Risk

6/20/2013
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mobile Helix Introduces Link, A Pure HTML5 Application Development Platform

Link creates a common application environment by deploying applications through Internet browser

NEW YORK, June 20, 2013: Mobile Helix, the enterprise application and data security platform provider, today announced the availability of Link: the industry's first pure HTML5 platform. Link unlocks enterprise productivity by combining unparalleled security for enterprise data; a unique, open HTML5 application development and delivery platform; and breakthrough patent-pending performance enhancement technology. Link is designed with data security rather than device security at its core, delivering unparalleled security irrespective of the endpoint. The technology bridges the fixed/mobile application divide by allowing any existing or new browser-based enterprise application to be deployed across multiple device types, including mobile devices, PCs and laptops. Link is available now for iOS and Android, with support for Windows 8, Mac OSX and Blackberry 10 scheduled for later this year.

Link embraces HTML5 and extends the standard to meet the most exacting set of enterprise requirements, including data security, device capability integration and performance optimization. HTML is the most commonly used development platform within enterprises, meaning companies using Link do not have to invest in any additional skills or infrastructure to enable secure mobility across their business.

"Link is designed with unrestricted enterprise productivity at its core. It is the first product on the market to combine the unmistakable benefits of device-independent applications built using HTML5, with a disruptive data security platform that ensures sensitive corporate data is safe on any device," comments Seth Hallem, CEO of Mobile Helix. "We believe the notion that fixed and mobile applications require different development, delivery and security solutions is fundamentally flawed. Enterprises don't have the time or budget to simply throw out years of investment in standards-based IT and take a completely new, and often proprietary, approach to mobility. IT needs a unified strategy for building new apps and converting existing ones, while still ensuring data is protected under any circumstance and on any computing device. Link achieves this goal without requiring complicated and costly new infrastructure or expertise."

Link is constructed with optimized data security, rather than device security at its core. This is a fundamental shift in the enterprise security model that leverages unique features of both mobile operating systems and modern browser technology. The result is a more robust, yet simpler, security system than existing PC-based and mobile-device-based solutions. Link achieves this without placing any restrictions or limitations on the devices used. Even when devices are "rooted" or "jailbroken," Link ensures that corporate data is not at risk. Link includes a secure container on the device, fully device-independent encryption of all data in motion and at rest, a sophisticated key management architecture that ensures encrypted data remains safe, and a comprehensive policy engine that allows IT to enforce policies on applications and data rather than on devices.

"Contrary to popular opinion, mobile operating systems aren't necessarily less secure than PC operating systems. A tablet or smartphone with the right data security posture can be as, if not more, secure than a typical corporate laptop. PCs are perceived to be safe because of the numerous security 'band aids' that are applied to them, such as anti-virus, full-disk encryption, DLP and network access control," says Maribel Lopez, Founder and Principal Analyst of Lopez Research.

Link creates a common application environment by deploying applications through Internet browsers, embracing standards-based technology to deliver an open, end-to-end solution. This in turn extends existing enterprise application development, delivery infrastructure and expertise to mobile devices. Link integrates with existing IT processes and infrastructure to enable a simplified "download free" application delivery and support model, removing the need for a separate enterprise app store, app catalogue, and dedicated distribution and update processes for every different application and mobile operating system.

"For employees to be effective in their roles, critical enterprise data and applications must flow unrestricted across devices and networks. The power of mobility is clear, yet the enterprise mobility market today is crowded and confusing. Firms need mobile solutions that can integrate with existing enterprise infrastructure," continued Lopez.

To find out more, please visit: http://www.mobilehelix.com/.

About Mobile Helix

Mobile Helix is an enterprise application and data security platform provider focused on enabling unrestricted enterprise productivity. We are redefining endpoint computing by evolving and extending existing IT infrastructure and standards rather than reinventing them. At our core are three fundamental principles that are at the center of everything that we do: 1) we are application- and data-centric – we embrace the blurring lines between phones, tablets and laptops, permitting IT to relinquish control of the endpoint device entirely and embrace a bring-your-own-anything policy; 2) we provide unmatched yet unobtrusive security for sensitive corporate data by intelligently securing the data rather than the devices; and 3) simplicity is embedded into the DNA of our products, our designs and our communications. Our solution, Mobile Helix Link, is the industry's first pure HTML5 platform that combines unparalleled data security, a unique HTML5 application development and delivery platform, and breakthrough patent-pending performance enhancement technology. To learn more about Mobile Helix, please visit us at www.mobilehelix.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
New Mirai Version Targets Business IoT Devices
Dark Reading Staff 3/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Reading Schneier's Friday Squid Blog again?
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.