MDM
Cieszyn, South Africa
MDM
Cieszyn, South Africa

Time filter

Source Type

News Article | March 1, 2017
Site: www.techrepublic.com

I wrote about 10 ways to reduce insider BYOD threats last week, which focused on some security tips to help IT professionals and users get the most out of BYOD deployments. There is a wealth of deeper information within what constitutes a forest representing the nuances of good security, since often there are no absolutes. Speaking of absolute, I spoke about the concepts of BYOD security with Richard Henderson, Global Security Strategist at Absolute, a software security organization, in order to get a more detailed look at the trees in the overall forest. TechRepublic: What are the biggest threats from BYOD? Richard Henderson: "It's up to the CIO/CISO to determine how risky it is to allow non-corporate devices on the network and what measures can be put in place to control that risk. While government agencies and some large enterprises dealing with sensitive, compartmentalized, or classified information have very stringent requirements, your typical office's BYOD policies can sometimes be far too relaxed. This lenient attitude can create an unprotected entrance to the corporate network via mobile devices. Outdated devices pose another serious threat for BYOD. A recent report found that 60% of mobile devices in an enterprise BYOD environment are running an outdated operating system and are vulnerable to known security flaws where patches have been made available. Requiring employees to run the latest software updates is always difficult to regulate, so companies end up taking on more risk. Of course, there are many devices, typically Android-based, where patches will never be made available due to the age of the device or the abandonment of updates from either the manufacturer or the carrier. It's incredibly difficult to ask employees to continually replace their hardware for a newer device that is currently supported. Organizations' lack of visibility is also a threat, which is further complicated by BYOD. Most companies have very little visibility of the endpoints on their corporate network, and with the explosion of IoT devices everywhere, in many cases are provided with even less long-term support than smartphones, the situation is only going to get worse.For a particularly risk-averse CISO or CSO, BYOD policies just aren't worth the risk." SEE: BYOD (Bring Your Own Device) Policy (Tech Pro Research) TR: Are there any myths or misconceptions about BYOD security? RH: "Privacy is a big area of confusion for BYOD. When employees use their personal devices for work, they expect to still be able to use their phone as they see fit, and without their employer watching. While some mobile security solutions out there prioritize user privacy, employees need to understand that they will need to relinquish a certain measure of control to their employer to ensure that the device and the data accessible through it is protected from theft and loss. BYOD isn't a right, no matter what employees may think." TR: What are your recommendations to mitigate or reduce risk? RH: "A third of cybersecurity incidents can be tied back to attacks on mobile devices, so building policies and programs that specifically address mobile devices (both company-provided and BYOD), as well as removable media, is critical to reducing risk. As a first step, IT teams must deploy a fully fleshed-out and well-planned mobile device management (MDM) or enterprise mobility management (EMM) solution. These solutions help ensure policy compliance among employees, which is very important, but insufficient on its own. In order to protect against mobile cyber-attacks, companies should adopt a mobile threat defense solution. These solutions can detect malicious threats, alert IT teams accordingly, and provide remediation action, like remote-wipe, disconnecting from WiFi, etc. Some more recent developments around machine learning-based appear to have success detecting unknown or never-before seen threats. Beyond that, companies must get buy-in from employees. Hosting regular training sessions that teach employees about the importance of mobile security is key. The sessions should cover why software updates are so important to company security, why public WiFi networks should be avoided, how to identify a phishing attack, and exactly what to do if they suspect something is wrong. Circling back to the initial point on snooping by the enterprise, I think it is one of the most critical pieces of building a successful strategy to communicate clearly to employees that the technology being placed on employee-owned devices is only there to protect corporate data and network assets, and will never be used for snooping or monitoring personal activity... unless an incident has occurred and further investigation is warranted." TR: Are there any problematic apps (or types of apps) which represent more of a BYOD risk than others? RH: "Certainly. Cloud storage apps can lead to issues if allowed to be installed willy