SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Bitzer Enterprise Application Mobility (BEAM)
Organizations have restricted employee’s access to corporate network and data from mobile
devices due to concerns of authentication, usability, policy control and data leakage. This
problem is exacerbated by the avalanche of new mobile-device types and BYOD (Bring Your
Own Device) programs. BEAM overcomes the mobile security risk by isolating corporate
access and data from employee’s personal apps on mobile devices and by extending the trust
gained within an internal network out to an employee’s mobile device while ensuring a rich,
seamless user experience.



Bitzer’s Secure Container, equipped with an AppTunnel™, and mobile container
management, not only allows secure access to Intranet sites and corporate
documents but also preserves the compelling user experience of smart mobile
devices. It offers the most integrated solution with Windows® authentication
infrastructure for secure Single Sign-On (SSO) to corporate applications.


Key Capabilities
●● Secure Container
   -- Clear isolation between personal and corporate information
   -- Secure browser for accessing Intranet, SharePoint and other document stores
                                                                                     BITZER VALUE
   -- Encrypted off-line storage (if your security policy allows it)
   -- Secure and easy Microsoft® Office document viewing, editing and storage       •	 BYOD without  compromise
                                                                                       on IT security, standards
●● AppTunnel                                                                           and policies
   -- App level SSL tunnel ONLY from Secure Container
                                                                                    •	 Rich user experience by
   -- Eliminates need for device level VPN and risk of rogue apps                      using employee’s existing
                                                                                       credentials and Single
●● Integrated Windows Authentication                                                   Sign-On (SSO)
   -- Simple, SSO access to Windows enabled sites and applications with
      Kerberos or NTLM                                                              •	 Compared to mobile VPN,
                                                                                       a simpler and more secure
   -- Strong 2-factor authentication supported (virtual smart card)
                                                                                       solution with lower total
●● Mobile container management (MCM)                                                   cost of ownership (TCO)

   -- Enforces policy on Secure Container, not user’s device                        •	 Zero incremental IT
   -- Remote lock/wipe, geo-fence or time-restricted access                            investment to support
   -- Integrated with Active Directory to manage users/groups                          multiple mobile OS’s;
                                                                                       lower overhead cost and
   -- Detailed usage statistics and management reports
                                                                                       higher ROI
●● Cross-platform
   -- Supports iOS, Android®, BlackBerry®, and Windows Phone devices
90%
BEAM Solution Components
        will have a BYOD
●● Secure Container
        program by 2014 (Gartner)
                                                  81%
                                    of users would be
   Ensures security by isolating personal from corporate data and apps. Provides authentication, secure browser
                                    “very frustrated”
   and secure document viewing, editing, and storage. Supports iOS, Android, BlackBerry, and Windows Phone
   devices. Can be deployed throughthey had to enter enterprise app stores.
                                    if consumer or password
                                                  every time they wanted to
●● Admin Control Panel (ACP)                      access Facebook. (Bitzer)
                                                                                                         Bitzer Admin
                                                                                                         Control Panel
                                                                                                                                          Bitzer Secure
                                                                                                                                          Container
   Provides remote management of containers,
                                                                               Enterprise
   logging, policy enforcement, and remote lock/                              Applications    BMAX
                                                                                             Gateway
   wipe. Deployment on-premises or in the cloud.                                              Server



         Competitive Comparison
●● BMAX Gateway
   Offers secure Intranet access from mobile devices
                                   BMAX-SA                             STANDALONE MOBILE VPN
   or smartphones with zero programming, simple secure container
       Certificate	protection      PIN protected inside                None. No PIN protection
   deployment and low overhead cost. Supports SSO authentication via Kerberos or NTLM protocols utilizing
       Rogue App security
   username/password or PIN protected, PKI certificates. personal apps None. All apps on device have access to device level VPN
                                   App Tunnel not accessible by

         Kerberos security                       Device trust with PKINIT                              Risky gateway trust with constrained delegation

         Maintainability
 Competitive Comparison browser
                                                 No duplicate list of target servers                   Maintain duplicate list of all internal servers

   DLP          Secure container, secure
               (Data Leakage Protection)                                                               None
                                            BMAX                                                        Standalone Mobile VPN
         Deployment simplicity                   Install and use in minutes                            Requires specialized network engineer
 Certificate protection                     PIN-protected inside secure container                       None
 Rogue App security                         AppTunnel not accessible by personal apps                   None. All apps on device have access to device-
                                                                                                        level VPN
 Kerberos security                          Device trust with PKINIT                                    Risky gateway trust with constrained delegation
         BMAX Solution Components
 Kerberos Maintenance
                  No duplicate list of target servers                                                   Must maintain duplicate list of all internal servers
 DLP (Data-leakage protection)
       Secure	Container—Enforces virtual smartbrowser
                               Secure container and card authentication, contains secure browser and secure document
                                                                            None
       storage. Supports iOS, Android, Blackberry and Windows Phone devices. specialized network engineer
 Deployment simplicity        Install and use in minutes             Requires

                              Secure Container                           MDM
        Admin	Control	Panel	(ACP)—Provides remote management of containers, logging, policy enforcement, and
        remote lock/wipe. Can be in the PIN, users have direct access to
 Device PIN                   No device cloud or on-premises.            Requires cumbersome device level PIN to access
                                            personal apps                                               any app on device
 Data atBMAX-SA	Gateway—Offers secure intranet access container.
        rest encryption       Provided for all data inside secure from mobile devices or smartphones with zero to
                                                                               None, depends on device manufacturer programming
        and simple deployment.Protected by AES 256 keys derived from user supports Kerberos/X.509 authentication.
                               Pluggable authentication connector              provide
                              credentials that are never stored on the client
 Data in transit encryption                 AppTunnel via SSL                                            None, depends on device Container that is
                                                                                                       Bitzer Admin      Bitzer Secure level VPN
                                           Intranet                                                    Control Panel to rogue apps
                                                                                                         vulnerable           “secure browser”
                                           Applications
 Application authentication                 Windows SSO                                                 None
                                                           Bitzer Mobile
 Remote lock/wipe                           Only lock/wipe data inside container
                                                               Access                                   Lock/wipe user’s entire device
                                                                                                         AppTunnel
                                                             Xcelerator
 Compromised platform detection             Yes               (BMAX)                                    Some vendors, yes
 Rogue App security                         AppTunnel ONLY allows access from secure                    Basically none. Can blacklist apps, but only ones
                                            container                                                   that are known bad and that’s usually too late
 Security perspective                       Lock down container and only corporate access               Lock down the device and manage ALL apps and
                                            and apps                                                    access



                                                  Bitzer Mobile, Inc.         |    440 N. Wolfe Rd.                      |   Sunnyvale, CA 94085
                                                  (866) 603-8392              |    sales@bitzermobile.com                |   www.bitzermobile.com
©2012 Bitzer Mobile, Inc. All rights reserved. Bitzer Mobile, logo, and the “simplifying enterprise mobility” tagline are trademarks of Bitzer Mobile, Inc.
in the United States. All other trademarks are the property of their respective owners.

Weitere ähnliche Inhalte

Was ist angesagt?

Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
 
[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech SupportSamsung Biz Mobile
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Novell
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXSamsung Biz Mobile
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
Intelligent Visitor Management Solution - LobbyTrac
Intelligent Visitor Management Solution - LobbyTracIntelligent Visitor Management Solution - LobbyTrac
Intelligent Visitor Management Solution - LobbyTracpbindia
 
Corp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3versionCorp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3versionrgitre
 

Was ist angesagt? (13)

Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
Knox Customization Sales Deck
Knox Customization Sales DeckKnox Customization Sales Deck
Knox Customization Sales Deck
 
[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support
 
Knox Configure Sales Deck
Knox Configure Sales DeckKnox Configure Sales Deck
Knox Configure Sales Deck
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 
Knox Manage
Knox ManageKnox Manage
Knox Manage
 
Knox Manage Sales Deck
Knox Manage Sales DeckKnox Manage Sales Deck
Knox Manage Sales Deck
 
Moderne device management door middel van cloud
Moderne device management door middel van cloudModerne device management door middel van cloud
Moderne device management door middel van cloud
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Intelligent Visitor Management Solution - LobbyTrac
Intelligent Visitor Management Solution - LobbyTracIntelligent Visitor Management Solution - LobbyTrac
Intelligent Visitor Management Solution - LobbyTrac
 
Corp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3versionCorp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3version
 

Ähnlich wie Beam datasheet final 7 28-12

Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Symantec
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDigicomp Academy AG
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokenskate_holden
 
Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Webroot
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifykate_holden
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADFF5 Networks
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solutionJavier Gonzalez
 
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Block Armour
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsCourtland Smith
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISSATYAVEER PAL
 

Ähnlich wie Beam datasheet final 7 28-12 (20)

Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
Signify Software Tokens
Signify Software TokensSignify Software Tokens
Signify Software Tokens
 
Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.Revolutionary Security. Ultimate Performance. Minimal Management.
Revolutionary Security. Ultimate Performance. Minimal Management.
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
 
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]Secure Web Gateway Ds Lr[1]
Secure Web Gateway Ds Lr[1]
 

Kürzlich hochgeladen

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Kürzlich hochgeladen (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Beam datasheet final 7 28-12

