Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:03 PM
Dark Reading
Dark Reading
Products and Releases

No-footprint data on mobile; mobile security's new frontier from Avast

Powerful platform focuses on securing data, not devices; delivers security-enabled productivity by protecting company data and workers' personal privacy

San Mateo, CA, February 17, 2016 — Avast Software, maker of the world’s most trusted mobile security software, today launched the Avast Virtual Mobile Platform (VMP). The platform is built on top of the iron-clad Virtual Mobile Platform of award-winning mobile enterprise security provider Remotium, which was recently acquired by Avast. Designed specifically to meet the mobile solution needs of modern enterprises, Avast VMP takes a fundamentally different approach from EMM (enterprise mobility management) solutions available today, focusing on securing data rather than devices.

Through ephemeral sessions in which no data footprint is left behind on the device, Avast VMP prevents datajacking, which is the unsanctioned appropriation of data on a mobile handset or computer from the data’s primary owner. The platform delivers reliability and confidence that company information and data remain secure, and that workers’ personal privacy is respected. It includes powerful features that enable users to make and receive encrypted calls to each other and send instant messages without leaving a trace on devices. It also includes a comprehensive policy engine for greater security, flexibility and control over apps, data and users.

A recent Avast survey* on the impact of BYOD (Bring Your Own Device) on enterprise security of more than 100 IT professionals, including senior IT executives and managers in security roles, revealed that increased productivity is the main goal of most enterprise mobility programs. They also reported that datajacking  is the greatest security challenge they are facing today. The following are some of the survey highlights:

·      Nearly 80% of companies enable employees to access corporate mobile apps on their own devices

·      76% of BYOD or enterprise mobility programs’ main objective is increased productivity, followed by improved customer service (54%) and increased revenue (45%)

·      72% cite datajacking as the greatest security challenge related to enterprise mobility, followed by malware (67%)  and employee compliance (58%)

·      Nearly 50% of businesses provide contractors or other third parties with mobile access to their networks

·      The top three concerns when considering enterprise mobility solutions are employee privacy (55%), ease of deployment/management (53%) and compliance (52%)

“With the use of personal mobile devices now entrenched in the workplace, the Avast Virtual Mobile Platform meets the need for a powerful enterprise-grade mobile security technology that helps workers, IT and business units achieve their productivity goals,” said Sinan Eren, Vice President and General Manager, Avast Mobile Enterprise. “Our leading-edge enterprise mobile technology ensures procedure, policy and bureaucracy don’t get in the way of business productivity and performance.”

Avast VMP users in highly regulated industries such as healthcare, financial services and legal will also benefit greatly from these new features as they enable ultimate security of user-to-user communication. For healthcare, Avast VMP provides instant compliance with HIPAA (HealthInsurance Portability and Accountability Act) regulations and enables doctors  to send photos and view medical images without leaving a trace on personal devices. For legal and financial services, users can discuss high-value, confidential transactions without risking information exposure.

“Different spins on Virtual Mobile Infrastructure have emerged over the past few years specifically because of the challenge mobile poses to the shifting of content, applications, data and workflows to smartphones and tablets for which traditional security, productivity and governance schema no longer apply,” said Chris Marsh, Research Director, 451 Research. “Avast’s platform goes further than some by being HIPAA compliant, enabling encrypted calls and IM, along with applications like SharePoint already configured for the platform. As one virtualized infrastructure, it should appeal to businesses struggling with the idea of multiple mobility management technologies and the integration they’d have to do across them.”

Avast Virtual Mobile Platform features include:  

·      SecurePhone: Enables Avast VMP users to make and receive encrypted calls to each other

·      SecureIM: Completes the communications suite with Avast VMP user-to-user instant messaging

·      Policy Engine: Delivers the most IT-friendly app and access policy console to enforce business policies, and to control networks, geolocation, app permissions and more

·      VMP-ready Apps: In addition to its current support of any third-party apps, Avast VMP offers popular enterprise mobile apps, like Microsoft SharePoint, pre-configured and ready to go on day one

About Avast VMP

Avast’s award-winning solution solves the challenges of delivering corporate applications to employees’ mobile devices by creating a smooth user experience, while ensuring data security and compliance. This patent-pending technology allows users to work from anywhere – in the office, remotely from their home office or while on business trips. Users can connect to their VMP from any device they are using – smartphones, tablets, and desktops – in order to get access to their corporate tools, apps and data.

About Avast

Avast Software (www.avast.com), maker of the most trusted mobile and PC security in the world, protects more than 230 million people and businesses with its security applications. In business for more than 25 years, AVAST is one of the pioneers in the computer security business, with a portfolio that includes free antivirus for PC, Mac, and Android, to premium suites and services for both consumers and business. In addition to being top-ranked by consumers on popular download portals worldwide, AVAST is certified by, among others, VB100, AV-Comparatives, AV-Test, OPSWAT, ICSA Labs, and West Coast Labs.

*The survey was conducted in January 2016, with more than 100 respondents in IT security management roles in a range of industries, including financial services, government, healthcare and pharmaceuticals, retail, technology and telecommunications.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-14
A heap buffer overflow read was discovered in upx 4.0.0, because the check in p_lx_elf.cpp is not perfect.
PUBLISHED: 2021-05-14
A Zip Slip vulnerability was found in the oc binary in openshift-clients where an arbitrary file write is achieved by using a specially crafted raw container image (.tar file) which contains symbolic links. The vulnerability is limited to the command `oc image extract`. If a symbolic link is first c...
PUBLISHED: 2021-05-14
A UI misrepresentation vulnerability was identified in GitHub Enterprise Server that allowed more permissions to be granted during a GitHub App's user-authorization web flow than was displayed to the user during approval. To exploit this vulnerability, an attacker would need to create a GitHub App o...
PUBLISHED: 2021-05-14
Apache Traffic Server 9.0.0 is vulnerable to a remote DOS attack on the experimental Slicer plugin.
PUBLISHED: 2021-05-14
Firely/Incendi Spark before 1.5.5-r4 lacks Content-Disposition headers in certain situations, which may cause crafted files to be delivered to clients such that they are rendered directly in a victim's web browser.