Accellion, Inc., the pioneer in providing enterprise-class, secure cellphone productivity solutions, recently announced new enhanced features for cellphone management and device control. Accellion now provides IT and security organizations with selective remote wipe, whitelisted cellphone apps and strengthened IT admin controls, enhancing the security of business-sensitive information, while complying with industry data security regulations.

The Accellion enhanced remote wipe feature gives administrators device-level management not previously offered by a cellphone productivity solution, to further ensure the security of an organization’s data. This feature addresses two common security scenarios. The first is if a device is lost or stolen the Accellion remote wipe feature only targets business data held in the encrypted Accellion file container, employees who have their cellphone content wiped will not lose any personal information, or have their device reset to factory settings. Considering that more than 8,000 cellphone devices were left in top airports over the span of a year, this is a critical function for organizations to have at their disposal. The second is if an employee leaves the company an IT admin can wipe data at the individual level, which is essential if the user shared a machine with other employees.

“The massive proliferation of consumer devices including smartphones and tablet computers is driving the trend of IT consumerization within the enterprise, which has serious and immediate implications for IT risk management,” said Jon Oltsik, senior principal analyst, ESG. “CISOs can’t delay; they need detailed security strategies for cellphone use in the enterprise that include acceptable use policies, cellphone device and content management, and security controls.”

In addition to the new remote wipe feature, Accellion offers a number of new administrative controls so that security and IT professionals can ensure the privacy and compliance of their organization’s cellphone content. These features include:

  • Whitelisting apps: Admins can whitelist specific apps employees can use to open their documents on cellphone devices, ensuring that sensitive business content is not replicated or stored in unmanaged cloud apps.
  • Customisable user profiles: IT admins can customize collaboration and file transfer capabilities for individual users and groups of users depending on business requirements. These custom profiles, and their accompanying security controls, are easily applied across targeted users with a few clicks.
  • Native anti-virus integration: As part of the Accellion solution, organizations can choose to run all data through Accellion’s AV scanning so that malware is blocked from entering the network or cellphone device.
  • Multi-LDAP support: Accellion offers multi-LDAP support, enabling enterprises to simultaneously connect to numerous LDAP servers for user authentication.
  • DLP integration: Accellion integrates with a number of DLP solutions via the ICAP protocol, including Symantec (Vontu), RSA, Fidelis, Palisades, Websense and Code Green Networks, extending data leak prevention to cellphone usage.
  • FIPS 140-2: Accellion is the only cellphone file sharing vendor in the market offering a FIPS 140-2 certified module, providing the highest level of government-grade security software certification.

“More than 75% of the workforce will be cellphone by the end of 2013, and Accellion is dedicated to improving the way employees and IT admins alike secure their organization’s cellphone data,” said Vidhya Ranganathan, senior vice president of engineering, Accellion. “Security and IT departments need better oversight of any device where corporate data lives, to reduce the risk of data leaks. Our enhanced cellphone management and device control features do just that for our customers.”

Accellion provides a number of other offerings to secure an organization’s data, such as auditable reports, single sign-on capabilities through SAML and Kerberos, and the ability to configure multi-site deployments spanning public, private and hybrid cloud platforms. Visit the Accellion solutions page to learn how IT departments can customize Accellion’s controls to their preferred level of security and control.

Find out the state of adoption, trends and opportunities with Artificial Intelligence (AI) in physical security.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...