  • 1. Bitzer Enterprise Application Mobility (BEAM) Organizations have restricted employee’s access to corporate network and data from mobile devices due to concerns of authentication, usability, policy control and data leakage. This problem is exacerbated by the avalanche of new mobile-device types and BYOD (Bring Your Own Device) programs. BEAM overcomes the mobile security risk by isolating corporate access and data from employee’s personal apps on mobile devices and by extending the trust gained within an internal network out to an employee’s mobile device while ensuring a rich, seamless user experience. Bitzer’s Secure Container, equipped with an AppTunnel™, and mobile container management, not only allows secure access to Intranet sites and corporate documents but also preserves the compelling user experience of smart mobile devices. It offers the most integrated solution with Windows® authentication infrastructure for secure Single Sign-On (SSO) to corporate applications. Key Capabilities ●● Secure Container -- Clear isolation between personal and corporate information -- Secure browser for accessing Intranet, SharePoint and other document stores BITZER VALUE -- Encrypted off-line storage (if your security policy allows it) -- Secure and easy Microsoft® Office document viewing, editing and storage • BYOD without compromise on IT security, standards ●● AppTunnel and policies -- App level SSL tunnel ONLY from Secure Container • Rich user experience by -- Eliminates need for device level VPN and risk of rogue apps using employee’s existing credentials and Single ●● Integrated Windows Authentication Sign-On (SSO) -- Simple, SSO access to Windows enabled sites and applications with Kerberos or NTLM • Compared to mobile VPN, a simpler and more secure -- Strong 2-factor authentication supported (virtual smart card) solution with lower total ●● Mobile container management (MCM) cost of ownership (TCO) -- Enforces policy on Secure Container, not user’s device • Zero incremental IT -- Remote lock/wipe, geo-fence or time-restricted access investment to support -- Integrated with Active Directory to manage users/groups multiple mobile OS’s; lower overhead cost and -- Detailed usage statistics and management reports higher ROI ●● Cross-platform -- Supports iOS, Android®, BlackBerry®, and Windows Phone devices
  • 2. 90% BEAM Solution Components will have a BYOD ●● Secure Container program by 2014 (Gartner) 81% of users would be Ensures security by isolating personal from corporate data and apps. Provides authentication, secure browser “very frustrated” and secure document viewing, editing, and storage. Supports iOS, Android, BlackBerry, and Windows Phone devices. Can be deployed throughthey had to enter enterprise app stores. if consumer or password every time they wanted to ●● Admin Control Panel (ACP) access Facebook. (Bitzer) Bitzer Admin Control Panel Bitzer Secure Container Provides remote management of containers, Enterprise logging, policy enforcement, and remote lock/ Applications BMAX Gateway wipe. Deployment on-premises or in the cloud. Server Competitive Comparison ●● BMAX Gateway Offers secure Intranet access from mobile devices BMAX-SA STANDALONE MOBILE VPN or smartphones with zero programming, simple secure container Certificate protection PIN protected inside None. No PIN protection deployment and low overhead cost. Supports SSO authentication via Kerberos or NTLM protocols utilizing Rogue App security username/password or PIN protected, PKI certificates. personal apps None. All apps on device have access to device level VPN App Tunnel not accessible by Kerberos security Device trust with PKINIT Risky gateway trust with constrained delegation Maintainability Competitive Comparison browser No duplicate list of target servers Maintain duplicate list of all internal servers DLP Secure container, secure (Data Leakage Protection) None BMAX Standalone Mobile VPN Deployment simplicity Install and use in minutes Requires specialized network engineer Certificate protection PIN-protected inside secure container None Rogue App security AppTunnel not accessible by personal apps None. All apps on device have access to device- level VPN Kerberos security Device trust with PKINIT Risky gateway trust with constrained delegation BMAX Solution Components Kerberos Maintenance No duplicate list of target servers Must maintain duplicate list of all internal servers DLP (Data-leakage protection) Secure Container—Enforces virtual smartbrowser Secure container and card authentication, contains secure browser and secure document None storage. Supports iOS, Android, Blackberry and Windows Phone devices. specialized network engineer Deployment simplicity Install and use in minutes Requires Secure Container MDM Admin Control Panel (ACP)—Provides remote management of containers, logging, policy enforcement, and remote lock/wipe. Can be in the PIN, users have direct access to Device PIN No device cloud or on-premises. Requires cumbersome device level PIN to access personal apps any app on device Data atBMAX-SA Gateway—Offers secure intranet access container. rest encryption Provided for all data inside secure from mobile devices or smartphones with zero to None, depends on device manufacturer programming and simple deployment.Protected by AES 256 keys derived from user supports Kerberos/X.509 authentication. Pluggable authentication connector provide credentials that are never stored on the client Data in transit encryption AppTunnel via SSL None, depends on device Container that is Bitzer Admin Bitzer Secure level VPN Intranet Control Panel to rogue apps vulnerable “secure browser” Applications Application authentication Windows SSO None Bitzer Mobile Remote lock/wipe Only lock/wipe data inside container Access Lock/wipe user’s entire device AppTunnel Xcelerator Compromised platform detection Yes (BMAX) Some vendors, yes Rogue App security AppTunnel ONLY allows access from secure Basically none. Can blacklist apps, but only ones container that are known bad and that’s usually too late Security perspective Lock down container and only corporate access Lock down the device and manage ALL apps and and apps access Bitzer Mobile, Inc. | 440 N. Wolfe Rd. | Sunnyvale, CA 94085 (866) 603-8392 | sales@bitzermobile.com | www.bitzermobile.com ©2012 Bitzer Mobile, Inc. All rights reserved. Bitzer Mobile, logo, and the “simplifying enterprise mobility” tagline are trademarks of Bitzer Mobile, Inc. in the United States. All other trademarks are the property of their respective owners.