3M Powers Cloud Library eBook Lending Service with Proven Technology Platform

SafeNet, Inc., an information security company, recently announced the immediate availability of its new mobile device credentialing solution that enables the secure use of consumer mobile devices, including the popular iPhone and iPad, on corporate networks. Part of SafeNet’s Fully Trusted Authentication Environment, SafeNet’s Authentication Manager (SAM) now allows organizations to implement a comprehensive authentication strategy for multiple types of end point devices, including personal mobile devices. By integrating mobile device credential management into a unified authentication scheme, organizations can ensure that only authorized personal mobile devices have access to corporate networks and resources.

The consumerization of IT - personal computing devices accessing corporate networks - has become one of the top concerns for IT departments in 2011. There are security and manageability issues when users access corporate networks with smartphones, tablets, and personal computers. A lack of automated and consistent credentialing and control of personal mobile devices can expose networks to data breaches and unauthorized access. As more consumer devices gain access to sensitive corporate and customer data, IT departments are struggling to balance user productivity demands with the enforcement of adequate security policies.

“The increased adoption of smartphones, tablets, and other consumer devices accessing corporate networks is a big security challenge,” said Lawrence Pingree, Gartner Research Director. “There is an enormous risk created by untrusted, and often unknown, devices accessing valuable corporate data. Restricting the use of these smartphones and tablets is not a realistic option given the strong consumerization of mobile devices. An appropriate method of managing this risk is through authentication capabilities that can further validate these devices for secure access.”

SafeNet now enables organizations to secure and manage the access of consumer mobile devices on the corporate network, in the same way they manage their corporate-owned resources. By implementing unified authentication schemes, security policies and credentials for employee-owned end point devices, SAM helps organizations to enable their workforce while reducing IT management and administration resource burden. Further, with SAM, organizations can centrally and consistently manage all authentication requirements for local networks, VPNs, SaaS applications, and virtualized environments.

“The security perimeter and devices that access it have changed dramatically, forcing organizations to re-think access to networks, especially with regard to mobile devices,” said Andrew Young, vice president, Authentication, SafeNet. “SafeNet Authentication Manager enables our customers to evolve into the future, extending their security infrastructure to keep pace with the emergence of new endpoint devices, ensuring that data remains protected.”

Featured

  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

  • ISC West Announces 2023 Keynote Series Speaker Lineup

    The International Security Conference (ISC), in collaboration with premier sponsor Security Industry Association (SIA), announced five of this year’s ISC West Keynote Series speakers. ISC West will kick off its annual conference on March 28 (SIA Education@ISC: March 28-30 | Exhibit Hall: March 29-31) at the Venetian Expo in Las Vegas, Nevada. Read Now

    • ISC West
  • Accelerating Security Modernization

    In recent years, the term “digital transformation” has been one of the most frequently used buzzwords across industries. On its most basic level, it refers to the reimagining of how an organization leverages its technology systems to improve business processes. Read Now

Featured Cybersecurity

New Products

  • SAFR® from RealNetworks

    SAFR® from RealNetworks

    A unique feature in SAFR version 3.4 is its ability to automate alerts to security personnel when a spoofing attempt or a fraudulent attempt to gain access is detected. 3

  • VideoEdge 2U High Capacity Network Video Recorder

    VideoEdge 2U High Capacity Network Video Recorder

    Johnson Controls announces a powerful recording solution to meet demanding requirements with its VideoEdge 2U High Capacity Network Video Recorder. This solution combines the powerful capabilities of victor with the intelligence of VideoEdge NVRs, fueled by Tyco Artificial Intelligence, for video management that provides actionable insights to save time, money and lives. 3

  • ALTO Neoxx Electronic Padlock

    ALTO Neoxx Electronic Padlock

    Built to withstand all access control needs, the tough new SALTO Neoxx electronic padlock takes security beyond your expectations. 3