Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:13 AM
Dark Reading
Dark Reading
Products and Releases

Perimeter E-Security Announces Cloud Mobile Device Management

Cloud MDM also features a unique bring-your-own-device kit

MILFORD, Conn., Sept. 27, 2012 /PRNewswire/ -- Perimeter E-Security, the leading provider of secure cloud services, today announced that it has added Mobile Device Management (MDM) technology to its broad portfolio of secure messaging and network security services. With Perimeter's new Cloud MDM service, CIOs can protect company data on all employee-owned and company-issued smartphones and tablets for best-in-class security and compliance. Cloud MDM also features a unique Bring-Your-Own-Device Kit to help companies of all sizes successfully manage the risks associated with employee-owned devices.

"Formal BYOD programs are a relatively new but fast-growing phenomenon. In 2009, it was typical to see no BYOD program whatsoever in business, even though there has always been a substantial amount of 'stealth' use of personal devices. But now, formal programs supported by IT are rapidly gaining steam. In a 2011 study, we found that, on average, U.S. CIOs expect 38% of their workforce to use personal devices at work by the end of 2012." [Gartner, "Bring Your Own Device:

New Opportunities, New Challenges," David A. Willis, August 16, 2012.]

Perimeter's Cloud MDM service features industry-leading technology powered by AirWatch LLC, best practice security policies and complete integration with Perimeter email and other services. Company IT departments can enforce corporate policy across multiple device types, push configuration profiles and security policies, manage mobile applications, reduce the cost and effort of device deployments, increase IT efficiencies and response times and remotely wipe lost or stolen devices.

"Enterprise CIOs want to take advantage of new mobile opportunities, but unlike desktop computing, with mobile, CIOs must navigate a minefield. Diverse operating systems, hundreds of devices of suspect provenance, privacy concerns and new ownership models make it impossible to know how to keep company data secure," said Andrew Jaquith, CTO, Perimeter E-Security. "Perimeter's new Cloud MDM simplifies the complex security and policy choices enterprises must make.

Instead of giving customers a 'me-too' technology solution that leaves the messy security, policy and privacy details up them, Cloud MDM provides a prescriptive solution that includes zero-configuration best practice security policies, a BYOD Kit, privacy controls and complete email integration right out of the box.

We've brought everything we've learned in more than 15 years of managing hundreds of thousands of mobile devices to Cloud MDM. With our service, companies can secure all of their mobile devices -- and implement a safe, secure and legal BYOD program -- in just a few hours."

The most comprehensive, customizable and feature-rich MDM solution in the industry, Perimeter E-Security's Cloud MDM offers:

-- Industry-leading MDM Platform: A complete device, application and

content management solution for iOS, Android, BlackBerry, Windows Phone,

Symbian and Windows Mobile devices, powered by AirWatch technology.

Hundreds of controls allow administrators to configure email, wireless,

security and other details.

-- Pre-configured Policies: Tested, best-practice data protection policies

include bi-level, standards-aligned passcode polices; encryption

enforcement; and carefully tuned device policies for Android and iOS.

Customers can use these as-is by default or extend them as needed.

-- Complete Email Integration: Fully integrated with Perimeter's hosted

Exchange service so that mobile devices are configured for email

automatically, eliminating end-user hassles and administrator support


-- Bring-Your-Own-Device (BYOD) Kit: Includes a Model Acceptable Use Policy

and accompanying policy guidance, co-developed in partnership with

international law firm Proskauer Rose LLP, designed to help companies

implement and manage the risks of employee-owned BYOD device programs.

-- Privacy Protection: Limits the collection of personally identifiable

information (PII), reducing privacy exposures while aligning with EU and

U.S. local, state and federal privacy laws. Administrators can wipe

devices clean, or wipe only enterprise managed data and settings, while

leaving personal information intact.

-- Compliance: Built-in passcode policies align with U.S. federal standards

for electronic authentication strength (NIST Special Publication

800-63). More than 40 standard reports allow companies to demonstrate

effective controls by reporting on how devices comply with their mobile

security policies.

-- One, Simple Bill: True, usage-based billing keeps costs predictable and


For more information, please visit


About Perimeter E-Security

Perimeter E-Security delivers secure infrastructure from the cloud that businesses of all sizes rely on. Our advanced technology, expert intelligence, and superior scale make our clients' information more secure, more highly available, compliant with regulations and less costly to manage. By using our solutions, our customers can focus on their core businesses and take advantage of new opportunities. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit www.perimeterusa.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-17
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring.
PUBLISHED: 2019-11-17
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by th...
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.