Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

BYOD security for SAP mobile device management

ForeScout Technologies : 30 October, 2013  (Application Story)
SAP is improving mobile device management platform Afaria with the integration of CounterACT from ForeScout
BYOD security for SAP mobile device management

ForeScout Technologies has announced interoperability between ForeScout CounterACT network security and SAP Afaria mobile device management (MDM) platforms. The combination enables companies to accelerate and fortify the provisioning, administration and security of corporate and personal mobile devices, applications and data in the enterprise.

“Organisations are looking for an integrated approach to manage and secure the invasion of employee-liable devices connecting to corporate networks, particularly at a time when BYOD is so prevalent,” said Chris Hazelton, research director for mobile and wireless at 451 Research. “We see strong synergy between network access control (NAC) and MDM in their capabilities to provide visibility into devices regardless of ownership - corporate or personal. The pairing of NAC with MDM technologies offers organisations the means to easily identify who and what type of device is connecting to the enterprise, to automatically enrol and monitor roles-based controls for any device and user and to secure the growing movement of corporate data across smartphones and tablets.”

“IT organisations want to rapidly and cost-effectively adopt BYOD without compromising security – giving appropriate access to corporate resources, data and applications that take full advantage of mobile platforms and cloud ubiquity,” said Gil Friedrich, vice president of technology for ForeScout. “Through this integration, SAP customers can utilise the rich enterprise mobile device, data and application management provided by SAP Afaria with advanced network visibility and control afforded by ForeScout.”

Together, ForeScout CounterACT and SAP Afaria offer enterprises the means to:

* See and detect all unmanaged, corporate and personal mobile devices, such as iPads, iPhones and Androids and other devices attempting to connect to the corporate network via Wi-Fi or over-the-air

* Readily apply security policy based on user, role and device in order to automatically limit access, manage as guest or enrol in SAP Afaria MDM

* Trigger SAP Afaria to profile check managed devices upon network resource request to detect jail-broken, rooted and non-compliant handhelds and to restrict access until the device adheres to policy

* Fortify a range of user, device, application and data policies though network-enforced controls, such as password strength, configuration, application use, encryption and data protection

* Provide powerful compliance rules engines at the device and network level, that support on-demand and automated responses such as reconfigure, remote wipe and network reassignment

* Provide unified visibility and reporting for all mobile endpoint devices including PCs, smartphones, tablets and laptops through the ForeScout CounterACT platform

The integration between ForeScout CounterACT and SAP Afaria MDM is provided via the ForeScout MDM Integration Module, which is an add-on to ForeScout CounterACT, the company’s award-winning network security solution. ForeScout CounterACT is a real-time security solution that delivers complete visibility and automated control for all devices, users, systems and applications attempting to connect to or on an enterprise network - wired or wireless, managed or unmanaged, PC, VM, embedded or mobile.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo