Welcome!

IoT User Interface Authors: Liz McMillan, Leon Adato, Dana Gardner, Elizabeth White, Derek Weeks

News Feed Item

Armor5 Extends Its 'Zero Touch' Cloud Security to Google Apps for Business

Enterprises Gain 'Last Mile Security' for Google's Cloud-Based Email and Productivity Apps

SANTA CLARA, CA -- (Marketwired) -- 03/17/14 -- Armor5, creator of Zero-Touch Cloud Security, today announced that it has extended its Zero Touch Cloud Security service to Google Apps for Business™, including Google Gmail™, Google Docs™, Google Drive™ and Google Sheets™. The Armor5 service gives enterprises protection against data leakage, compliance exposures and privacy breaches at the last mile between the cloud and the device -- when employees and contractors bypass perimeter security controls and access cloud-based Google Apps for Business from their devices.

"By 2018, 25% of corporate data traffic will bypass traditional perimeter security defenses (up from 4% today) by flowing directly from mobile devices to the cloud," according to Gartner. The recent Gartner report advises, "As the adoption of cloud computing and mobility accelerates, new revenue opportunities will emerge, together with the need for better service reliability and security. CSP strategists should move quickly on the opportunities and address associated challenges." (Source: Gartner, Predicts 2014: CSPs' Opportunities and Challenges Will Arise From Cloud Computing and Mobility Trends, November 27, 2013)

"The number of companies using Gmail and Google's cloud-based productivity suite for business is increasing at a rapid pace," said Suresh Balasubramanian, CEO of Armor5. "But when mobile users access or download corporate data from these cloud services, companies open themselves up to a new set of security, compliance and privacy risks. The current security approach is like putting a padlock on the front door, but leaving a side window wide open! Armor5 secures the 'last mile' -- the time when users access and/or edit data within third-party cloud services, while using their devices."

With Armor5, employees can instantly open up a secure session on any device or network to access/edit content stored within Gmail, Google Docs, Google Drive, and Google Sheets, without requiring additional device control software or network configuration changes. Armor5 virtualizes the user's experience and places the security function in the cloud, where it is isolated from the device and the network. The enterprise policy controls are seamlessly extended from the network perimeter to enforce access to cloud services without requiring any additional effort from the enterprise.

With Armor5, data and content never reside on the device - protecting companies against potential data leakage whenever a device is lost, stolen, compromised or when a worker leaves the organization. Employees and contract workers with access to company, employee or customer data in key functions such as accounting, finance, legal and customer management, as well as those that integrate Google Productivity tools with data from applications secured in the Google Apps Marketplace™ also gain "last mile security" and seamless enterprise policy controls from any device.

Armor5's support for Google Apps for Business provides enterprises with data leak prevention and compliance in the cloud, as well as cross-cloud analytics.

  • Eliminates Data Leakage - Instantly prevents data leakage from Google cloud services by dynamically creating a secure cloud session from any device, on any network. No data or content ever hits the device and is not cached, eliminating the need for remote wipes.

  • Extends Corporate Policies to the Cloud - Corporate policies such as time fencing and geo fencing are enforced dynamically, based on existing business rules.

  • Aggregates Cross-Cloud Analytics - A comprehensive view into cloud service usage across multiple public and private cloud services including individual session duration, most frequently used services etc.

When accessing Google Apps for Business, the Armor5 service also preserves employees' privacy as well as the user experience.

  • Protects Employee Privacy - The service is only 'on' when users choose to access corporate apps and data, relieving enterprises of privacy exposure during personal use. Corporations can also avoid privacy breaches resulting from remote wipes, which are unnecessary with Armor5 since data is not resident or cached on the device.

  • Preserves the User Experience - Works with any internet-enabled device using a standard browser, without installs or configuration changes on the device or enterprise DMZ, while operating at a zero performance deficit.

What is Armor5 Zero Touch?

The Armor5 Zero Touch approach requires zero installs or configuration on the device or DMZ, operates with a zero performance deficit, and leaves zero data on mobile devices -- completely eliminating the risk of data loss. This on-demand cloud service uses a unique URL and leverages existing authentication mechanisms to ensure a smooth and instantaneous roll out to the workforce.

Availability

Armor5 support for Google Apps is immediately available as part of the Armor5 cloud service. For more information and a free trial, visit: www.armor5.com/enterprises/for-google-apps/.

About Armor5

Armor5, creator of Zero Touch Cloud Security, is a worldwide leader in on-demand cloud services security that gives users instant access to cloud services, corporate apps, data and content on any device, while simultaneously protecting enterprises against data loss, privacy and compliance liabilities. The Armor5 Zero Touch approach requires zero installs or configuration, operates with a zero performance deficit, and leaves zero data on mobile devices - completely eliminating the risk of data loss. Founded in 2012 by former executives from Adobe, Motorola and Yahoo, the company is privately held with patent-pending technology and investment from leading venture capital firms and Citrix Startup Accelerator. For more information, visit www.Armor5.com or follow @armor5Inc.

All product and company names herein may be trademarks of their registered owners.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Media Contact:
Barbara Reichert
Reichert Communications
o) 650.548.1002 c) 415.225.2991
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, will discuss how research has demonstrated the value of Machine Learning in delivering next generation analytics to im...
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
This is not a small hotel event. It is also not a big vendor party where politicians and entertainers are more important than real content. This is Cloud Expo, the world's longest-running conference and exhibition focused on Cloud Computing and all that it entails. If you want serious presentations and valuable insight about Cloud Computing for three straight days, then register now for Cloud Expo.
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
SYS-CON Events announced today that Stratoscale, the software company developing the next generation data center operating system, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Stratoscale is revolutionizing the data center with a zero-to-cloud-in-minutes solution. With Stratoscale’s hardware-agnostic, Software Defined Data Center (SDDC) solution to store everything, run anything and scale everywhere...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
Angular 2 is a complete re-write of the popular framework AngularJS. Programming in Angular 2 is greatly simplified – now it's a component-based well-performing framework. This immersive one-day workshop at 18th Cloud Expo, led by Yakov Fain, a Java Champion and a co-founder of the IT consultancy Farata Systems and the product company SuranceBay, will provide you with everything you wanted to know about Angular 2.
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
SYS-CON Events announced today that Enzu, a leading provider of cloud hosting solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to foc...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
You deployed your app with the Bluemix PaaS and it's gaining some serious traction, so it's time to make some tweaks. Did you design your application in a way that it can scale in the cloud? Were you even thinking about the cloud when you built the app? If not, chances are your app is going to break. Check out this webcast to learn various techniques for designing applications that will scale successfully in Bluemix, for the confidence you need to take your apps to the next level and beyond.
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...