logo
  Join        Login             Stock Quote

Credant Releases Mobile Device Security Solution

Tuesday, November 27, 2012 10:02 AM


Credant Technologies, the trusted experts in data protection, today announced availability of Credant for Mobile Device Security. This new product, available as part of the Credant Data Protection Platform, provides organizations with the ability to protect corporate and personal data accessed with smartphones and tablets in addition to already protected laptops, removable media, self-encrypting drives and public or private cloud infrastructures. Credant's solutions deliver patented real-time data-centric disk encryption to more than ten million devices worldwide while addressing today's biggest enterprise security issue, managing the security of sensitive data, wherever it is located.

Tweet This: @Credant Releases Mobile Device Security Product, protecting data accessed from mobile devices. #datasecurity #BYOD

With the rapid adoption of bring your own device (BYOD) and employee expectations of data access anyplace, on any device, Credant for Mobile Device Security is built for the future - securing data wherever it resides. The new product is cost effective, lightweight and easy for IT to implement while providing users with the experience they demand, making “work-arounds” or disabling security unnecessary.

Because Credant for Mobile Device Security is centrally managed, IT departments can easily:

  • Integrate iOS and Android devices, by tapping into native security features there is no loading and configuring of apps onto the device
  • Set policies and restrictions across the enterprise such as requiring a PIN or disabling backups
  • Execute commands quickly and efficiently, including reset password or if necessary remote wipe
  • Automatically detect unenrolled devices and remove those devices’ access to corporate data if they are lost, stolen or must be deprovisioned
  • Compile compliance reports including reports that meet auditor or regulated compliance reporting

“Our customers are facing the new reality that comes with enabling a growing mobile workforce,” said Chris Burchett, CTO and co-founder, Credant Technologies. “With Credant for Mobile Device Security, organizations large and small have the piece-of-mind knowing that corporate data is secure wherever or whenever it is being accessed.”

Credant for Mobile Device Security is now available. For more information, please visit http://www.credant.com/products/cmg-for-mobile.html.

About Credant Technologies

Credant Technologies is the trusted expert in data protection. Founded in 2001, Credant's solutions comprehensively address the leading enterprise security issues of controlling, managing and protecting data located on desktops, laptops, smart phones, removable media or private or public cloud infrastructures. Credant Technologies' flagship product, Credant Enterprise Edition, offers the broadest range of integrated enterprise solutions. Investors are Austin Ventures, Menlo Ventures, Crescendo Ventures, Cisco Systems (NASDAQ:CSCO), and Intel Capital (NASDAQ:INTC). For more information, visit www.credant.com.

(Source: Business Wire )
(Source: Quotemedia)

Advertisement
Advertisement



Fundamental data is provided by Zacks Investment Research, and Commentary, news and Press Releases provided by YellowBrix and Quotemedia.
All information provided "as is" for informational purposes only, not intended for trading purposes or advice. iStockAnalyst.com is not an investment adviser and does not provide, endorse or review any information or data contained herein.
The blog articles are opinions by respective blogger. By using this site you are agreeing to terms and conditions posted on respective bloggers' website.
The postings/comments on the site may or may not be from reliable sources. Neither iStockAnalyst nor any of its independent providers is liable for any informational errors, incompleteness, or delays, or for any actions taken in reliance on information contained herein. You are solely responsible for the investment decisions made by you and the consequences resulting therefrom. By accessing the iStockAnalyst.com site, you agree not to redistribute the information found therein.
The sector scan is based on 15-30 minutes delayed data. The Pattern scan is based on EOD data.