Bitzer Mobile Provides Secure Enterprise Workspace for Mobile Devices

In Sunnyvale, CA, Bitzer Mobile Inc. launched Bitzer Enterprise Application Mobility (BEAM) 2.2 for tablets and smart phones, which provides the capability for Bring Your Own Device (BYOD) and Corporate Owned Personally Enabled (COPE) environments.

The infrastructure that delivers BEAM 2.2 provides security for mobile devices that the most stringent CIO demands while delivering a seamless experience for employees. BEAM 2.2 offers six embedded apps (email, calendar, contacts, browser, mobile file manager, and document editor), and the ability to add HTML5 or native apps with the click of a button. These productivity features, combined with secure access, deliver a ‘Secure Enterprise Workspace’ that enables employees to be productive while being away from the office.

Corporate email, calendar and contacts are in the container where email is protected and attachments can’t be leaked. A secure browser gives access to Intranet and the ability to run HTML5 apps with fully encrypted storage and cache. Mobile file manager provides access to a user’s Windows file system or SharePoint documents with off-line document editing capability built in. The Bitzer Containerization Tool allows administrators to easily add any native mobile app to the Secure Enterprise Workspace.

BEAM 2.2 provides new security features such as FIPS140-2 certified encryption as well as support for One Time Password (OTP) tokens for authentication, which is on top of already supported smart card authentication.

"We're delivering the most compelling solution today for security minded companies who are seeking to improve employee productivity and velocity of decision making through mobility,” explained Naeem Zafar, CEO of Bitzer Mobile. "Our support of true Windows Single Sign-On and access with a secure AppTunnel™ sets us apart in this industry. Now with BEAM release 2.2 we have further increased our differentiation."

Bitzer’s approach for app enablement does not require any code change and is a completely scalable solution. Containerization allows an organization to alter policy in real time without having to re-wrap and distribute the app. The user experience is simple and easy where users can move between apps within a trusted workspace without re-authenticating. Due to these advantages, Oracle recently announced that Bitzer will secure its popular Oracle Business Intelligence app for large customers who require enterprise grade security features for corporate apps running on employees’ mobile devices.

For more information, please visit www.bitzermobile.com

Featured

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3