nilly, especially with those employees who are entrusted with the most critical of corporate data (HR information, financial data, intellectual property). On top of that, Android users often need to be cognizant of the fact that there are many "free" apps out there that ask for significant permissions... and some of those apps in the past have been shown to collect much more data than they should. It may be essential for security staff to whitelist a subset of approved applications for their most privileged or critical employees." TR: Can you comment on the cost savings involved with BYOD compared to any costs involved with additional security requirements/staff/controls? In other words, is BYOD still cost-effective? RH: "I'm not sure BYOD has ever been as cost effective as it was initially sold to enterprises, and as you suggest, it may be a wash at best. But we have to look beyond the simple bottom line when it comes to BYOD: many companies use BYOD policies as one of many carrots on a stick to attract and retain good talent. If a top recruit wants to use a MacBook instead of a Thinkpad, then at the end of the day the costs are minimal. Add to that the fact that BYOD allows employees to use technologies they are already intimately familiar with, leading to greater job satisfaction and potentially increased productivity, and it becomes difficult to justify an iron-clad, strict device policy." SEE: Report: Your business is wasting money on BYOD reimbursements TR: My wife and I were in NYC recently and she lost her iPhone in Manhattan. We used 'find my iPhone' and it triangulated the iPhone to a specific intersection, but we never could find the phone. I feel since 'find my iPhone' has a degree of plus or minus a few feet in terms of locational accuracy that it may have been picked up and taken inside an apartment building at that intersection. Is there anything you could recommend for a situation like that? RH: "Really, there's not much more you could have done to hopefully retrieve the lost device, other than placing it in lost mode and hoping that someone finds it and returns it to you or the local police (or Apple Store!). Beyond that, my advice to people who ask similar questions is simple - be pragmatic and accept that we live in an era now where phones, tablets, and laptops, while certainly pricey, are reasonably inexpensive enough to replace if the worst happens. With that in mind, it's absolutely critical that you avail yourself of all the tools device manufacturers make available for your protection: remote wiping/locking, full-disk encryption of the device, complex alphanumeric passcodes instead of simple 4 digit PINs, etc. Just ask yourself a simple question: if someone snatched my phone out of my hands and took off with it, would I feel secure that the meaty, juicy data inside the device was free from prying eyes? If the answer is no, then you have to do a little more to change that no to a yes." TR: How does the BYOD landscape look going forward - any new threats, developments, solutions on the horizon? RH: "2016 was the worst year yet for data breaches and leaks, and with the massive explosion of data being created, collected, processed, and shared, I expect 2017 to eclipse 2016. Threats around BYOD will likely play a big role. There are literally millions of devices out there that will never see another security patch again, and those same devices are not going to be replaced anytime soon. When you add to this the mire of IoT, where even the vending machines in the corporate cafeteria are now being subverted and used in attacks, it's obvious to me that the surface area for attackers to exploit has never been larger. I've been talking about the inherent threats surrounding connected devices for quite some time, and 2016 proved that the new world of machine-to-machine attacks are here to stay. Millions of connected devices have been subverted and used to launch DDoS attacks on scales that weren't even conceived of in the past. Major sites are knocked off the internet in a blink, causing e-commerce grinds to come to a halt. Millions of dollars are lost in revenue, clean-up and additional defenses. What's an organization to do when devices inside their networks are exploited and used in attacks elsewhere? It's likely that conservative and risk-averse corporations will declare BYOD off-limits for their teams. But that will mean security teams will need to watch very carefully for rogue or difficult employees will attempt to find ways around security controls in order to get access to Inter- and Intranet resources. It may be a good solution for security teams to work with their network team colleagues and build out dedicated, fully-segmented network blocks with their own security infrastructure to provide the most basic of access to employee-owned devices." Also see: Free ebook: Executive's guide to mobile security Video: Top 5 things to know about BYOD Report: Your business is wasting money on BYOD reimbursements Infographic: BYOD is popular, but not widely supported by IT


