Armor5 Debuts 'Zero Touch' Mobile Security For BYOD

Armor5 CloudSpace is a cloud-based service that virtualizes corporate data, apps and content on end users’ mobile devices

April 19, 2013

5 Min Read


SAN FRANCISCO, DEMO Mobile 2013, April 17, 2013 – Armor5, an innovator in Enterprise Mobile Security specializing in BYOD solutions, today announced the launch of the world's first 'Zero Touch' mobile security service at DEMO Mobile 2013, a launch event exclusively concentrated on the best new mobile technologies based on design, innovation and market potential. Armor5 CloudSpace is a cloud-based service that virtualizes corporate data, apps and content on end users' mobile devices with zero installation, integration or configuration required. This first-of-its-kind solution controls sensitive and confidential corporate information by never letting it reside on users' devices – completely eliminating the risk of data leakage or mobile policy violations.

"In a society that is always connected, it is no longer a benefit but a necessity for information to be made seamlessly available on all mobile devices - especially for CIOs and mobile workers," said Erick Schonfeld, executive producer of DEMO. "Armor5 is diving head first into the mobile era and we're proud to have them launch on the DEMO Mobile 2013 stage."

Armor5 will provide a live, four minute demonstration of the Armor5 CloudSpace service on the DEMO Mobile 2013 stage at 2:30pm and will host live demonstrations beginning today at Booth D8 in the DEMO Mobile 2013 pavilion.

"Every mobile device is a potential attack point-of-entry or point-of-data-loss," said Suresh Balasubramanian, CEO of Armor5. "The mobile workforce is demanding better mobile productivity and collaboration, but IT won't risk security, compliance or privacy breaches. Armor5 offers the perfect balance between IT control and user flexibility – minus the management expense and time-consuming technical requirements of individual device management."

According to a recent study by Osterman Research about the security of corporate data stored on mobile devices, "57% of respondents believe that their management of the issue is not sufficient to satisfy the seriousness of the problem." The study also found that over half "(54%) believe that their management of lost devices is not sufficient to address the seriousness of the problem."

"While employees expect anytime, anywhere access to their apps, content and data to get their work done, CIOs are now expected to support BYOD within their corporate environment," said Michael Osterman, president of Osterman Research Inc. "Armor5 is a truly innovative solution that gives users complete BYOD freedom with access to all their corporate apps and data --not just email, while completely eliminating data leakage on mobile devices – and delivered in a way that's incredibly lightweight for CIOs to deploy and manage."

"We're impressed by the simplicity, elegance, ease of setup and use of Armor5's novel, 100% cloud-based solution," said Keith Phillips, Chief Information Officer, CPP, Inc. "Its detailed activity dashboard may evolve into an integral part of our compliance and risk management strategy."

How Armor5 Works

Armor5 CloudSpace connects to a company's existing Virtual Private Network (VPN), and then virtualizes intranet and cloud applications, providing immediate access via a secure URL that any mobile worker can safely use from any device. The entire Armor5 provisioning process, from IT sign-up to end-user productivity, takes just under 5 minutes.

Security with Full Control: IT gains security with full control as Armor5 dynamically generates a dedicated 'CloudSpace' that unifies a company's private cloud, intranet and public cloud. Since no data resides on devices, data loss is eliminated along with potential fines and penalties.

Instant Access from any Device: Armor5 works on any device (smartphone, tablet, laptop), any browser, and any network. Users get instant access to all their apps, data and content with no client software to install.

Compliance with Verification: Armor5 seamlessly supports policy controls and role-based rights management. All data flows can be audited with support for HIPPA, FINRA and FISMA compliance.

Zero Touch Deployment: A 100% cloud solution with no install (client or server) or configuration, Armor5 delivers automatic web virtualization via a simple, dedicated URL and uses the company's existing VPN (virtual private network) connection.

Simple to Manage: With Armor5, there are no agents, containers, client software to manage or need to wipe devices. IT can instantly provision remote access for any user, regardless of the device type. Companies also do not need to develop native mobile apps and supports future data migration to the cloud. A single cloud service delivers real-time activity monitoring, logging and auditing with an interactive dashboard for analytics and reporting.


Armor5 CloudSpace is immediately available. For a free trial, register at:

About Armor5

Armor5 is an innovator in Enterprise Mobile Security specializing in BYOD solutions that empower the mobile workforce. The company has developed a unique virtualization service that gives mobile users instant access to their corporate apps, data and content while simultaneously protecting enterprises against data loss, information security breaches and compliance liabilities – regardless of device, network or application. The Armor5 'zero-touch' approach requires zero install or configuration, operates with a zero performance deficit, and leaves zero data on mobile devices – completely eliminating the risk of data loss. Founded in 2011 by former executives from Adobe, Motorola and Yahoo, the company is privately held with patent-pending technology and investment from Trinity Ventures, Nexus Venture Partners and Citrix Startup Accelerator. For more information, visit or follow @armor5Inc.

About DEMO

Produced by the IDG Enterprise events group, the worldwide DEMO conferences focus on emerging technologies and new products innovations, which are hand selected from across the spectrum of the technology marketplace. The DEMO conferences have earned their reputation for consistently identifying cutting-edge technologies and helping entrepreneurs secure venture funding and establish critical business. For more information on the DEMO conferences, visit

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights