Securing mobile devices and data in the field

November 2013 Cyber Security, Products

You have mobility and barcode scanning devices in locations all across your enterprise. They are constantly on the move or situated in remote locations, and are critical to supporting your employees’ work activities.

They make your business operations effective, your business more efficient, and your customers more satisfied. However, the process of managing those devices – keeping the software up-to-date, dealing with multiple operating systems, ensuring proper configurations, and monitoring vital performance indicators – is time consuming, expensive, and prone to errors. What if you could manage all of these functions on any device within your network, from anywhere in the world, at any time you choose? That’s the power of Remote MasterMind.

Remote MasterMind provides advanced security features that let you control how your devices are used and how information is accessed. These features include:

* Authentication policies using Active Directory, so your end users are authenticated onto the network using the same credentials they use in the office.

* Device lockdown that allows you to restrict end user access to specific applications and websites.

* Application run controls that prevent restricted applications from running on your devices.

* Out-of-contact device policies that can be used to define actions to be taken automatically when a device has been lost, stolen, or fails to contact the server for a specified period of time.

* File encryption at the kernel level encrypts data stored on the device, as well as on an SD or memory card, helping you to achieve compliance with industry regulations. Remote MasterMind uses FIPS 140-2 validated AES-256 encryption to secure your mobile data. Similarly, communications with corporate resources are encrypted using standards-based SSL communication and FIPS 140-2 certified algorithms.

* Phone call policies that allow you to deliver device user access to a defined set of incoming and outgoing phone numbers.

* Device feature control policies that allow you to selectively disable device hardware features, such as Bluetooth wireless technology and cameras.

Remote MasterMind also provides the tools and technologies you need to control how and where your mobile assets are being used. For example, using the location feature on mobile devices gives you the ability to locate and track your GPS-enabled devices inside the four walls or anywhere in the world. With this feature, you can easily confirm the location of a vehicle of a field service worker, or track the movements of your devices and people to find greater workflow efficiencies. These location features are enhanced with geofencing. With geofencing, you can define specific actions to be taken automatically whenever a device enters or leaves a predefined area. You can also identify the postal address of a device, send driving directions from the help desk and even receive live traffic condition updates.

For more information contact Bartrans, +27 (0)11 552 8245,  luke@bartrans.co.za www.bartrans.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber futures in 2020
Issue 1 2020 , Cyber Security
MJ Strydom, managing director of cybersecurity specialist company, DRS, discusses what can be expected in 2020.

Read more...
Seven security trends for 2020
Issue 1 2020 , Cyber Security
What challenges await the security professional in 2020? Lukas van der Merwe looks at the trends for the year ahead.

Read more...
Security is not a single product solution
Issue 1 2020 , Cyber Security
Adopting a phased approach to security allows companies to develop a layered security posture to help control costs as well as the complexity.

Read more...
From physical security to cybersecurity
Access & Identity Management Handbook 2020, Genetec , Cyber Security, Security Services & Risk Management
Genetec discusses the security-of-security concept as a means to protect cameras, door controllers and other physical security devices and systems against cybercriminal activity.

Read more...
Minding the gaps to protect industrial PLCs from cyber threats
November 2019, AVeS Cyber Security , Cyber Security
PLCs, designed to control machinery and specific processes, were never built with cybersecurity threats in mind and protecting PLCs against these threats requires healthy isolation from the Internet.

Read more...
African trust centre launches cyber division
November 2019 , Cyber Security
Advancing cybersecurity to more stringent heights, LAWtrust has launched a new division focusing on cybersecurity services to complement its identity, encryption and digital signature offerings.

Read more...
What are the cybersecurity issues in video surveillance?
November 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
he importance of the data captured by surveillance cameras – and what can be done with it – has led to a new breed of cybercriminals, looking for insights to steal and sell.

Read more...
Duxbury Networking launches Solar Switch
November 2019 , IT infrastructure, Products
Duxbury Networking has launched its Solar Switch with tailored capabilities for applications in less-accessible areas where electricity is not available or not reliable.

Read more...
Protecting the outer perimeter with cloud services
November 2019 , Cyber Security
Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services.

Read more...
Information security outsourcing service
November 2019, Condyn , Cyber Security
SearchInform launches information security outsourcing service for companies that face the problem of corporate fraud and data leakage.

Read more...