Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SAN FRANCISCO, CA -- (Marketwired) -- 07/07/15 -- Bluebox Security®, the mobile app security and management company, today announced an implementation partnership with PEGRight, a security system integrator that provides proven identity and access management (IAM) services, to enable organizations to accelerate the integration of Bluebox-secured apps with IAM solutions. This partnership allows enterprises to secure, manage and distribute mobile apps leveraging existing IAM investments and makes secure mobile productivity easy for employees and IT.
Simplicity and immediacy define mobile success and enterprises demand the same capabilities from their mobile app security solutions. A secure single sign-on process for mobile apps streamlines the user experience and eliminates passwords from being stored on the device. PEGRight's best practices in IAM configuration and deployment complement Bluebox's packaged integrations for Okta, OneLogin and other leading SAML 2.0 compliant IAMs, such as Ping identity, ensuring a fast time to value by seamlessly enrolling users in Bluebox.
"The rising popularity of single sign-on solutions makes IAM integrations one of the most requested features by our customers. PEGRight's deep domain expertise in IAM implementations complements our SAML 2.0 compliant integrations to accelerate time to value for mobile first enterprises," said Pam Kostka, CEO of Bluebox. "We continuously strive to improve the speed of delivering secure productivity across the mobile lifecycle, not only for employees, but to minimize the demand on already overburdened IT organizations."
Bluebox can convert thousands of third-party commercial apps, as well as custom apps, to self-defending apps in seconds. With dynamic app management, its cloud-based solution secures, distributes and manages mobile applications for employees, partners and contractors, allowing organizations to quickly respond to mobile business needs.
"Companies are increasingly seeking out mobile to enable productivity and enhance their business," said Paul Bailor, President and CEO of PEGRight. "Bluebox has taken an innovative approach to mobile app security and management and we're excited to partner with them to help accelerate the adoption and deployment of secure mobile apps in the enterprise."
Additional Resources
About Bluebox Security
Founded in 2012 by a team of security experts, Bluebox Security provides the leading mobile app security and management solution. Pairing deep mobile security expertise with dynamic app management, Bluebox ensures that enterprise security moves at the speed of mobile. The cloud-based solution helps enterprises securely enable mobile by protecting apps, detecting threats and responding quickly to keep data secure. Bluebox Security has received a total of $27.5 million in funding from Andreessen Horowitz, Tenaya Capital, Sun Microsystems co-founder, Andreas Bechtolsheim, SV Angel, and Google Board member Ram Shriram. The company is headquartered in San Francisco.
About PEGRight
Founded in 2013, PEGRight is a security systems integrator that provides proven identity and access management expertise and professional services at any stage of a project. We partner with the leading security technology vendors, including Ping Identity, BlueBox Security, Yubico and Netskope, to help Fortune 2000 IT organizations adopt cloud, mobile and collaboration technologies without introducing risk to the business. Visit www.pegright.com to learn more.
Media Contact
Melissa Siems
Bluebox Security
Email Contact
+1-415-298-1570
Katherine Nellums
LEWIS PR for Bluebox
+1-415-432-2451
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs