Bitzer’s solution is for CIOs and IT managers who are tasked with accessing corporate data and keeping it isolated and secure on the employee’s mobile devices (Smartphone or tablet). Many companies are considering using a mobile VPN and a Mobile Device Management (MDM) solution to protect their data. These solutions are simply not adequate.Bitzer provides a much superior solution to the Secure, Authenticated Mobile Access problem. Bitzer Solution addresses four key elements for an end to end enterprise mobility solution:
Bitzer provides deep integration with the Microsoft® Windows® identity framework. Whether you are using PKI (X.509 certificates and smart cards) or just username and password for authentication. This integration fully supports Windows Single Sign-On via Kerberos and NTLM protocols providing a rich user experience just like you were sitting at your desk inside the corporate network.
Data Security at Rest
Various mobile platforms differ in data encryption and security they provide. Bitzer goes beyond all of the standard support and uses the industry’s highest AES256 bit encryption for securing the Container data. The keys are also distributed and not all of them reside on the keychain. This hierarchical architecture provides a more secure environment for keeping the data safe. All user credentials never leave the container.
Data Security in Transit
Creating a mobile VPN is not safe enough and many security minded companies are worried about it. Opening a layer 2 or 3 network level connection (in the 7 layer OSI model) can allow rogue apps to travel to the corporate networks. Bitzer’s patent-pending technology uses a secure AppTunnel™ that is a mutually authenticated SSL connection (at layer 7) so that only the container and its content can talk to the corporate networks. This is a big deal.
Control of Corporate Data
Once you have a secure container the IT folks would like to have full control over their data (not your personal device but the secure container!). This is exactly what Bitzer provides. All containers register with the Admin Control Panel (ACP) that can be housed on premises or on the cloud. ACP applies security policy to the container:
- Remote lock/wipe
- Rooted or jail broken device detection
- Offline access allowed/disallowed
- PIN strength and policy
- Copy/paste and share allowed/disallowed
- Management statistics on usage of the container & apps within the container
App Access and Deployment
Bitzer’s Container also includes a secure browser. This secure browser can run HTML5 apps or web apps that you would like employees to be able to use. Users can access SharePoint or other document repositories within the secure container. Offline access with local encrypted storage can be allowed through policy so that users can be productive when not connected to the network. App access can be controlled through a local App Catalog inside the container. Administrators can decide to deploy different access to different users through control of the App Catalog.