New offering integrates context-aware management with vulnerability and patch information

August 1, 2012

3 Min Read

PRESS RELEASE

CARLSBAD, Calif. – July 25, 2012 – BeyondTrust, the only security solution vendor providing Context-Aware Security Intelligence, today announced the release of PowerBroker Mobile, the first mobile health and security solution to integrate context-aware management with vulnerability and patch information. The new offering represents the next generation of mobile device management (MDM) by providing remote administrative functions for mobile devices and vulnerability management for applications, operating systems and device configuration.

“The rapid proliferation of mobile devices in the enterprise is changing traditional IT environments and unfortunately traditional MDM solutions haven’t kept pace,” said Brad Hibbert, executive vice president, product engineering at BeyondTrust. “Managing the health and risks associated with mobile devices shouldn't be so costly and complex and that's why we're introducing PowerBroker Mobile to the market."

PowerBroker Mobile is a complete mobile device provisioning and configuration platform, with policy management for virtual private networks (VPNs), email, passwords, device encryption, remote locking GPS tracking, and remote wipe. Organizations can now enable mobile governance, risk and compliance (GRC) with rule-driven actions that instantly identify governance and compliance issues and report on critical risks.

BeyondTrust’s new SaaS-based offering requires no infrastructure to manage and no investment in new appliances, and can be deployed rapidly by an enterprise within minutes with new users and devices being enrolled within seconds. As Gartner’s recent 2012 Magic Quadrant for Mobile Device Management Software report notes that while MDM is primarily sold as on-premises software and around 85 percent of MDM licenses are premises-based. However, as more cloud/SaaS offerings emerge, and as enterprises need to scale to more than 30,000 supported devices, cloud-based systems will continue to grow.

“With PowerBroker Mobile we’re bridging policy management and mobile health by taking vulnerability assessment information as part consideration,” said Hibbert. “Our goal is to provide organizations a solution that easily integrates management functionality with security information, for any user that brings their own devices to work.”

As part of the eEye Digital Security acquisition, the PowerBroker product portfolio is now offering its first mobile solution with vulnerability assessment technologies. PowerBroker Mobile is the first mobile product that integrates award-winning Retina CS technology, the only unified vulnerability and compliance management solution that provides security risk discovery, prioritization, remediation, and reporting across an entire dynamic IT infrastructure.

Key features to PowerBroker Mobile include:

User definable ability to create rules and take action based on Device Threat Score Pre-scan applications to determine the threat score prior to installation Operating System profiling to determine when a device is out of date and that there’s an update available Application interface to view assets and applications by Risk, New Device, Dormant, Update Available, or even potential rogue connections Application permissions to critical device API’s and functions SaaS-based solution for mobile devices within your infrastructure and devices operating outside of an enterprise’s perimeter.

PowerBroker Mobile provides complete coverage for Android, Apple iOS, Blackberry and ActiveSync connected devices. For more information and a free trial of PowerBroker Mobile, please visit: www.beyondtrust.com/mobile

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights