Bitzer Mobile Provides Secure Enterprise Workspace for Mobile Devices

In Sunnyvale, CA, Bitzer Mobile Inc. launched Bitzer Enterprise Application Mobility (BEAM) 2.2 for tablets and smart phones, which provides the capability for Bring Your Own Device (BYOD) and Corporate Owned Personally Enabled (COPE) environments.

The infrastructure that delivers BEAM 2.2 provides security for mobile devices that the most stringent CIO demands while delivering a seamless experience for employees. BEAM 2.2 offers six embedded apps (email, calendar, contacts, browser, mobile file manager, and document editor), and the ability to add HTML5 or native apps with the click of a button. These productivity features, combined with secure access, deliver a ‘Secure Enterprise Workspace’ that enables employees to be productive while being away from the office.

Corporate email, calendar and contacts are in the container where email is protected and attachments can’t be leaked. A secure browser gives access to Intranet and the ability to run HTML5 apps with fully encrypted storage and cache. Mobile file manager provides access to a user’s Windows file system or SharePoint documents with off-line document editing capability built in. The Bitzer Containerization Tool allows administrators to easily add any native mobile app to the Secure Enterprise Workspace.

BEAM 2.2 provides new security features such as FIPS140-2 certified encryption as well as support for One Time Password (OTP) tokens for authentication, which is on top of already supported smart card authentication.

"We're delivering the most compelling solution today for security minded companies who are seeking to improve employee productivity and velocity of decision making through mobility,” explained Naeem Zafar, CEO of Bitzer Mobile. "Our support of true Windows Single Sign-On and access with a secure AppTunnel™ sets us apart in this industry. Now with BEAM release 2.2 we have further increased our differentiation."

Bitzer’s approach for app enablement does not require any code change and is a completely scalable solution. Containerization allows an organization to alter policy in real time without having to re-wrap and distribute the app. The user experience is simple and easy where users can move between apps within a trusted workspace without re-authenticating. Due to these advantages, Oracle recently announced that Bitzer will secure its popular Oracle Business Intelligence app for large customers who require enterprise grade security features for corporate apps running on employees’ mobile devices.

For more information, please visit www.bitzermobile.com

Featured

  • 2024 Security Today New Product of the Year Award Winners Announced

    More than 20 companies are being recognized this year for products that help keep us safe. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3