Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:18 AM
Dark Reading
Dark Reading
Products and Releases

Armor5 Debuts 'Zero Touch' Mobile Security For BYOD

Armor5 CloudSpace is a cloud-based service that virtualizes corporate data, apps and content on end users’ mobile devices

SAN FRANCISCO, DEMO Mobile 2013, April 17, 2013 – Armor5, an innovator in Enterprise Mobile Security specializing in BYOD solutions, today announced the launch of the world's first 'Zero Touch' mobile security service at DEMO Mobile 2013, a launch event exclusively concentrated on the best new mobile technologies based on design, innovation and market potential. Armor5 CloudSpace is a cloud-based service that virtualizes corporate data, apps and content on end users' mobile devices with zero installation, integration or configuration required. This first-of-its-kind solution controls sensitive and confidential corporate information by never letting it reside on users' devices – completely eliminating the risk of data leakage or mobile policy violations.

"In a society that is always connected, it is no longer a benefit but a necessity for information to be made seamlessly available on all mobile devices - especially for CIOs and mobile workers," said Erick Schonfeld, executive producer of DEMO. "Armor5 is diving head first into the mobile era and we're proud to have them launch on the DEMO Mobile 2013 stage."

Armor5 will provide a live, four minute demonstration of the Armor5 CloudSpace service on the DEMO Mobile 2013 stage at 2:30pm and will host live demonstrations beginning today at Booth D8 in the DEMO Mobile 2013 pavilion.

"Every mobile device is a potential attack point-of-entry or point-of-data-loss," said Suresh Balasubramanian, CEO of Armor5. "The mobile workforce is demanding better mobile productivity and collaboration, but IT won't risk security, compliance or privacy breaches. Armor5 offers the perfect balance between IT control and user flexibility – minus the management expense and time-consuming technical requirements of individual device management."

According to a recent study by Osterman Research about the security of corporate data stored on mobile devices, "57% of respondents believe that their management of the issue is not sufficient to satisfy the seriousness of the problem." The study also found that over half "(54%) believe that their management of lost devices is not sufficient to address the seriousness of the problem."

"While employees expect anytime, anywhere access to their apps, content and data to get their work done, CIOs are now expected to support BYOD within their corporate environment," said Michael Osterman, president of Osterman Research Inc. "Armor5 is a truly innovative solution that gives users complete BYOD freedom with access to all their corporate apps and data --not just email, while completely eliminating data leakage on mobile devices – and delivered in a way that's incredibly lightweight for CIOs to deploy and manage."

"We're impressed by the simplicity, elegance, ease of setup and use of Armor5's novel, 100% cloud-based solution," said Keith Phillips, Chief Information Officer, CPP, Inc. "Its detailed activity dashboard may evolve into an integral part of our compliance and risk management strategy."

How Armor5 Works

Armor5 CloudSpace connects to a company's existing Virtual Private Network (VPN), and then virtualizes intranet and cloud applications, providing immediate access via a secure URL that any mobile worker can safely use from any device. The entire Armor5 provisioning process, from IT sign-up to end-user productivity, takes just under 5 minutes.

Security with Full Control: IT gains security with full control as Armor5 dynamically generates a dedicated 'CloudSpace' that unifies a company's private cloud, intranet and public cloud. Since no data resides on devices, data loss is eliminated along with potential fines and penalties.

Instant Access from any Device: Armor5 works on any device (smartphone, tablet, laptop), any browser, and any network. Users get instant access to all their apps, data and content with no client software to install.

Compliance with Verification: Armor5 seamlessly supports policy controls and role-based rights management. All data flows can be audited with support for HIPPA, FINRA and FISMA compliance.

Zero Touch Deployment: A 100% cloud solution with no install (client or server) or configuration, Armor5 delivers automatic web virtualization via a simple, dedicated URL and uses the company's existing VPN (virtual private network) connection.

Simple to Manage: With Armor5, there are no agents, containers, client software to manage or need to wipe devices. IT can instantly provision remote access for any user, regardless of the device type. Companies also do not need to develop native mobile apps and supports future data migration to the cloud. A single cloud service delivers real-time activity monitoring, logging and auditing with an interactive dashboard for analytics and reporting.


Armor5 CloudSpace is immediately available. For a free trial, register at: https://admin.armor5.com/register.

About Armor5

Armor5 is an innovator in Enterprise Mobile Security specializing in BYOD solutions that empower the mobile workforce. The company has developed a unique virtualization service that gives mobile users instant access to their corporate apps, data and content while simultaneously protecting enterprises against data loss, information security breaches and compliance liabilities – regardless of device, network or application. The Armor5 'zero-touch' approach requires zero install or configuration, operates with a zero performance deficit, and leaves zero data on mobile devices – completely eliminating the risk of data loss. Founded in 2011 by former executives from Adobe, Motorola and Yahoo, the company is privately held with patent-pending technology and investment from Trinity Ventures, Nexus Venture Partners and Citrix Startup Accelerator. For more information, visit www.Armor5.com or follow @armor5Inc.

About DEMO

Produced by the IDG Enterprise events group, the worldwide DEMO conferences focus on emerging technologies and new products innovations, which are hand selected from across the spectrum of the technology marketplace. The DEMO conferences have earned their reputation for consistently identifying cutting-edge technologies and helping entrepreneurs secure venture funding and establish critical business. For more information on the DEMO conferences, visit http://www.demo.com/.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence.
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, a user without permission is able to create an article draft.
PUBLISHED: 2020-08-08
JetBrains YouTrack before 2020.2.8873 is vulnerable to SSRF in the Workflow component.
PUBLISHED: 2020-08-08
In JetBrains Kotlin before 1.4.0, there is a script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts in the system temp directory, which is shared by all users by default.
PUBLISHED: 2020-08-08
In JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges.