Welcome!

Machine Learning Authors: Yeshim Deniz, Pat Romanski, Liz McMillan, Zakia Bouachraoui, Elizabeth White

News Feed Item

Bitzer Redefines Mobile File Access to Corporate Intranet

Bitzer m/Drive Enables Direct Mobile Access to Windows File Servers, Eliminating Cloud Security Risks

SUNNYVALE, CA -- (Marketwire) -- 02/25/13 -- Bitzer Mobile Inc., a technology leader in secure enterprise mobility, today announced the launch of m/Drive, an enterprise grade mobile app that enables secure direct access to corporate Intranet files from mobile devices. Bitzer m/Drive is designed for enterprises to provide secure, authenticated access to Windows Network Intranet files from employee mobile devices, without the requirement of cloud-sync applications. For more information and an online demonstration, please visit www.bitzermobile.com/mDrive

Today's mobile employees are demanding access to corporate Intranet resources and data from their personal phones and tablets to increase productivity. Savvy employees bypass the traditional network perimeter by using cloud-based file sharing applications on laptop, desktop and mobile devices, which frequently sync data to cloud services that are not under enterprise IT control, and pose potential liability and risk for enterprises.

Enterprise IT prefers that mobile employees access Intranet files directly from existing Windows file servers that have been provisioned by IT with role based access control. However, this direct access from mobile devices is not possible today because mobile devices cannot log-in to the Windows Network without compromising network security using constrained delegation. Bitzer's patent pending technology enables smartphones and tablets to log into a Windows Network and access corporate file shares without compromising security by using true Kerberos SSO. Bitzer m/Drive provides seamless browsing and transfer of Intranet files, as if employees were navigating using a local Windows drive. In addition, it is available at a fraction of the cost for an enterprise license of popular cloud-based file syncing products.

"The typical end user has three or more endpoint devices and they want to access their corporate data from all of them. But corporate data often lives on file servers or NAS devices locked behind a VPN. While some companies are putting data into the cloud to solve the access issue, there are terabytes of data sitting within an enterprise that is not moving to a cloud anytime soon," said Terri McClure, Senior Analyst at ESG. "Bitzer has found a unique approach to enable end users to have safe, authenticated access to data while encrypting data-at-rest, in-transit and in-use. This addresses the security needs of security-minded companies and user experience sought by the employees."

Bitzer m/Drive offers following features and capabilities:

  • Ability to access Intranet file servers from mobile devices using true Windows network login
  • Ability to upload and download files, creation and deletion of folders on the share
  • Ability to share a file using the integrated e-mail client as well as a built in editor for Microsoft PowerPoint, Excel and Word documents
  • Integration with existing Windows authentication back-end using Active Directory for role-based access
  • Out of the box integration with Bitzer's BEAM platform, which includes e-mail, calendar, contacts, and a secure browser to the enterprise intranet
  • Fine-grained policy based access control for a secure workspace; easy enforcement of data governance such as sharing, clipboard control, geo-fencing and time-based restriction
  • Integrated app-tunnel for authorized access to Intranet, which eliminates need for wide-open VPN connectivity

Bitzer m/Drive is available immediately for corporate IT users. Enterprise pricing for m/Drive starts at $7 per user per month; which includes Bitzer Secure container and secure remote access to corporate intranet. Please contact Bitzer to set up a demo.

About Bitzer Mobile
Bitzer Mobile Inc., a leading enterprise mobility solution provider, enhances employee productivity by allowing secure access to corporate apps and data from mobile devices while preserving rich user experience. Its secure container solution creates the enterprise workspace on any mobile device -- corporate owned or personal, and for all mobile platforms. Employees get seamless access to intranet, corporate data and apps with enterprise-grade security and deep integration with Windows Authentication for true Single Sign-On. For more information, please visit www.bitzermobile.com/mDrive

Add to Digg Bookmark with del.icio.us Add to Newsvine

Media Contact:
Dan Chmielewski
Madison Alexander PR
714-832-8716
M: 949-231-2965
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

CloudEXPO Stories
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 Cloud Computing Blogger for IT Integrators" by CRN (2015). Mr. Jackson's professional career includes service in the US Navy Space Systems Command, Vice President J.P. Morgan Chase, Worldwide Sales Executive for IBM and NJVC Vice President, Cloud Services. He is currently part of a team responsible for onboarding mission applications to the US Intelligence Community cloud computing environment (IC ...
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the steps so your team's apps not only function but also can be monitored and understood from their machine data when running in production.
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.