Trusteer and WorkLight partner on integrated security for mobile applications
The companies see that the proliferation of personal smartphones and tablets creates a dangerous gap in enterprise security, and the problem is expected to grow significantly in 2011 and beyond. The WorkLight Mobile Platform enables organizations to create and manage rich applications for these popular devices, while ensuring optimal user experiences per environment with reduced time to market, development cost and ongoing maintenance.
Trusteer Secure Web Access detects smartphones and tablets infected with, or at risk of infection from malware and prevents them from connecting to protected enterprise web resources. In addition, it provides real-time alerts to enterprises on infected or vulnerable devices that attempt to connect to resources and applications. Trusteer’s service allows enterprises to benefit from the productivity and flexibility provided by mobile applications without the security risk.
Trusteer Secure Web Access is integrated with the WorkLight Mobile Platform to enhance existing security mechanisms currently offered by the platform. Both Trusteer and WorkLight are used by some of the largest companies in the world. Trusteer will provide WorkLight with the following native security capabilities:
Detection of malware and malicious activity on the device
Malware mitigation and removal
Tamper resistant security libraries and tamper attempt alerts
Protection against SMS-based phishing and out-of-band authentication attacks
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.