Welcome!

@BigDataExpo Authors: Carmen Gonzalez, ManageEngine IT Matters, Pat Romanski, Elizabeth White, Liz McMillan

News Feed Item

OpenPeak Unveils Security Enhancements to SECTOR™ App Wrapping Technology at CES

OpenPeak Inc., a leading provider of mobile device and application management solutions for enterprises, today announced enhancements to its SECTOR app wrapping technology, which now enhances mobile apps with support for per-app VPNs and three-factor authentication, including PIN, smart card and biometric technologies. Newly integrated with Precise Biometrics’ Tactivo, a smart card and fingerprint sensor designed for the iPhone and iPad, OpenPeak’s ADAM solution enables enterprises to enhance a secure, trusted workspace with unprecedented, multi-factor authentication and security features.

An organization can now set a policy to enforce the use of any or all of PIN, smart card, and fingerprint scan for accessing apps on mobile devices. Alternatively, fingerprint swipe sign-on can be conveniently used in lieu of PIN-based access to secure applications. The organization may also enforce the use of the industry standard IPsec VPN on a per-app basis.

Government organizations are now able to leverage these new features for enabling their Common Access Card (CAC) or Personal Identity Verification (PIV) cards to extend secured applications and data to mobile employees, government officials, law enforcement, and military personnel.

OpenPeak makes it possible for enterprises to integrate all necessary components of mobile security and management into a single, secure and unified solution, complete with a flexible and easy-to-use management portal. By defining policies via the administration portal of OpenPeak’s ADAM solution, administrators can choose to enforce OpenPeak’s full three-factor authentication or select a combination that works best for their specific security needs. OpenPeak’s VPN and three-factor authentication process are both fully automatic, requiring zero modifications by developers to the app’s source code.

OpenPeak’s VPN support adds a policy-driven, dynamically configurable app-level IPsec VPN, allowing wrapped apps to protect data in motion. IPsec is an industry standard suite of protocols for providing authenticated and secure communication over IP networks. Wrapped applications can work with leading VPN concentrators.

Debuting at the International Consumer Electronic Show (CES), OpenPeak’s VPN and three-factor authentication features support enterprises’ need for improved security in today’s increasingly mobile and independent workplace. In the world of BYOD mobility, enterprises must be able to easily secure and track ever increasing numbers of applications and content on a myriad of different devices and operating platforms.

“Thanks to the increased use of mobile devices, apps and content, we have a much more productive workforce than we did a decade ago – but with increased productivity comes the need for increased security and innovations in authentication,” said Jonathan Fischer, mobile security expert and OpenPeak’s Vice President of Global Technical Sales. “It’s time to look beyond just devices, and look towards the apps that run on those devices and the corporate data that is being accessed and moved around between those apps and backend data sources. We are eager to continually offer the most trusted, multi-pronged approach to security for enterprises.”

Every wrapped application on the OpenPeak platform will now be enhanced with support for three-factor authentication, making it easy for IT administrators to control sharing of sensitive data between applications on the same device and heighten security that spans individual applications.

Precise Biometrics' CTO, Michael Harris, says, "OpenPeak is addressing a growing concern for business and government alike; how to protect enterprise data and networks as employees become more mobile. In choosing Tactivo, OpenPeak is able to provide its customers strong authentication options on the iPhone and iPad, in a way that is easy and convenient to use."

These capabilities extend the comprehensive set of security controls that ADAM makes available to mobile apps, which include password control, per-app execution authorization policies, data at rest protection with per-app encryption keys, and controlled sharing of data between secure and non-secure apps.

To arrange for a private demonstration of OpenPeak’s three-factor authentication and security features during CES, contact Heather Kelly at [email protected].

About OpenPeak

OpenPeak Inc. is a leading mobility technology provider. OpenPeak designs end-to-end managed systems and solutions that enable Enterprises, SMBs and Education, Healthcare and service providers to provision and manage their customer’s mobile devices and applications remotely. ADAM™, OpenPeak’s advanced device and application management suite, is comprised of several components including SANCTION, SECTOR and OPENSHOP. Each component can be deployed individually to complement pre-existing device and network management configurations, or together as a complete end-to-end Device, Application and Profile Management solution. For more information, visit www.openpeak.com.

About Precise Biometrics

Precise Biometrics is a market-leading provider of solutions for fingerprint recognition to prove people's identities. With top-of-the-line expertise in fingerprint verification, Precise Biometrics offers fast, accurate and secure authentication of a person. The technology adds value to ID, enterprise and bank cards as well as access to mobile solutions (smart phones and tablets), computers and networks. Precise Biometrics serves business and government organizations throughout the world and its technology is licensed to close to 160 million users. For more information, please visit www.precisebiometrics.com and www.idApps.com.

OpenPeak, SANCTION, SECTOR, OPENSHOP and ADAM are trademarks of OpenPeak Inc.

TACTIVO is a registered trademark of Precise Biometrics AB.

Other trade brands, names, and marks used in this document are the property of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@BigDataExpo Stories
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “Desktop-as-a-Service Buyer’s Guide, 2016,” which provides a comprehensive comparison of DaaS providers, including CloudJumper, Amazon, VMware, and Microsoft.
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...