Welcome!

@DXWorldExpo Authors: Kevin Jackson, Xenia von Wedel, Liz McMillan, Ed Featherston, Pat Romanski

News Feed Item

OpenPeak Unveils Security Enhancements to SECTOR™ App Wrapping Technology at CES

OpenPeak Inc., a leading provider of mobile device and application management solutions for enterprises, today announced enhancements to its SECTOR app wrapping technology, which now enhances mobile apps with support for per-app VPNs and three-factor authentication, including PIN, smart card and biometric technologies. Newly integrated with Precise Biometrics’ Tactivo, a smart card and fingerprint sensor designed for the iPhone and iPad, OpenPeak’s ADAM solution enables enterprises to enhance a secure, trusted workspace with unprecedented, multi-factor authentication and security features.

An organization can now set a policy to enforce the use of any or all of PIN, smart card, and fingerprint scan for accessing apps on mobile devices. Alternatively, fingerprint swipe sign-on can be conveniently used in lieu of PIN-based access to secure applications. The organization may also enforce the use of the industry standard IPsec VPN on a per-app basis.

Government organizations are now able to leverage these new features for enabling their Common Access Card (CAC) or Personal Identity Verification (PIV) cards to extend secured applications and data to mobile employees, government officials, law enforcement, and military personnel.

OpenPeak makes it possible for enterprises to integrate all necessary components of mobile security and management into a single, secure and unified solution, complete with a flexible and easy-to-use management portal. By defining policies via the administration portal of OpenPeak’s ADAM solution, administrators can choose to enforce OpenPeak’s full three-factor authentication or select a combination that works best for their specific security needs. OpenPeak’s VPN and three-factor authentication process are both fully automatic, requiring zero modifications by developers to the app’s source code.

OpenPeak’s VPN support adds a policy-driven, dynamically configurable app-level IPsec VPN, allowing wrapped apps to protect data in motion. IPsec is an industry standard suite of protocols for providing authenticated and secure communication over IP networks. Wrapped applications can work with leading VPN concentrators.

Debuting at the International Consumer Electronic Show (CES), OpenPeak’s VPN and three-factor authentication features support enterprises’ need for improved security in today’s increasingly mobile and independent workplace. In the world of BYOD mobility, enterprises must be able to easily secure and track ever increasing numbers of applications and content on a myriad of different devices and operating platforms.

“Thanks to the increased use of mobile devices, apps and content, we have a much more productive workforce than we did a decade ago – but with increased productivity comes the need for increased security and innovations in authentication,” said Jonathan Fischer, mobile security expert and OpenPeak’s Vice President of Global Technical Sales. “It’s time to look beyond just devices, and look towards the apps that run on those devices and the corporate data that is being accessed and moved around between those apps and backend data sources. We are eager to continually offer the most trusted, multi-pronged approach to security for enterprises.”

Every wrapped application on the OpenPeak platform will now be enhanced with support for three-factor authentication, making it easy for IT administrators to control sharing of sensitive data between applications on the same device and heighten security that spans individual applications.

Precise Biometrics' CTO, Michael Harris, says, "OpenPeak is addressing a growing concern for business and government alike; how to protect enterprise data and networks as employees become more mobile. In choosing Tactivo, OpenPeak is able to provide its customers strong authentication options on the iPhone and iPad, in a way that is easy and convenient to use."

These capabilities extend the comprehensive set of security controls that ADAM makes available to mobile apps, which include password control, per-app execution authorization policies, data at rest protection with per-app encryption keys, and controlled sharing of data between secure and non-secure apps.

To arrange for a private demonstration of OpenPeak’s three-factor authentication and security features during CES, contact Heather Kelly at [email protected].

About OpenPeak

OpenPeak Inc. is a leading mobility technology provider. OpenPeak designs end-to-end managed systems and solutions that enable Enterprises, SMBs and Education, Healthcare and service providers to provision and manage their customer’s mobile devices and applications remotely. ADAM™, OpenPeak’s advanced device and application management suite, is comprised of several components including SANCTION, SECTOR and OPENSHOP. Each component can be deployed individually to complement pre-existing device and network management configurations, or together as a complete end-to-end Device, Application and Profile Management solution. For more information, visit www.openpeak.com.

About Precise Biometrics

Precise Biometrics is a market-leading provider of solutions for fingerprint recognition to prove people's identities. With top-of-the-line expertise in fingerprint verification, Precise Biometrics offers fast, accurate and secure authentication of a person. The technology adds value to ID, enterprise and bank cards as well as access to mobile solutions (smart phones and tablets), computers and networks. Precise Biometrics serves business and government organizations throughout the world and its technology is licensed to close to 160 million users. For more information, please visit www.precisebiometrics.com and www.idApps.com.

OpenPeak, SANCTION, SECTOR, OPENSHOP and ADAM are trademarks of OpenPeak Inc.

TACTIVO is a registered trademark of Precise Biometrics AB.

Other trade brands, names, and marks used in this document are the property of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@BigDataExpo Stories
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, discussed the b...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
The cloud era has reached the stage where it is no longer a question of whether a company should migrate, but when. Enterprises have embraced the outsourcing of where their various applications are stored and who manages them, saving significant investment along the way. Plus, the cloud has become a defining competitive edge. Companies that fail to successfully adapt risk failure. The media, of course, continues to extol the virtues of the cloud, including how easy it is to get there. Migrating...
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in order to protect your data and privacy, IoT applications need to embrace Blockchain technology for a new level of product security never before seen - or needed.
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Nordstrom is transforming the way that they do business and the cloud is the key to enabling speed and hyper personalized customer experiences. In his session at 21st Cloud Expo, Ken Schow, VP of Engineering at Nordstrom, discussed some of the key learnings and common pitfalls of large enterprises moving to the cloud. This includes strategies around choosing a cloud provider(s), architecture, and lessons learned. In addition, he covered some of the best practices for structured team migration an...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
No hype cycles or predictions of a gazillion things here. IoT is here. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, an Associate Partner of Analytics, IoT & Cybersecurity at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He also discussed the evaluation of communication standards and IoT messaging protocols, data...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
Sanjeev Sharma Joins June 5-7, 2018 @DevOpsSummit at @Cloud Expo New York Faculty. Sanjeev Sharma is an internationally known DevOps and Cloud Transformation thought leader, technology executive, and author. Sanjeev's industry experience includes tenures as CTO, Technical Sales leader, and Cloud Architect leader. As an IBM Distinguished Engineer, Sanjeev is recognized at the highest levels of IBM's core of technical leaders.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busine...
It’s conference season and, as you might expect, Jason and I have been on the road covering a bunch of them. It’s always great to see what the disruptive players in the market are doing — and this year did not disappoint. But there is one thing that repeatedly happens that just gets under my skin: transformation-washing. As Jason explained in a Forbes article over a year ago, ‘washing’ is when a vendor (or pundit) applies a buzzword loosely in an overt attempt to attach themselves to its buzz. ...
As many know, the first generation of Cloud Management Platform (CMP) solutions were designed for managing virtual infrastructure (IaaS) and traditional applications. But that's no longer enough to satisfy evolving and complex business requirements. In his session at 21st Cloud Expo, Scott Davis, Embotics CTO, explored how next-generation CMPs ensure organizations can manage cloud-native and microservice-based application architectures, while also facilitating agile DevOps methodology. He expla...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It’s clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Tha...
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX Foundry is unifying the community around a common IoT edge framework and an ecosystem of interoperable components.