SAN FRANCISCO and PALO ALTO, Calif., Feb. 22, 2017 /PRNewswire/ -- Semarchy, the Evolutionary MDM™ firm, and Denodo, the leader in data virtualization software, today announced a strategic partnership to collaborate in marketing, partner and market development, as well as in sales and rese...


News Article | February 15, 2017
Site: www.prweb.com

SyncDog, Inc., the leading ISV for mobile application containerization, today announced it has been named one of the 30 Most Admired Companies of the Year by Insights Success Magazine. The publication finds the most innovative companies and entrepreneurs in order to highlight their experiences, views, and approaches to development in their respective fields, and has featured SyncDog’s advancements in mobile security and app collaboration in its Most Admired Companies of 2016 edition. This acknowledgment is due in part to the subject matter expertise and leadership of CEO Jonas Gyllensvaan, as well as SyncDog’s innovative approach to enterprise mobile collaboration. The SyncDog SentinelSecure™ solution suite protects enterprise networks from the risk of cyber breach inherent in mobile computing sources, and offers a secure infrastructure as a general workspace and also to develop and deploy mobile apps securely. “Mobility is now a given for organizational objectives, but securing enterprise mobile data is often last thought of on the priority list,” said Gyllensvaan. “As cases of cyber intrusion rise, organizations must take the appropriate steps to secure their networks and out to their mobile endpoints.” The SentinelSecure™ containerized workspace provides a secure application platform that encrypts and transports data between the enterprise and secure, “sandboxed” applications running on employees’ and contractors’ mobile devices. The workspace protects client enterprise networks with a secure, partitioned FIPS 140-2 certified* container on both iOS and Android devices, and secures data both at rest and in transit using AES 256-bit encryption. The SentinelSecure™ container has been designed to address four main workflows for users accessing enterprise file stores and applications: Secure Communications, File Management, Secure Internet/Intranet Access, and Secure Location-based Services. A full suite of mobile-enabled productivity applications is available to support these workflows, including SharePoint, Enterprise Chat, Geo-location Services, DropBox, a Personal Information Management (PIM) suite, Office Suite, Office 365, Secure Mobile App Management & Development, File Sync, and many more. A full list of supported applications can be found here. Download the SentinelSecure™ datasheet here. To read the full write-up on SyncDog in Insights Success Magazine, click here. SyncDog has been actively building its partner ecosystem over the last year, securing certified APIs for the option to integrate SentinelSecure™ with a broad network of EMM providers. This flexibility allows customers the choice to deploy SentinelSecure™ as a standalone container or as a complementary layer of security to existing EMM investments. Certified SentinelSecure™ integrations include: SentinelSecure™ also has field integration with most name-brand EMM and MDM solutions. Insights Success is a global business solutions magazine that focuses distinctively on emerging and leading tech companies, their confrontational style of doing business, and their way of delivering effective, collaborative solutions to strengthen market share. It is the top publication for technology and business updates in the enterprise market. Insights Success Magazine talks about leaders from the world of technology, including CEOs, CIOs, VPs, and managers who have set benchmarks in the IT industry. For more information, visit insightssuccess.com. SyncDog is the leading independent software vendor (ISV) for building secure infrastructure frameworks that protect enterprise networks from cyber breach from mobile computing sources. The SentinelSecure™ product line for application containerization and IoT (Internet of Things) module monitoring provides the industry’s most proactive approach to securing enterprise mobile collaboration. The SentinelSecure™ data security solution delivers military-grade (FIPS 140-2 certified,* AES 256-bit) secure mobile device partitions or “containers” that can secure emails/contacts, calendar items, IM apps, Internet browsers, mobile file stores and other business apps provisioned on personal devices to be used in a BYOD or COPE (corporate owned personally enabled) setting. For more information on SyncDog products please visit syncdog.com/solutions


