0

Tech Companies Step Up to Security Challenge

Businesses have been continually challenged by the security sector to improve their data handling and IT management practices. There are so many exploitable vulnerabilities in the old systems – some from the 1990’s – that these businesses use, and they need to implement new tools to tackle cybercriminal threats. In an effort to encourage businesses to be equipped with systems that are up to the task, tech companies are working on improvements to their security offerings. Three of them are in the spotlight here for bringing awesome mobile security technology updates to the table, as reported by TechTarget.

Pulse Secure’s Pulse One

Pulse One actually came out about six months ago, but will be available in July with its full range of capabilities to all who are using Pulse Workspace. It is a new data access interface that allows the management of security policies from one place. This interface is for their virtual private network (VPN), network access control and enterprise mobility management (EMM). This will certainly make it more attractive for businesses since it will be easier for IT teams to make sure that their systems are secure. Pulse One takes care of all the data access security at all endpoints for the different applications that businesses have. This includes all the physical databases that are spread out in separate locations and also all the cloud storage systems used by the business.

When Junos Pulse and MobileSpaces merged to create Pulse Secure, the team decided that it was the perfect opportunity to get all their systems organized. The resulting Pulse One is a unified dashboard for all security systems where management staff can monitor security alerts, do system health assessments, and check on reporting from users, apps and devices in an integrated system. Just the added control that Pulse One provides is sure to help businesses be more active in evaluating and responding to security threats. And the company has plans of building on Pulse One by issuing APIs to expand its functionality. They are aiming to develop VPN technology for mobile clients so that they can provide better client security than is available now.

Good Technology’s Good Dynamics Secure Mobility Platform

Good Technology, Incorporated launched their Good Dynamics Secure Mobility Platform this month, on trial basis. It is slated for official launch sometime around August this year. This platform is also for enterprise mobile security, but focuses on the Android operating system. It is not available for Apple because they are still very secretive about their operating system. New Android apps and devices on Lollipop 5.0 and later can now be secured with the Trusted Execution Environment (TEE). Users with EMM can also benefit from secure key storage on some new Android devices. This makes it easier because long user passwords are no longer needed, and two-factor authentication can be used to boost security further. The Good platform will use ARM’s TrustZone, as does Samsung KNOX, to enable the TEE to provide security for selected trusted apps.

TEE separates apps that need to be secured from others on a device. This makes it an essential technology for businesses that issue devices to their employees or that allow BYOD. Much of the security headache that businesses face stems from the use of personal devices for business and vice versa. Personal use is equated with security breaches because many of the apps that employees use and the websites that they visit tend to invite a slew of malware into business systems. Using TEE will keep access to business apps secure so that even unclean devices cannot cause infections. It also prevents users from adding any kind of code that they want to the device, which prevents unauthorized actions.

Centrify’s Centrify Privilege Service

The Centrify Privilege Service is the new Identity Access Management tool from Centrify, coming out this month. It was developed to help businesses with mobile security in the cloud. The Centrify Privilege Service tackles data access and visibility, and privileged account access control. It works with the Centrify Server Suite, adding an easy password management system to shared accounts for infrastructure, network devices and servers. This makes network access security monitoring for physical and cloud databases easy for businesses to maintain. IAM is not a favorite yet among IT managers, but it will soon be when they realize how it simplifies access management, making it very hard to make mistakes that compromise user and data security.

VN:F [1.9.22_1171]
Rating: 0.0/10 (0 votes cast)
Filed in: News & Updates

Get Updates

Share This Post

Recent Posts

Leave a Reply

Submit Comment

© 2431 VPNServiceYes.com' Blog. All rights reserved.
WordPress theme designed by VPNServiceYes.