Trusteer And WorkLight Tackle Android And Other Mobile Malware OutbreaksTrusteer And WorkLight Tackle Android And Other Mobile Malware Outbreaks
Integration of Trusteer Secure Web Access with the WorkLight Mobile Platform will complement built-in security mechanisms currently offered by WorkLight
March 9, 2011
NEW YORK, Mar. 9, 2011 - Trusteer, the leading provider of secure web access services, and WorkLight, a global leader in mobile application platform technology, today announced a partnership to provide enterprises with enhanced security of mobile applications developed, run and managed using the WorkLight Mobile Platform.
Integration of Trusteer Secure Web Access with the WorkLight Mobile Platform will complement built-in security mechanisms currently offered by WorkLight to ensure that enterprise applications developed for smartphones and tablets, including the iPhone, Android, BlackBerry, iPad and others, are automatically protected against the growing security risks associated with malware.
The proliferation of personal smartphones and tablets is creating a dangerous gap in enterprise security, and the problem is expected to grow significantly in 2011 and beyond. Gartner, Inc. recently reported that worldwide mobile device sales to end users totaled 1.6 billion units in 2010, a 31.8 percent increase over 2009, and smartphone sales to end users were up 72.1 percent from 2009 and accounted for 19 percent of total mobile communications device sales in 2010. In the U.S., Gartner expects smartphone sales to grow from 67 million units in 2010 to 95 million units in 2011." The number of enterprise applications being developed and extended to mobile devices is growing at an even greater rate. For every smartphone and tablet, there are hundreds if not thousands of applications offered by companies for consumer, business, and employee use.
The WorkLight Mobile Platform enables organizations to create and manage rich applications for these popular devices, while ensuring optimal user experiences per environment with reduced time to market, development cost and ongoing maintenance. Trusteer Secure Web Access detects smartphones and tablets infected with, or at risk of infection from malware and prevents them from connecting to protected enterprise web resources. In addition, it provides real-time alerts to enterprises on infected or vulnerable devices that attempt to connect to resources and applications. Trusteer's service allows enterprises to benefit from the productivity and flexibility provided by mobile applications without the security risk.
Built-In Mobile App Protection
Trusteer Secure Web Access is integrated with the WorkLight Mobile Platform to enhance existing security mechanisms currently offered by the platform. Both Trusteer and WorkLight are used by some of the largest companies in the world. Trusteer will provide WorkLight with the following native security capabilities:
. Detection of malware and malicious activity on the device . Malware mitigation and removal . Tamper resistant security libraries and tamper attempt alerts . Protection against SMS-based phishing and out-of-band authentication attacks . Protection against man-in-the-browser attacks . Risk assessment of compromised devices accessing corporate network and applications
"Mobile devices are reshaping how companies do business by enabling always-on, always connected access to IT resources," said Yaron Dycian, vice president of products for Trusteer. "However, this flexibility creates a very real security risk. Our partnership with WorkLight enables enterprises to harden the security of mobile applications from the inside-out to both protect mobile devices from malware attacks and prevent infected devices from accessing secure networks and data."
"While the complexity of securing mobile applications is only now coming to light at enterprises deploying multiple apps across devices, WorkLight has been on the forefront of delivering enterprise-grade security as an integral part of our platform for some time," said Ron Perry, CTO for WorkLight. "With this latest addition to our capabilities, made possible by integrating with Trusteer's leading protection technology, WorkLight will uniquely provide customers with safeguards against increasingly frequent and sophisticated mobile malware attacks."
About WorkLight - Extend Your BusinessT
WorkLight is a leading mobile application platform that enables organizations to create, run and manage rich applications for smartphones, tablets and other environments with the highest levels of developer productivity, enterprise delivery and dynamic control. Many of the world's largest companies rely on WorkLight to provide optimal user experiences across more devices while radically reducing time to market, development cost and ongoing maintenance effort. For more information visit: http://www.worklight.com.
Trusteer is the world's leading provider of Secure Web Access services. The company offers a range of services that detect, block and remove attacks launched directly against endpoints such as Man in the Browser, Man in the Middle and Phishing. Trusteer services are being used by leading financial organizations and enterprises in North America and Europe, and by tens of millions of their employees and customers to secure web access from mobile devices, tablets and computers to sensitive applications such as webmail, online payment, and online banking. HSBC, Santander, The Royal Bank of Scotland, SunTrust, Fifth Third, ING DIRECT, and BMO Financial Group are just a few of the companies using Trusteer's technology. Trusteer is a privately held corporation led by former executives from RSA Security, Imperva, and Juniper. Follow us on www.Twitter.com/Trusteer. For more information about our services, please visit www.trusteer.com.
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
The Rise of Extended Detection & Response