Analytics
2/6/2014
03:45 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

NitroDesk Announces Cockpit Mobile Productivity Management Solution

Cockpit allows for management of TouchDown corporate data container

BELLEVUE, Wash., Feb. 5, 2014 /PRNewswire/ -- NitroDesk Inc., the makers of the world's #1 third-party Exchange ActiveSync(TM) client for Android, iOS, Mac OS X and Windows announces their Mobile Productivity Management (MPM) solution, Cockpit(TM) for TouchDown(TM).

Many Enterprise and Small and Medium Businesses (SMB) are finding that they do not need the granular management capabilities of traditional MDM solutions, such as geo-fencing, root detection or the ability to disable a device's camera. In many cases, MDMs are much more than what is needed when the company only needs to manage the corporate data container, which includes the PIM client, as well as a document editor. Being able to ensure data security from end to end, including document editing, has become critical in a Bring Your Own Device

(BYOD) environment. Having the document editor and management capabilities in one integrated lightweight, controllable environment is a big win for corporate IT shops.

Cockpit allows simple, efficient management of the TouchDown corporate data container and enables an administrator to effectively manage the container and apply policies to the user's device without impacting the user's personal data.

Corporate BYOD policies typically require separation of the corporate data from the user's personal information. Cockpit allows IT administrators to ensure that data security is maintained via policy management with a minimum of effort, while ensuring that the user's personal experience is not impacted.

"MDM solutions have made great strides in legitimizing the BYOD movement, and in many cases they are still the right choice when their specific features are needed. However, when effortless and lightweight management of only the corporate data container and productivity suite is all that's needed, Cockpit for TouchDown is the right choice," according to Ron Goins, Chief Operating Officer of NitroDesk Inc.

Exchange ActiveSync policies provide security enforcement at a high level to most mobile devices that connect to the server. However, these policies are very generic and are not always tailored to match the nuances of various mobile platforms that connect to it. Examples of this include the ability on Android clients to display widgets, speak out emails, show notifications and the commonly available ability to copy and paste information between applications.

While usability is improved with such additional functionality on the new emerging platforms, it comes with a risk of increased threat surface from a Data Loss Prevention (DLP) perspective.

Traditionally MDMs have provided the administrator with mechanisms to set application level policies in the corporate data container. While MDMs provide the richest and most powerful way to configure policies applied at the device level, Cockpit provides administrators a centralized mechanism to set policies at the container level. The Cockpit console allows an administrator to set platform specific policies that would be enforced at the container level on each of the devices in his organization without necessitating device enrollment or user level tracking. Since the TouchDown container is a self-enrolling application, it comes with a high degree of accuracy in identifying the end user as part of the organization and accordingly setting policies to enforce.

With the Cockpit console, the administrator can set PIN enforcement policies to override those provided by Exchange ActiveSync as well as additional controls that determine application behavior such as signatures, ability to display sensitive information in widgets and notifications, ability to speak out emails and notifications and the ability to copy data from email content. This also includes the ability for the administrator to set known good configurations for the clients that are connecting for the first time, thus ensuring a uniform end user experience that matches the corporate needs and reduces support headaches.

In addition, an Enterprise provisioned on Cockpit would also have easy means to automatically distribute end user licenses to its users and track license usage as well as be notified of user thresholds being exceeded.

Pricing and Availability

Cockpit is slated for a Q2 release. Go to cockpitcontrol.com for the latest information. For pricing, customers should contact sales@nitrodesk.com. Contact bizdev@nitrodesk.com for beta program participation.

About NitroDesk Inc.

Founded in May 2008, NitroDesk Inc. is the developer of TouchDown, a popular application that lets users synchronize their Android, iOS, Mac OS X and Windows

8 powered devices with corporate email, contacts and calendar on their Microsoft® Exchange Servers. NitroDesk currently operates its head office in Bellevue, Washington.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7298
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

CVE-2014-8346
Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.