Click here to close now.

Welcome!

Wearables Authors: Liz McMillan, Pat Romanski, Elizabeth White, Lori MacVittie, Roger Strukhoff

News Feed Item

OpenPeak Unveils Security Enhancements to SECTOR™ App Wrapping Technology at CES

OpenPeak Inc., a leading provider of mobile device and application management solutions for enterprises, today announced enhancements to its SECTOR app wrapping technology, which now enhances mobile apps with support for per-app VPNs and three-factor authentication, including PIN, smart card and biometric technologies. Newly integrated with Precise Biometrics’ Tactivo, a smart card and fingerprint sensor designed for the iPhone and iPad, OpenPeak’s ADAM solution enables enterprises to enhance a secure, trusted workspace with unprecedented, multi-factor authentication and security features.

An organization can now set a policy to enforce the use of any or all of PIN, smart card, and fingerprint scan for accessing apps on mobile devices. Alternatively, fingerprint swipe sign-on can be conveniently used in lieu of PIN-based access to secure applications. The organization may also enforce the use of the industry standard IPsec VPN on a per-app basis.

Government organizations are now able to leverage these new features for enabling their Common Access Card (CAC) or Personal Identity Verification (PIV) cards to extend secured applications and data to mobile employees, government officials, law enforcement, and military personnel.

OpenPeak makes it possible for enterprises to integrate all necessary components of mobile security and management into a single, secure and unified solution, complete with a flexible and easy-to-use management portal. By defining policies via the administration portal of OpenPeak’s ADAM solution, administrators can choose to enforce OpenPeak’s full three-factor authentication or select a combination that works best for their specific security needs. OpenPeak’s VPN and three-factor authentication process are both fully automatic, requiring zero modifications by developers to the app’s source code.

OpenPeak’s VPN support adds a policy-driven, dynamically configurable app-level IPsec VPN, allowing wrapped apps to protect data in motion. IPsec is an industry standard suite of protocols for providing authenticated and secure communication over IP networks. Wrapped applications can work with leading VPN concentrators.

Debuting at the International Consumer Electronic Show (CES), OpenPeak’s VPN and three-factor authentication features support enterprises’ need for improved security in today’s increasingly mobile and independent workplace. In the world of BYOD mobility, enterprises must be able to easily secure and track ever increasing numbers of applications and content on a myriad of different devices and operating platforms.

“Thanks to the increased use of mobile devices, apps and content, we have a much more productive workforce than we did a decade ago – but with increased productivity comes the need for increased security and innovations in authentication,” said Jonathan Fischer, mobile security expert and OpenPeak’s Vice President of Global Technical Sales. “It’s time to look beyond just devices, and look towards the apps that run on those devices and the corporate data that is being accessed and moved around between those apps and backend data sources. We are eager to continually offer the most trusted, multi-pronged approach to security for enterprises.”

Every wrapped application on the OpenPeak platform will now be enhanced with support for three-factor authentication, making it easy for IT administrators to control sharing of sensitive data between applications on the same device and heighten security that spans individual applications.

Precise Biometrics' CTO, Michael Harris, says, "OpenPeak is addressing a growing concern for business and government alike; how to protect enterprise data and networks as employees become more mobile. In choosing Tactivo, OpenPeak is able to provide its customers strong authentication options on the iPhone and iPad, in a way that is easy and convenient to use."

These capabilities extend the comprehensive set of security controls that ADAM makes available to mobile apps, which include password control, per-app execution authorization policies, data at rest protection with per-app encryption keys, and controlled sharing of data between secure and non-secure apps.

To arrange for a private demonstration of OpenPeak’s three-factor authentication and security features during CES, contact Heather Kelly at [email protected].

About OpenPeak

OpenPeak Inc. is a leading mobility technology provider. OpenPeak designs end-to-end managed systems and solutions that enable Enterprises, SMBs and Education, Healthcare and service providers to provision and manage their customer’s mobile devices and applications remotely. ADAM™, OpenPeak’s advanced device and application management suite, is comprised of several components including SANCTION, SECTOR and OPENSHOP. Each component can be deployed individually to complement pre-existing device and network management configurations, or together as a complete end-to-end Device, Application and Profile Management solution. For more information, visit www.openpeak.com.

About Precise Biometrics

Precise Biometrics is a market-leading provider of solutions for fingerprint recognition to prove people's identities. With top-of-the-line expertise in fingerprint verification, Precise Biometrics offers fast, accurate and secure authentication of a person. The technology adds value to ID, enterprise and bank cards as well as access to mobile solutions (smart phones and tablets), computers and networks. Precise Biometrics serves business and government organizations throughout the world and its technology is licensed to close to 160 million users. For more information, please visit www.precisebiometrics.com and www.idApps.com.

OpenPeak, SANCTION, SECTOR, OPENSHOP and ADAM are trademarks of OpenPeak Inc.

TACTIVO is a registered trademark of Precise Biometrics AB.

Other trade brands, names, and marks used in this document are the property of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
There will be 150 billion connected devices by 2020. New digital businesses have already disrupted value chains across every industry. APIs are at the center of the digital business. You need to understand what assets you have that can be exposed digitally, what their digital value chain is, and how to create an effective business model around that value chain to compete in this economy. No enterprise can be complacent and not engage in the digital economy. Learn how to be the disruptor and not the disruptee.
2015 predictions circa 1970: houses anticipate our needs and adapt, city infrastructure is citizen and situation aware, office buildings identify and preprocess you. Today smart buildings have no such collective conscience, no shared set of fundamental services to identify, predict and synchronize around us. LiveSpace and M2Mi are changing that. LiveSpace Smart Environment devices deliver over the M2Mi IoT Platform real time presence, awareness and intent analytics as a service to local connected devices. In her session at @ThingsExpo, Sarah Cooper, VP Business of Development at M2Mi, will d...
Thanks to widespread Internet adoption and more than 10 billion connected devices around the world, companies became more excited than ever about the Internet of Things in 2014. Add in the hype around Google Glass and the Nest Thermostat, and nearly every business, including those from traditionally low-tech industries, wanted in. But despite the buzz, some very real business questions emerged – mainly, not if a device can be connected, or even when, but why? Why does connecting to the cloud create greater value for the user? Why do connected features improve the overall experience? And why do...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
Imagine a world where targeting, attribution, and analytics are just as intrinsic to the physical world as they currently are to display advertising. Advances in technologies and changes in consumer behavior have opened the door to a whole new category of personalized marketing experience based on direct interactions with products. The products themselves now have a voice. What will they say? Who will control it? And what does it take for brands to win in this new world? In his session at @ThingsExpo, Zack Bennett, Vice President of Customer Success at EVRYTHNG, will answer these questions a...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal an...
SYS-CON Events announced today that BMC will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BMC delivers software solutions that help IT transform digital enterprises for the ultimate competitive business advantage. BMC has worked with thousands of leading companies to create and deliver powerful IT management services. From mainframe to cloud to mobile, BMC pairs high-speed digital innovation with robust IT industrialization – allowing customers to provide amazing user experiences with optimized IT per...
We’re entering a new era of computing technology that many are calling the Internet of Things (IoT). Machine to machine, machine to infrastructure, machine to environment, the Internet of Everything, the Internet of Intelligent Things, intelligent systems – call it what you want, but it’s happening, and its potential is huge. IoT is comprised of smart machines interacting and communicating with other machines, objects, environments and infrastructures. As a result, huge volumes of data are being generated, and that data is being processed into useful actions that can “command and control” thi...
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
Collecting data in the field and configuring multitudes of unique devices is a time-consuming, labor-intensive process that can stretch IT resources. Horan & Bird [H&B], Australia’s fifth-largest Solar Panel Installer, wanted to automate sensor data collection and monitoring from its solar panels and integrate the data with its business and marketing systems. After data was collected and structured, two major areas needed to be addressed: improving developer workflows and extending access to a business application to multiple users (multi-tenancy). Docker, a container technology, was used to ...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In this session, James Kirkland, Red Hat's Chief Architect for the Internet of Things and Intelligent Systems, will describe how to revolutionize your architecture and...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.