Welcome!

@BigDataExpo Authors: Elizabeth White, Liz McMillan, Roger Strukhoff, Pat Romanski, Harry Trott

News Feed Item

OpenPeak Unveils Security Enhancements to SECTOR™ App Wrapping Technology at CES

OpenPeak Inc., a leading provider of mobile device and application management solutions for enterprises, today announced enhancements to its SECTOR app wrapping technology, which now enhances mobile apps with support for per-app VPNs and three-factor authentication, including PIN, smart card and biometric technologies. Newly integrated with Precise Biometrics’ Tactivo, a smart card and fingerprint sensor designed for the iPhone and iPad, OpenPeak’s ADAM solution enables enterprises to enhance a secure, trusted workspace with unprecedented, multi-factor authentication and security features.

An organization can now set a policy to enforce the use of any or all of PIN, smart card, and fingerprint scan for accessing apps on mobile devices. Alternatively, fingerprint swipe sign-on can be conveniently used in lieu of PIN-based access to secure applications. The organization may also enforce the use of the industry standard IPsec VPN on a per-app basis.

Government organizations are now able to leverage these new features for enabling their Common Access Card (CAC) or Personal Identity Verification (PIV) cards to extend secured applications and data to mobile employees, government officials, law enforcement, and military personnel.

OpenPeak makes it possible for enterprises to integrate all necessary components of mobile security and management into a single, secure and unified solution, complete with a flexible and easy-to-use management portal. By defining policies via the administration portal of OpenPeak’s ADAM solution, administrators can choose to enforce OpenPeak’s full three-factor authentication or select a combination that works best for their specific security needs. OpenPeak’s VPN and three-factor authentication process are both fully automatic, requiring zero modifications by developers to the app’s source code.

OpenPeak’s VPN support adds a policy-driven, dynamically configurable app-level IPsec VPN, allowing wrapped apps to protect data in motion. IPsec is an industry standard suite of protocols for providing authenticated and secure communication over IP networks. Wrapped applications can work with leading VPN concentrators.

Debuting at the International Consumer Electronic Show (CES), OpenPeak’s VPN and three-factor authentication features support enterprises’ need for improved security in today’s increasingly mobile and independent workplace. In the world of BYOD mobility, enterprises must be able to easily secure and track ever increasing numbers of applications and content on a myriad of different devices and operating platforms.

“Thanks to the increased use of mobile devices, apps and content, we have a much more productive workforce than we did a decade ago – but with increased productivity comes the need for increased security and innovations in authentication,” said Jonathan Fischer, mobile security expert and OpenPeak’s Vice President of Global Technical Sales. “It’s time to look beyond just devices, and look towards the apps that run on those devices and the corporate data that is being accessed and moved around between those apps and backend data sources. We are eager to continually offer the most trusted, multi-pronged approach to security for enterprises.”

Every wrapped application on the OpenPeak platform will now be enhanced with support for three-factor authentication, making it easy for IT administrators to control sharing of sensitive data between applications on the same device and heighten security that spans individual applications.

Precise Biometrics' CTO, Michael Harris, says, "OpenPeak is addressing a growing concern for business and government alike; how to protect enterprise data and networks as employees become more mobile. In choosing Tactivo, OpenPeak is able to provide its customers strong authentication options on the iPhone and iPad, in a way that is easy and convenient to use."

These capabilities extend the comprehensive set of security controls that ADAM makes available to mobile apps, which include password control, per-app execution authorization policies, data at rest protection with per-app encryption keys, and controlled sharing of data between secure and non-secure apps.

To arrange for a private demonstration of OpenPeak’s three-factor authentication and security features during CES, contact Heather Kelly at [email protected].

About OpenPeak

OpenPeak Inc. is a leading mobility technology provider. OpenPeak designs end-to-end managed systems and solutions that enable Enterprises, SMBs and Education, Healthcare and service providers to provision and manage their customer’s mobile devices and applications remotely. ADAM™, OpenPeak’s advanced device and application management suite, is comprised of several components including SANCTION, SECTOR and OPENSHOP. Each component can be deployed individually to complement pre-existing device and network management configurations, or together as a complete end-to-end Device, Application and Profile Management solution. For more information, visit www.openpeak.com.

About Precise Biometrics

Precise Biometrics is a market-leading provider of solutions for fingerprint recognition to prove people's identities. With top-of-the-line expertise in fingerprint verification, Precise Biometrics offers fast, accurate and secure authentication of a person. The technology adds value to ID, enterprise and bank cards as well as access to mobile solutions (smart phones and tablets), computers and networks. Precise Biometrics serves business and government organizations throughout the world and its technology is licensed to close to 160 million users. For more information, please visit www.precisebiometrics.com and www.idApps.com.

OpenPeak, SANCTION, SECTOR, OPENSHOP and ADAM are trademarks of OpenPeak Inc.

TACTIVO is a registered trademark of Precise Biometrics AB.

Other trade brands, names, and marks used in this document are the property of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@BigDataExpo Stories
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
University of Colorado Athletics has selected FORTRUST, Colorado’s only Tier III Gold certified data center, as their official data center and colocation services provider, FORTRUST announced today. A nationally recognized and prominent collegiate athletics program, CU provides a high quality and comprehensive student-athlete experience. The program sponsors 17 varsity teams and in their history, the Colorado Buffaloes have collected an impressive 28 national championships. Maintaining uptime...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change t...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, discussed how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He also discussed how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors ...
The initial debate is over: Any enterprise with a serious commitment to IT is migrating to the cloud. But things are not so simple. There is a complex mix of on-premises, colocated, and public-cloud deployments. In this power panel at 18th Cloud Expo, moderated by Conference Chair Roger Strukhoff, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Commvault; Dave Landa, Chief Operating Officer at kintone; William Morrish, General Manager Product Sales at Interou...
"SpeedyCloud's specialty lies in providing cloud services - we provide IaaS for Internet and enterprises companies," explained Hao Yu, CEO and co-founder of SpeedyCloud, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.