According to the RSA 2011 Cybercrime Trends Report, the number one trend this year will be mobile malware and the exploitation of mobile phones to commit fraud. The explosive growth of mobile devices as a general purpose computer "on the go" has made them an attractive target for cybercriminals to exploit. However it is not just consumers and their banks that must consider the risks of mobile malware. The consumerization of IT has laid the bridge for the crossover of consumer technology into the enterprise. Organizations are providing their employees with mobile devices, or employees are using their own personal devices to conduct work-related activities - potentially opening up a backdoor for malware to make its way onto the corporate network.
Transparent Security for all Mobile Platforms
Tablets and mobile devices, most of which are not managed by corporate IT departments, are easily infected with malware and may be vulnerable to attack. Allowing these mobile endpoints to connect to enterprise resources via the web can expose sensitive corporate information to criminals and lead to network security breaches. Trusteer Secure Web Access ensures tablets and mobile devices requesting a connection to secure web applications are free from malware and security vulnerabilities. It supports all leading tablets and mobile devices including iPad, iPhone, Android, BlackBerry and more.
To enforce enterprise policies on mobile devices, Trusteer Secure Web Access assesses the security posture of each device requesting access to secure resources before it can connect to applications or the network. Trusteer evaluates whether the service is installed on the device, if any malware is present, and whether it has any unpatched vulnerabilities. Only devices that meet security policy requirements are allowed to connect to enterprise resources. In addition, the status of each device is logged and transmitted in real-time to the enterprise IT department. Trusteer Secure Web Access also allows organizations to define and apply access control policies based on the security status of the device, such as blocking access to all or only select resources.
"IT departments are under pressure from the executive suite all the way to the departmental level to allow employees to use tablets and mobile devices to connect to secure web resources," said Mickey Boodaei, CEO of Trusteer. "The Trusteer Secure Web Access Service is an elegant, quick and easy to deploy solution for enterprises that want to minimize the threat associated with mobile device connectivity to business applications."
"Many CISOs face a huge challenge when it comes to managing smartphones, and realize that they need to quickly and securely embrace this ever more popular endpoint or they could see their data and systems trashed by malware ridden devices," said Nigel Stanley, Practice Leader- security, Bloor Research. "Secure access services are one way in which users can be encouraged to use their own smartphones while protecting the company network and hopefully make this one less thing a CISO need worry about".
Availability and Pricing
Trusteer Secure Web Access is available immediately from Trusteer and its business partners worldwide. Pricing starts at $35 / £25 per device per year.
Trusteer is the world's leading provider of Secure Web Access services. The company offers a range of services that detect, block and remove attacks launched directly against endpoints such as Man in the Browser, Man in the Middle and Phishing. Trusteer services are being used by leading financial organizations and enterprises in North America and Europe, and by tens of millions of their employees and customers to secure web access from mobile devices, tablets and computers to sensitive applications such as webmail, online payment, and online banking. HSBC, Santander, The Royal Bank of Scotland, SunTrust, Fifth Third, ING DIRECT, and BMO Financial Group are just a few of the companies using Trusteer's technology. Trusteer is a privately held corporation led by former executives from RSA Security, Imperva, and Juniper. Follow us on www.Twitter.com/Trusteer. For more information about our services, please visit www.trusteer.com.