News Article | March 1, 2017
Site: www.marketwired.com

Cortado Corporate Server's new multi-tenant capabilities ensures maximum security with minimal operating costs and administrative effort BERLIN, GERMANY and DENVER, CO--(Marketwired - Mar 1, 2017) -  Cortado Mobile Solutions, manufacturer of the productivity-enhancing enterprise mobility solution Cortado Corporate Server, today announced the release of the multi-tenant version of its software. Service providers can now create secure and separate areas for individual business customers on a single server, while managing all customer accounts through a centralized management console. The multitenancy capability allows service providers to significantly lower hardware costs and increase efficiency and simplicity in managing devices and apps. Without multitenancy, service providers offering mobile device management (MDM) and mobile application management (MAM) to their customers required a separate server for each business customer for security reasons. The consequences were high hardware costs and complicated setup and management of new customers. With the multi-tenant version of Cortado Corporate Server, service providers can create strictly separate areas for multiple business customers on just one server. Each tenant has their own SQL database and connection to Microsoft's Active Directory. "With the new multi-tenant feature, Cortado is meeting the needs of service providers who want to offer their customers enterprise mobility combined with maximum security, minimal operating costs and little administrative effort," said Armin Lungwitz, CIO of Cortado Mobile Solutions. "This feature is also ideal for companies that want to manage individual sites or subsidiaries separately." For more information on the multitenancy feature and a free demo, please visit: https://www.cortado.com/en/tour/multitenancy/ Press information and photos can be found at: https://press.cortado.com Cortado Mobile Solutions GmbH is a wholly owned subsidiary of Cortado Holding AG, and is responsible for all operations relating to the enterprise mobility solution Cortado Corporate Server. The unique enterprise mobility solution offers the perfect balance between security for the organization, easy manageability for the IT department and maximum flexibility for users. The on-premises software includes all the tools required for successful enterprise mobility; mobile device management, mobile application management and mobile content management, and can be fully integrated into the Windows backend. IT administrators continue to work with their known systems, Active Directory groups and Windows privileges, and users can access network drives, SharePoint and intranet pages directly from their mobile devices. Cortado Mobile Solutions follows the philosophy that working natively delivers the highest levels of user acceptance. So Cortado's enterprise mobility solution fully supports native app management and instead of focusing on separate storage when it comes to file sharing, enables a direct connection to the corporate network. The result is a significant increase in productivity for mobile employees, improved collaboration among teams as well as convenient management for the IT department. Cortado's enterprise mobility solution is developed and tested at its headquarters in Berlin, Germany. Also experts in offices in the United States, UK, Australia, Japan, and Brazil, highly qualified consultants at our Berlin location as well as a trained, worldwide network of channel partners provide presence and support to local customers throughout the world.


News Article | February 16, 2017
Site: www.businesswire.com

BATH, England--(BUSINESS WIRE)--SRT Marine Systems plc announces the granting of UK Patent 2489685 for its GeoVS Dynamic-3D virtual reality visualisation technology for use in real time marine domain management and display applications. The patent relates to the unique way that the technology collates and fuses multiple real time sensor data streams (such as AIS, Radar, Tides and Weather) with thematic data from maritime charts and maps and instantly creates a highly accurate real time virtual reality visualisation of the marine domain through which the viewer can freely move and navigate. Dynamic-3D visualisation provides significantly enhanced real time situational awareness and is an important feature embedded within SRT’s range of advanced GeoVS maritime monitoring and surveillance systems for use in VTS, VMS and MDM applications. To learn more about Dynamic-3D virtual reality visualisation technology for maritime and other applications go to www.srt-marine.com Simon Tucker, CEO of SRT Marine Systems plc said: “At the heart of SRT are our in-house developed core technologies that empower our products and systems with exceptional performance and functionality. Our real time Dynamic-3D virtual reality visualisation takes maritime situational awareness to a new level.” SRT develops, manufactures and supplies maritime tracking technology and turn-key system solutions to marine stakeholders across the globe. The Company’s products and solutions are used by individual vessel owners, port authorities, maritime infrastructure owners, coast guards and national security agencies to enhance their maritime domain awareness. Applications include the tracking of commercial and leisure vessels; sustainable fishery; anti-collision; search and rescue; waterway management, port and coast security; pollution management; and environmental management.


Patent
Mdm | Date: 2013-05-16

A mouthpiece includes a first body configured to be secured over one or more teeth of a user. The first body comprises a frame for location about at least one of a molar or a premolar of user, as a first bite pad between upper teeth and lower teeth. The first bite pad is molded in the frame while in situ in the mouth of the user and the first bite pad is formed by a PVS material. The first bite pad is in contact with at least one of a molar or a premolar of user, and the first bite pad defines an exterior shape of at least a portion of the teeth of a user. There is a similar second body with a connector between the first body and the second body and together these form the appliance for the user.


Patent
Mdm | Date: 2014-04-17

A mouthpiece includes first and second bodies over teeth of a user. The bodies comprise frames with a bite pad between upper and lower teeth. The bite pad is molded in the frames while in situ in the mouth. The frames, prior to having the bite pads in place are hollow spaces with spanning elements spaced from each other projecting into the hollow space between a top and a bottom of each of the frames. An upper wall of the frame includes an inwardly directed lip directed towards a space inside the frames. A lower wall of the frame is extended in height relatively longer than the upper wall. A shim or a clip is inserted between the incisor edges for facilitating alignment of the incisor edges. The connector includes a slot for accommodating an extension of the shim when the shim is located with the connector.


