Welcome!

@BigDataExpo Authors: Carmen Gonzalez, ManageEngine IT Matters, Pat Romanski, Elizabeth White, Liz McMillan

News Feed Item

Armor5 Raises $2M for World's First "Zero Touch" BYOD Security Service

Trinity Ventures Leads Funding in Cloud Startup Whose Service Lets Mobile Workers Access Enterprise Apps and Data Without Content Ever Residing on Their Mobile Devices

SANTA CLARA, CA -- (Marketwire) -- 02/27/13 -- Armor5 emerged from stealth mode today and announced $2 million in seed funding from Citrix Startup Accelerator, Nexus Venture Partners and Trinity Ventures, to redefine data security and compliance for the mobile enterprise. Founded by security, mobility and cloud computing experts from Adobe, Motorola and Yahoo, Armor5 is the first zero touch service to safeguard intranet, cloud data and applications by ensuring content from these systems never actually resides on the end-users' devices. A beta version of the Armor5 service is available on its website today.

How Armor5 works

Most BYOD security services focus on individual mobile device management. As the use of these devices grows dramatically, new approaches are required to help IT balance the needs between user productivity vs. maintaining security and compliance. According to Osterman Research, annual IT costs for managing smartphones rose 48% from 2011 to 2012. Armor5 has taken an entirely different approach to solving the BYOD security problem. Its service connects to a company's network via VPN, virtualizes intranet data and cloud applications, and generates a secure URL that mobile workers can use to access content and applications safely from any device -- personal or company issued. The entire provisioning process, from IT sign-up to end-user productivity, takes just a few minutes.

"Our vision is to create a completely self-service, cloud-based answer to the security problems posed by today's explosive growth in enterprise mobility," said Suresh Balasubramanian, CEO at Armor5. "We solve immediate pain in the areas of mobility, network security and regulatory compliance. And we do so in a way that provides end-users immediate access to the apps, data and content they need from any device they're using, without sacrificing data security."

"Zero touch" deployment

In launching its service, Armor5 is introducing a radically simple concept it calls "zero touch" BYOD security. Simply, Armor5 can be deployed without mobile client software installation; without mobile security agents; without any configuration on the part of IT; and without intranet data or enterprise cloud applications ever downloaded to the end-user device. "Zero touch means faster time to deployment, better security and compliance, improved mobile user productivity, and a substantially lower cost for BYOD security," commented Balasubramanian.

For additional security, Armor5 offers dynamic watermarking and the disabling of downloading, forwarding and printing of documents. Using the cloud-based Armor5 dashboard, IT can easily monitor and manage end-users, devices and documents, and ensure BYOD policies and compliance standards are being met while providing analytics to speed auditing and reporting.

Industry support

"We have been evaluating the Armor5 solution for our data security and compliance needs," said Keith Phillips, Chief Information Officer, CPP, Inc. "We have been impressed by the simplicity, elegance and ease of setup and use of this novel, 100% cloud-based solution, requiring no agents to install on any device. Their dashboard gives us exposure to detailed activity information that has the potential to evolve into an integral part of our compliance and risk management strategy," said Phillips.

"IT must manage compliance in an increasingly BYOD world, without negatively impacting the user experience," said Michael Osterman, principal and founder at Osterman Research. "Armor5's unique and interesting approach accomplishes both and should be seriously considered by anyone struggling with BYOD in their organization."

"CIOs are understandably concerned with data security given the rise of smartphones, tablets and other mobile devices inside their organizations," said Fred Wang, general partner at Trinity Ventures. "Armor5 is the first vendor to address the BYOD security problem without requiring software installation on the mobile device. Its singular focus on the intersection of data security and BYOD, and its unique approach to solving the problem, is the reason we are investing."

"Corporate asset management, compliance and enterprise security are critical concern areas as the global workforce becomes more flexible and mobile," said Naren Gupta, co-founder and managing director at Nexus Venture Partners. "We are excited about Armor5's innovative approach to address these opportunities simply and seamlessly."

"Armor5 has tremendous potential to complement Citrix technologies in addressing BYOD challenges," said Dr. Michael Harries, Senior Director and Chief Technologist at the Citrix Startup Accelerator, which has incubated Armor5. "The service is ideal for CIOs who need an immediate solution to enterprise data security and compliance challenges with the growth of BYOD."

About Armor5
Armor5, Inc. is a cloud service provider that's solving the problem of secure mobile access to enterprise data and applications in a new way. The company serves enterprises, cloud solution providers and any organization struggling to secure network access for mobile users. Armor5 offers the only zero touch, 100% cloud service that accesses a client's network, virtualizes enterprise data and applications, and provisions secure and compliant access for every end user using any mobile device. Founded in 2011 by former executives from Adobe, Motorola and Yahoo, the company is privately held with patent-pending technology and investment from leading venture capital firms. For more information, visit www.Armor5.com.

Media contact
Kevin Wolf
TGPR
(650) 327-1641
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@BigDataExpo Stories
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “Desktop-as-a-Service Buyer’s Guide, 2016,” which provides a comprehensive comparison of DaaS providers, including CloudJumper, Amazon, VMware, and Microsoft.
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...