Risk
12/4/2013
10:24 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

AirWatch Develops App Reputation Scanning Into Its EMM Platform

Tech is fully integrated into the AirWatch platform

ATLANTA – Dec. 3, 2013 – AirWatch®, the largest Enterprise Mobility Management (EMM) provider, announces it has developed app reputation scanning technology into its platform for complete support of corporate-owned device and Bring Your Own Device (BYOD) deployments. AirWatch App Reputation Scanning is fully integrated into the AirWatch platform and the new capabilities built by AirWatch combined with the existing AirWatch Mobile Application Management solution portfolio, including app wrapping, Software Development Kit (SDK), custom app catalog and Volume Purchase Program (VPP), provide the most advanced, internally-developed solution on the market.

Enterprises deploy mobile applications to improve productivity, promote collaboration and connect employees to corporate resources. Before distributing mobile applications, IT administrators want to ensure that public, vendor-supplied and internally-developed applications are built properly, maintain user privacy and comply with company security standards for safe business use. AirWatch App Reputation Scanning works on public and internal applications, and it can be implemented with Mobile Device Management (MDM), as a separate dual persona container with AirWatch Workspace or as standalone app scanning.

AirWatch App Reputation Scanning allows organizations to quickly and easily run analysis on applications to determine if they exhibit risky behaviors, access privacy settings on the device, expose user contacts or geolocation information, or use insecure programming or design. Organizations can review app reputation scanning analysis results from the easy-to-navigate AirWatch console and then decide to allow or ban the app on managed devices.

AirWatch also features the most advanced ecosystem of technology partners and API integrations. Organizations can take complete advantage of AirWatch capabilities, while also leveraging seamless integrations to third-party app risk management providers, such as Appthority and Veracode, in the AirWatch Marketplace to fully embrace additional advanced capabilities.

"Every company has a different tolerance for risk depending on the sensitivity of the data involved, but every company needs to know what a mobile app is actually doing in order to set custom policies that match the organization's requirements," said Domingo Guerra, co-founder and president, Appthority. "AirWatch understands the criticality of app risk and is empowering its customers to take action by creating custom policies based on the behaviors of an app and the role of each group or individual's needs within their organization."

"We developed the most comprehensive solution for app reputation scanning into our platform to create a one stop shop for IT administrators," said John Marshall, president and CEO, AirWatch. "With AirWatch native capabilities, all AirWatch customers can easily take advantage of this new module to perform basic analysis of their corporate applications. Enterprises that seek more advanced scanning or already use third party solutions can leverage the AirWatch APIs to integrate with solutions from our partner marketplace."

To learn more about AirWatch's capabilities and partner integrations, register to attend a webinar at www.air-watch.com/resources/webinars.

About AirWatch

AirWatch is the world's largest mobile security and Enterprise Mobility Management (EMM) provider with more than 1,500 employees across nine global offices. More than 9,000 organizations in 150 countries leverage the AirWatch EMM platform, which includes industry-leading mobile device, email, application, content, laptop and browser management solutions. Organizations can implement these solutions stand-alone for unique Bring Your Own Device (BYOD) requirements, in the AirWatch Workspace containerized solution, or as a comprehensive, highly scalable enterprise-grade mobility platform. With the largest research and development team in the industry, AirWatch ensures the broadest mobile platform support, develops innovative solutions like Secure Content Locker&trade, and integrates with the leading device manufacturers and technology solution providers in the mobile ecosystem. For more information, visit www.air-watch.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3154
Published: 2014-04-17
DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file conte...

CVE-2013-2143
Published: 2014-04-17
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

CVE-2014-0036
Published: 2014-04-17
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.

CVE-2014-0054
Published: 2014-04-17
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External ...

CVE-2014-0071
Published: 2014-04-17
PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

Best of the Web