AppGate Secures Smart PhonesAppGate Secures Smart Phones
With AppGate the mobile smart phone becomes a real working tool with the same level of functionality and security as a PC
March 6, 2007
STOCKHOLM -- AppGate provides a true Mobile solution that enables users of mobile devices such as smart phones to securely access all resources inside an enterprise’s internal network. The ability to access the Intranet, synchronise calendars and download attachments in a secure way are among the features in the solution. Now to enhance the security AppGate has added functionality including Network Access Control, Client Command and automatic log-in for SMS-OTP services. The AppGate solution also provides the ability to control Internet surfing by steering all web traffic from the mobile phone through the AppGate Server.
According to AppGate’s CEO Göran Marby, "With this development AppGate has really set the standard for mobile phone security, adding functionality that is otherwise only seen in the PC world. Now for the first time smart phones can be used as they are meant to be without having to worry about security, and system administrators can control access and treat mobile phones just like any other device on the network."
With the AppGate solution it is possible to secure all types of communication between the smart phone and office. This makes it possible to connect to applications such as SAP, Citrix and other mobile applications in a fully secure way without the need for modifications of applications or “middleware”. With granular levels of access control it possible to connect a user to specific information, even down to certain web pages. The AppGate Mobile solution also supports jabber based Instant Messaging clients, providing a secure instant messaging system for mobile users ‘out of the box’.
The AppGate solution supports all modern smart phones including Nokia’s Series 60 3rd edition, Sony Ericsson UIQ 3-based phones and Windows Mobile 5 phones.
The solution can be connected to existing Radius and LDAP systems and the user can authenticate using a two-factor authentication system.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks