Bitzer Mobile Provides Secure Enterprise Workspace for Mobile Devices

In Sunnyvale, CA, Bitzer Mobile Inc. launched Bitzer Enterprise Application Mobility (BEAM) 2.2 for tablets and smart phones, which provides the capability for Bring Your Own Device (BYOD) and Corporate Owned Personally Enabled (COPE) environments.

The infrastructure that delivers BEAM 2.2 provides security for mobile devices that the most stringent CIO demands while delivering a seamless experience for employees. BEAM 2.2 offers six embedded apps (email, calendar, contacts, browser, mobile file manager, and document editor), and the ability to add HTML5 or native apps with the click of a button. These productivity features, combined with secure access, deliver a ‘Secure Enterprise Workspace’ that enables employees to be productive while being away from the office.

Corporate email, calendar and contacts are in the container where email is protected and attachments can’t be leaked. A secure browser gives access to Intranet and the ability to run HTML5 apps with fully encrypted storage and cache. Mobile file manager provides access to a user’s Windows file system or SharePoint documents with off-line document editing capability built in. The Bitzer Containerization Tool allows administrators to easily add any native mobile app to the Secure Enterprise Workspace.

BEAM 2.2 provides new security features such as FIPS140-2 certified encryption as well as support for One Time Password (OTP) tokens for authentication, which is on top of already supported smart card authentication.

"We're delivering the most compelling solution today for security minded companies who are seeking to improve employee productivity and velocity of decision making through mobility,” explained Naeem Zafar, CEO of Bitzer Mobile. "Our support of true Windows Single Sign-On and access with a secure AppTunnel™ sets us apart in this industry. Now with BEAM release 2.2 we have further increased our differentiation."

Bitzer’s approach for app enablement does not require any code change and is a completely scalable solution. Containerization allows an organization to alter policy in real time without having to re-wrap and distribute the app. The user experience is simple and easy where users can move between apps within a trusted workspace without re-authenticating. Due to these advantages, Oracle recently announced that Bitzer will secure its popular Oracle Business Intelligence app for large customers who require enterprise grade security features for corporate apps running on employees’ mobile devices.

For more information, please visit www.bitzermobile.com

Featured

  • Work Anywhere, Secure Everywhere: 2025 Tech Predictions

    Five years after the pandemic, organizations need a flexible work reset to stay productive and support any work arrangement. Despite the pandemic-fueled workplace shift that began five years ago, companies across industries and geographies continue to increase flexible work configurations. However, many tools adopted during COVID onset remain in place today, and they now need a reset to keep employees productive and secure regardless of location. Security leaders must re-evaluate existing practices and reinvest in zero trust security, passwordless environments, and automation adoption to improve efficiency and productivity. Read Now

  • Guiding Principles

    Construction sites represent a unique sector of perimeter security, especially amidst a steady increase in commercial construction. As in any security environment, assessing weaknesses and threats remains paramount and modern technology, coupled with sound access control principles, are critical in addressing vulnerabilities at even the most secure construction sites around the world. Read Now

  • Empowering 911

    In the wake of the tragic murder of UnitedHealth Group CEO Brian Thompson, media coverage flooded the airwaves with images, videos and detailed timelines of the suspect’s movements. While such post-incident analysis is not new, today’s 911 centers now have access to similar data in real-time. This technological evolution marks a pivotal transformation in emergency response, transitioning from analog calls to a digital ecosystem capable of saving more lives. Read Now

  • Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

    As organizations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID. The comprehensive study gathered responses from 1,800 partners, end users, and security and IT personnel worldwide, and reveals a significant transformation in how businesses are approaching security, with mobile credentials and artificial intelligence emerging as key drivers of innovation. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.