Trusteer and WorkLight partner on integrated security for mobile applications

March 09, 2011 // By Julien Happich
Trusteer and WorkLight partner on integrated security for mobile applications
Trusteer and WorkLight have partnered to provide enterprises with enhanced security of mobile applications developed, run and managed using the WorkLight Mobile Platform. Integration of Trusteer Secure Web Access with the WorkLight Mobile Platform will complement built-in security mechanisms currently offered by WorkLight to ensure that enterprise applications developed for smartphones and tablets, including the iPhone, Android, BlackBerry, iPad and others, are automatically protected against the growing security risks associated with malware.

The companies see that the proliferation of personal smartphones and tablets creates a dangerous gap in enterprise security, and the problem is expected to grow significantly in 2011 and beyond. The WorkLight Mobile Platform enables organizations to create and manage rich applications for these popular devices, while ensuring optimal user experiences per environment with reduced time to market, development cost and ongoing maintenance.

Trusteer Secure Web Access  detects smartphones and tablets infected with, or at risk of infection from malware and prevents them from connecting to protected enterprise web resources. In addition, it provides real-time alerts to enterprises on infected or vulnerable devices that attempt to connect to resources and applications. Trusteer’s service allows enterprises to benefit from the productivity and flexibility provided by mobile applications without the security risk.

Trusteer Secure Web Access is integrated with the WorkLight Mobile Platform to enhance existing security mechanisms currently offered by the platform. Both Trusteer and WorkLight are used by some of the largest companies in the world. Trusteer will provide WorkLight with the following native security capabilities:

  •  Detection of malware and malicious activity on the device
  • Malware mitigation and removal
  • Tamper resistant security libraries and tamper attempt alerts
  • Protection against SMS-based phishing and out-of-band authentication attacks
  • Protection against man-in-the-browser attacks
  • Risk assessment of compromised devices accessing corporate network and applications

Visit WorkLight at

Visit Trusteer at

Vous êtes certain ?

Si vous désactivez les cookies, vous ne pouvez plus naviguer sur le site.

Vous allez être rediriger vers Google.