Click here to close now.

Welcome!

Big Data Journal Authors: Pat Romanski, Ken Fogel, Liz McMillan, Elizabeth White, Carmen Gonzalez

News Feed Item

OpenPeak Unveils Security Enhancements to SECTOR™ App Wrapping Technology at CES

OpenPeak Inc., a leading provider of mobile device and application management solutions for enterprises, today announced enhancements to its SECTOR app wrapping technology, which now enhances mobile apps with support for per-app VPNs and three-factor authentication, including PIN, smart card and biometric technologies. Newly integrated with Precise Biometrics’ Tactivo, a smart card and fingerprint sensor designed for the iPhone and iPad, OpenPeak’s ADAM solution enables enterprises to enhance a secure, trusted workspace with unprecedented, multi-factor authentication and security features.

An organization can now set a policy to enforce the use of any or all of PIN, smart card, and fingerprint scan for accessing apps on mobile devices. Alternatively, fingerprint swipe sign-on can be conveniently used in lieu of PIN-based access to secure applications. The organization may also enforce the use of the industry standard IPsec VPN on a per-app basis.

Government organizations are now able to leverage these new features for enabling their Common Access Card (CAC) or Personal Identity Verification (PIV) cards to extend secured applications and data to mobile employees, government officials, law enforcement, and military personnel.

OpenPeak makes it possible for enterprises to integrate all necessary components of mobile security and management into a single, secure and unified solution, complete with a flexible and easy-to-use management portal. By defining policies via the administration portal of OpenPeak’s ADAM solution, administrators can choose to enforce OpenPeak’s full three-factor authentication or select a combination that works best for their specific security needs. OpenPeak’s VPN and three-factor authentication process are both fully automatic, requiring zero modifications by developers to the app’s source code.

OpenPeak’s VPN support adds a policy-driven, dynamically configurable app-level IPsec VPN, allowing wrapped apps to protect data in motion. IPsec is an industry standard suite of protocols for providing authenticated and secure communication over IP networks. Wrapped applications can work with leading VPN concentrators.

Debuting at the International Consumer Electronic Show (CES), OpenPeak’s VPN and three-factor authentication features support enterprises’ need for improved security in today’s increasingly mobile and independent workplace. In the world of BYOD mobility, enterprises must be able to easily secure and track ever increasing numbers of applications and content on a myriad of different devices and operating platforms.

“Thanks to the increased use of mobile devices, apps and content, we have a much more productive workforce than we did a decade ago – but with increased productivity comes the need for increased security and innovations in authentication,” said Jonathan Fischer, mobile security expert and OpenPeak’s Vice President of Global Technical Sales. “It’s time to look beyond just devices, and look towards the apps that run on those devices and the corporate data that is being accessed and moved around between those apps and backend data sources. We are eager to continually offer the most trusted, multi-pronged approach to security for enterprises.”

Every wrapped application on the OpenPeak platform will now be enhanced with support for three-factor authentication, making it easy for IT administrators to control sharing of sensitive data between applications on the same device and heighten security that spans individual applications.

Precise Biometrics' CTO, Michael Harris, says, "OpenPeak is addressing a growing concern for business and government alike; how to protect enterprise data and networks as employees become more mobile. In choosing Tactivo, OpenPeak is able to provide its customers strong authentication options on the iPhone and iPad, in a way that is easy and convenient to use."

These capabilities extend the comprehensive set of security controls that ADAM makes available to mobile apps, which include password control, per-app execution authorization policies, data at rest protection with per-app encryption keys, and controlled sharing of data between secure and non-secure apps.

To arrange for a private demonstration of OpenPeak’s three-factor authentication and security features during CES, contact Heather Kelly at [email protected].

About OpenPeak

OpenPeak Inc. is a leading mobility technology provider. OpenPeak designs end-to-end managed systems and solutions that enable Enterprises, SMBs and Education, Healthcare and service providers to provision and manage their customer’s mobile devices and applications remotely. ADAM™, OpenPeak’s advanced device and application management suite, is comprised of several components including SANCTION, SECTOR and OPENSHOP. Each component can be deployed individually to complement pre-existing device and network management configurations, or together as a complete end-to-end Device, Application and Profile Management solution. For more information, visit www.openpeak.com.

About Precise Biometrics

Precise Biometrics is a market-leading provider of solutions for fingerprint recognition to prove people's identities. With top-of-the-line expertise in fingerprint verification, Precise Biometrics offers fast, accurate and secure authentication of a person. The technology adds value to ID, enterprise and bank cards as well as access to mobile solutions (smart phones and tablets), computers and networks. Precise Biometrics serves business and government organizations throughout the world and its technology is licensed to close to 160 million users. For more information, please visit www.precisebiometrics.com and www.idApps.com.

OpenPeak, SANCTION, SECTOR, OPENSHOP and ADAM are trademarks of OpenPeak Inc.

TACTIVO is a registered trademark of Precise Biometrics AB.

Other trade brands, names, and marks used in this document are the property of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@BigDataExpo Stories
One of the biggest impacts of the Internet of Things is and will continue to be on data; specifically data volume, management and usage. Companies are scrambling to adapt to this new and unpredictable data reality with legacy infrastructure that cannot handle the speed and volume of data. In his session at @ThingsExpo, Don DeLoach, CEO and president of Infobright, will discuss how companies need to rethink their data infrastructure to participate in the IoT, including: Data storage: Understand...
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing ...
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
Software Defined Storage provides many benefits for customers including agility, flexibility, faster adoption of new technology and cost effectiveness. However, for IT organizations it can be challenging and complex to build your Enterprise Grade Storage from software. In his session at Cloud Expo, Paul Turner, CMO at Cloudian, looked at the new Original Design Manufacturer (ODM) market and how it is changing the storage world. Now Software Defined Storage companies can build Enterprise grade ...
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. ...
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS soluti...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness,...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
Dale Kim is the Director of Industry Solutions at MapR. His background includes a variety of technical and management roles at information technology companies. While his experience includes work with relational databases, much of his career pertains to non-relational data in the areas of search, content management, and NoSQL, and includes senior roles in technical marketing, sales engineering, and support engineering. Dale holds an MBA from Santa Clara University, and a BA in Computer Science f...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
FedRAMP is mandatory for government cloud deployments and businesses need to comply in order to provide services for federal engagements. In his session at 16th Cloud Expo, Abel Sussman, Director for Coalfire Public Sector practice, will review the Federal Risk and Authorization Management Program (FedRAMP) process and provide advice on overcoming common compliance obstacles.
The cloud is now a fact of life but generating recurring revenues that are driven by solutions and services on a consumption model have been hard to implement, until now. In their session at 16th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, will discuss how a top European telco has leveraged the innovative recurring revenue generating capability of the consumption cloud to enable a unique cloud monetization mod...
As organizations shift toward IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection &E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 16th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships, will disc...
Are your applications getting in the way of your business strategy? It’s time to rethink your IT approach. In his session at 16th Cloud Expo, Madhukar Kumar, Vice President, Product Management at Liaison Technologies, will discuss a new data-centric approach to IT that allows your data, not applications, to inform business strategy. By moving away from an application-centric IT model where data integration and analysis are subservient to the constraints of applications, your organization will b...
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed...
Analytics is the foundation of smart data and now, with the ability to run Hadoop directly on smart storage systems like Cloudian HyperStore, enterprises will gain huge business advantages in terms of scalability, efficiency and cost savings as they move closer to realizing the potential of the Internet of Things. In his session at 16th Cloud Expo, Paul Turner, technology evangelist and CMO at Cloudian, Inc., will discuss the revolutionary notion that the storage world is transitioning from me...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance...