|By Marketwired .||
|February 27, 2013 07:30 AM EST||
SANTA CLARA, CA -- (Marketwire) -- 02/27/13 -- Armor5 emerged from stealth mode today and announced $2 million in seed funding from Citrix Startup Accelerator, Nexus Venture Partners and Trinity Ventures, to redefine data security and compliance for the mobile enterprise. Founded by security, mobility and cloud computing experts from Adobe, Motorola and Yahoo, Armor5 is the first zero touch service to safeguard intranet, cloud data and applications by ensuring content from these systems never actually resides on the end-users' devices. A beta version of the Armor5 service is available on its website today.
How Armor5 works
Most BYOD security services focus on individual mobile device management. As the use of these devices grows dramatically, new approaches are required to help IT balance the needs between user productivity vs. maintaining security and compliance. According to Osterman Research, annual IT costs for managing smartphones rose 48% from 2011 to 2012. Armor5 has taken an entirely different approach to solving the BYOD security problem. Its service connects to a company's network via VPN, virtualizes intranet data and cloud applications, and generates a secure URL that mobile workers can use to access content and applications safely from any device -- personal or company issued. The entire provisioning process, from IT sign-up to end-user productivity, takes just a few minutes.
"Our vision is to create a completely self-service, cloud-based answer to the security problems posed by today's explosive growth in enterprise mobility," said Suresh Balasubramanian, CEO at Armor5. "We solve immediate pain in the areas of mobility, network security and regulatory compliance. And we do so in a way that provides end-users immediate access to the apps, data and content they need from any device they're using, without sacrificing data security."
"Zero touch" deployment
In launching its service, Armor5 is introducing a radically simple concept it calls "zero touch" BYOD security. Simply, Armor5 can be deployed without mobile client software installation; without mobile security agents; without any configuration on the part of IT; and without intranet data or enterprise cloud applications ever downloaded to the end-user device. "Zero touch means faster time to deployment, better security and compliance, improved mobile user productivity, and a substantially lower cost for BYOD security," commented Balasubramanian.
For additional security, Armor5 offers dynamic watermarking and the disabling of downloading, forwarding and printing of documents. Using the cloud-based Armor5 dashboard, IT can easily monitor and manage end-users, devices and documents, and ensure BYOD policies and compliance standards are being met while providing analytics to speed auditing and reporting.
"We have been evaluating the Armor5 solution for our data security and compliance needs," said Keith Phillips, Chief Information Officer, CPP, Inc. "We have been impressed by the simplicity, elegance and ease of setup and use of this novel, 100% cloud-based solution, requiring no agents to install on any device. Their dashboard gives us exposure to detailed activity information that has the potential to evolve into an integral part of our compliance and risk management strategy," said Phillips.
"IT must manage compliance in an increasingly BYOD world, without negatively impacting the user experience," said Michael Osterman, principal and founder at Osterman Research. "Armor5's unique and interesting approach accomplishes both and should be seriously considered by anyone struggling with BYOD in their organization."
"CIOs are understandably concerned with data security given the rise of smartphones, tablets and other mobile devices inside their organizations," said Fred Wang, general partner at Trinity Ventures. "Armor5 is the first vendor to address the BYOD security problem without requiring software installation on the mobile device. Its singular focus on the intersection of data security and BYOD, and its unique approach to solving the problem, is the reason we are investing."
"Corporate asset management, compliance and enterprise security are critical concern areas as the global workforce becomes more flexible and mobile," said Naren Gupta, co-founder and managing director at Nexus Venture Partners. "We are excited about Armor5's innovative approach to address these opportunities simply and seamlessly."
"Armor5 has tremendous potential to complement Citrix technologies in addressing BYOD challenges," said Dr. Michael Harries, Senior Director and Chief Technologist at the Citrix Startup Accelerator, which has incubated Armor5. "The service is ideal for CIOs who need an immediate solution to enterprise data security and compliance challenges with the growth of BYOD."
Armor5, Inc. is a cloud service provider that's solving the problem of secure mobile access to enterprise data and applications in a new way. The company serves enterprises, cloud solution providers and any organization struggling to secure network access for mobile users. Armor5 offers the only zero touch, 100% cloud service that accesses a client's network, virtualizes enterprise data and applications, and provisions secure and compliant access for every end user using any mobile device. Founded in 2011 by former executives from Adobe, Motorola and Yahoo, the company is privately held with patent-pending technology and investment from leading venture capital firms. For more information, visit www.Armor5.com.
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Sep. 28, 2016 11:00 AM EDT Reads: 362
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Sep. 28, 2016 10:45 AM EDT Reads: 4,101
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Sep. 28, 2016 10:45 AM EDT Reads: 199
SYS-CON Events announced today that CDS Global Cloud, an Infrastructure as a Service provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. CDS Global Cloud is an IaaS (Infrastructure as a Service) provider specializing in solutions for e-commerce, internet gaming, online education and other internet applications. With a growing number of data centers and network points around the world, ...
Sep. 28, 2016 10:30 AM EDT Reads: 2,925
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Sep. 28, 2016 10:15 AM EDT Reads: 3,245
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus...
Sep. 28, 2016 10:00 AM EDT Reads: 2,213
Big Data has been changing the world. IoT fuels the further transformation recently. How are Big Data and IoT related? In his session at @BigDataExpo, Tony Shan, a renowned visionary and thought leader, will explore the interplay of Big Data and IoT. He will anatomize Big Data and IoT separately in terms of what, which, why, where, when, who, how and how much. He will then analyze the relationship between IoT and Big Data, specifically the drilldown of how the 4Vs of Big Data (Volume, Variety,...
Sep. 28, 2016 10:00 AM EDT Reads: 1,086
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Sep. 28, 2016 10:00 AM EDT Reads: 4,397
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Sep. 28, 2016 09:45 AM EDT Reads: 5,094
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Sep. 28, 2016 09:15 AM EDT Reads: 3,169
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 28, 2016 09:00 AM EDT Reads: 3,846
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Sep. 28, 2016 08:45 AM EDT Reads: 2,555
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Sep. 28, 2016 08:45 AM EDT Reads: 1,135
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Sep. 28, 2016 08:45 AM EDT Reads: 1,204
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Sep. 28, 2016 08:30 AM EDT Reads: 1,158
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Sep. 28, 2016 08:30 AM EDT Reads: 1,580
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 28, 2016 08:15 AM EDT Reads: 543
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Sep. 28, 2016 08:00 AM EDT Reads: 2,061
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 28, 2016 07:45 AM EDT Reads: 2,301
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Sep. 28, 2016 07:45 AM EDT Reads: 2,265