, Kindle Fire, and Windows
- Protects company data at rest on mobile devices. Authenticated users can securely browse and view allowed intranet file shares and files in the app, while administrators can establish and enforce mobile application management policies to control whether files viewed can be opened in other apps, copied to the clipboard, printed, or cached securely within the Mobile Connect app. This allows administrators to isolate business data from personal data stored on the device and reduces the risk of data loss. In addition, if the user’s credentials are revoked, content stored in the Mobile Connect app is locked and can no longer be accessed or viewed
- Secure remote access series management console consolidates network access control of all web resources, file shares and client-server resources into a single location, with central administration and a single rule set for all resources and access methods
- Secure remote access offers web portal access for RDP and VNC that leverages HTML5, allowing devices, including tablets and smartphones, access to RDP or VNC systems through a standard web browser
- Dell SRA series appliances are available through the channel and Dell sales. The Mobile Connect app is available for free download from the Apple Store, Google Play, the Kindle Store, and embedded with Windows 8.1 tablets and laptops. Mobile Connect for MacOSX will be available in Spring 2014.
Patrick Sweeney, executive director, product management, for Dell Security Products
“In today’s mobile workplace, it is vitally important to enable remote and mobile employees to maintain their productivity without compromising network security. The co-mingling of business and personal applications and data on mobile devices presents an even greater challenge to IT when it comes to providing users with mobile access to everything they need to do their jobs, but still protecting corporate data - in-flight, at rest on the device, and on the network - from the multitude of threats posed by mobile devices. The Dell SonicWALL secure mobile access solution provides best-in-class, context-aware authentication for both personal and company-owned devices to protect corporate networks and data from mobile threats. Our converged secure access gateway establishes and enforces granular access control policies for network resources, and further, provides mobile application management policies for our Mobile Connect app to enable secure intranet file browse and caching that protects the data.”
- Twitter: http://www.twitter.com/dellsecurity
- Facebook: http://www.facebook.com/dellsoftware
- LinkedIn: http://www.linkedin.com/groups/Dell-Software-4793472
Delivering Connected Security
Dell Connected Security gives organizations the power to solve their biggest security and compliance challenges today, while helping them better prepare for tomorrow. From the endpoint to the data center to the cloud, Dell helps mitigate risks to enable the business.
Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.
Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.
NuoDB just introduced the Swifts 2.1 Release. In this demo at 15th Cloud Expo, Seth Proctor, CTO of NuoDB, Inc., discussed why scaling databases in the cloud is challenging, why building your application on top of the infrastructure that is designed with this in mind makes a difference, and what you can do with NuoDB that simplifies your programming model, your operations model.
Feb. 1, 2015 10:15 AM EST Reads: 1,706
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
Feb. 1, 2015 10:15 AM EST Reads: 2,102
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps,...
Feb. 1, 2015 10:00 AM EST Reads: 3,310
“The year of the cloud – we have no idea when it's really happening but we think it's happening now. For those technology providers like Zentera that are helping enterprises move to the cloud - it's been fun to watch," noted Mike Loftus, VP Product Management and Marketing at Zentera Systems, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 10:00 AM EST Reads: 2,470
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. Acco...
Feb. 1, 2015 10:00 AM EST Reads: 3,308
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session a...
Feb. 1, 2015 10:00 AM EST Reads: 2,566
“We are a managed services company. We have taken the key aspects of the cloud and the purposed data center and merged the two together and launched the Purposed Cloud about 18–24 months ago," explained Chetan Patwardhan, CEO of Stratogent, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 10:00 AM EST Reads: 2,148
"For over 25 years we have been working with a lot of enterprise customers and we have seen how companies create applications. And now that we have moved to cloud computing, mobile, social and the Internet of Things, we see that the market needs a new way of creating applications," stated Jesse Shiah, CEO, President and Co-Founder of AgilePoint Inc., in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 09:30 AM EST Reads: 2,472
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 09:00 AM EST Reads: 2,870
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
Feb. 1, 2015 09:00 AM EST Reads: 2,963
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, ...
Feb. 1, 2015 09:00 AM EST Reads: 3,013
"Application monitoring and intelligence can smooth the path in a DevOps environment. In a DevOps environment you see constant change. If you are trying to monitor things in a constantly changing environment, you're going to spend a lot of your job fixing your monitoring," explained Todd Rader, Solutions Architect at AppDynamics, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 09:00 AM EST Reads: 2,979
"Desktop as a Service is emerging as a very big trend. One of the big influencers of this – for Esri – is that we have a large user base that uses virtualization and they are looking at Desktop as a Service right now," explained John Meza, Product Engineer at Esri, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 09:00 AM EST Reads: 2,475
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
Feb. 1, 2015 09:00 AM EST Reads: 2,714
“We are strong believers in the DevOps movement and our staff has been doing DevOps for large enterprise environments for a number of years. The solution that we build is intended to allow DevOps teams to do security at the speed of DevOps," explained Justin Lundy, Founder & CTO of Evident.io, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Feb. 1, 2015 09:00 AM EST Reads: 2,362