Patent
Mdm | Date: 2014-04-18

A mouthpiece includes first and second bodies over teeth of a user. The bodies comprise frames with a bite pad between upper and lower teeth. The bite pad is molded in the frames while in situ in the mouth. The frames, prior to having the bite pads in place are hollow spaces with spanning elements spaced from each other projecting into the hollow space between a top and a bottom of each of the frames. An upper wall of the frame includes an inwardly directed lip directed towards a space inside the frames. A lower wall of the frame is extended in height relatively longer than the upper wall. A shim or a clip is inserted between the incisor edges for facilitating alignment of the incisor edges. The connector includes a slot for accommodating an extension of the shim when the shim is located with the connector.


Patent
Mdm | Date: 2014-09-18

A mouthpiece includes first and second bodies over teeth of a user and connector between the bodies. The bodies comprise frames with a bite pad between upper and lower teeth. The bite pad is molded in the frames while in situ in the mouth. The frames, prior to having the bite pads in place are hollow spaces with spanning elements spaced from each other projecting into the hollow space between a top and a bottom of each of the frames. The material of the bodies and connector employ a durometer selectively between Shore A 40-45, and selectively the amount of material is between 4-6 grams for each of a first base putty and for a second catalyst putty for the making of the guard, in combination with the frame. At least one putty is of a first color and selectively the second putty is a same or different color to the first color, and at least one frame is selectively clear or colored, and at least one of the putties includes a flavoring or is flavorless.


News Article | February 15, 2017
Site: www.prnewswire.co.uk

IPO, de MDM GROUP AG, se celebrará en el segundo trimestre de 2017 y no  a finales de año. La compañía pretende generar un capital novedoso de público en marcha, lo que va a permitir invertir en fondos adicionales en comercio de mercancía. Los inversores privados también podrán beneficiarse de forma sencilla del modelo de negocios de la compañía. Los elevados ingresos se generan dentro del sector de venta al por menor en Alemania cada año. Los márgenes de beneficios brutos son particularmente interesantes para los inversores. A menudo cogen los beneficios en una media de un 30%. MDM GROUP AG realiza operaciones en este sector de mercado. Específicamente, el grupo comercializa de forma mayoritaria dentro del sector de los textiles, restos, artículos especializados y mercancía de procesos de insolvencia. MDM GROUP AG ya ha logrado elevados beneficios dentro de este segmento. En el segmento minorista internacional, los ingresos de la compañía han crecido cerca de un 400% en los dos últimos años. La compañía ya ha logrado beneficios al conseguir compras favorables. Las mercancías, como los textiles, restos, artículos especializados y mercancías de procesos de insolvencia procedentes de numerosos fabricantes destacados, se llevan en condiciones muy favorables. Gracias a los elevados volúmenes de compra se consiguen ahorros de hasta un 90% frente al precio normal al por mayor. Además de los bajos precios de compra de los artículos, en el año 2017 la compañía planifica además la compra de dos marcas textiles destacadas que ampliará su oferta de productos aún más, permitiendo al grupo influir directamente en los precios de mercado. Gracias a su red de distribución única, la compañía ha logrado revender los artículos de compra en un breve periodo de tiempo. En este aspecto, el grupo trabaja de forma conjunta con varios socios de distribución online, pudiendo así seleccionar siempre el canal de marketing más eficaz para los productos. Esto permite a la compañía no solo conseguir un retorno rápido de los artículos, sino también obtener una cantidad máxima de ingresos por las ventas. MDM GROUP compra y vende artículos cada mes, consiguiendo así las cantidades invertidas varias veces. Los beneficios se pueden conseguir con cada transacción. La compañía no recibe inversiones de los préstamos bancarios, sino por medio de los préstamos subordinados. Los inversores privados pueden prestar dinero a la compañía y recibir intereses por su parte. Los intereses son fijos y se acuerdan de forma anticipada, y actualmente alcanzan el 9% según la información de la compañía. Son posibles los intereses de hasta un 20% para los programas especiales.

Loading MDM collaborators
Loading MDM collaborators