Today, your enterprise is asking you, “How can we securely provide remote data access to our employees on their mobile devices?”
We know you have questions
The market offers many solutions, but do any of them solve my problem completely? Must I add device management that my users will hate? I’m not sure I have the time to figure out how to create native apps for multiple platforms. Will any of these solutions support my internal SSO authentication infrastructure?
Bitzer has the answers
We provide a single mobile remote-access solution that addresses integration with existing application servers and policy directories and also provides app management and native multiplatform support.
If you are deploying Kerberos SSO internally, we offer the only solution on the market that implements Kerberos without the use of risky constrained delegation. Read our authentication white paper for more information about the BEAM solution.
Bitzer addresses four key areas of concern:
- Secure Kerberos with PKINIT
- Virtual smart-card technology
- SSL based AppTunnel
- Remote lock/wipe
- AES-256 encryption
- Data-leakage protection
- Enforce authorization policy
- Visibility of users and devices
- Provision & de-provision access
Apps & Application access
- Secure existing mobile apps
- Secure access to intranet and internal sites on secure browser
- SharePoint access
- Force all links and attachments in email to be opened inside secure container after proper authentication
Bitzer’s solution provides key features available from no other provider. A secure container provides data-leakage protection (DLP) and administrative policy control that installs on a user’s mobile device. A virtual smart card adds patent-pending Kerberos/X509 authentication using PKINIT, providing both enhanced security and simplicity. The mobile app container has a secure browser for access to approved Intranet sites and forms a direct SSL based AppTunnel to an easy-to-deploy gateway inside your DMZ.
Figure 1: 1. Secure container, 2. AppTunnel, 3. Gateway proxy server
This simple solution can be deployed in minutes and extends the trust and control of your internal network out to users’ mobile devices, especially for customers utilizing strong authentication solutions like smart cards or PKI certificates.