AGAT

Categories
BYOD LyncShield Microsoft Lync Mobile Security Uncategorized

LyncShield offers safe mobile connection to Microsoft Lync servers

AGAT Software Solutions launched today LyncShield, an innovative solution that guarantees secure mobile Lync connectivity, to protect against Active Directory (AD) credentials theft, block DoS, DDoS and brute force attacks, and enforce connection to registered devices.

Connecting devices to corporate networks from non-managed external networks and public Wi-Fi networks poses critical security threats. Corporate credentials are stored on mobile devices that might be hacked or stolen. The low level of device security enables hackers using Active Directory usernames and passwords to access core business applications and view confidential data unnoticed.

LyncShield was developed specifically to mitigate this risk and to allow workers to safely use their own devices outside the corporate network.

“A growing number of enterprises and organizations encourage employees to bring their own devices and to use them to access privileged company information,” said Guy Eldan, CEO of AGAT Software Solutions. “LyncShield offers a new approach that completely eliminates the need to store Active Directory passwords on the device and does not require any additional client installation, making it an ideal security solution for BYOD.”

LyncShield interacts directly with client-server Lync traffic and effectively controls who connects to the network based on the device used and not only on credentials.

LyncShield offers the following features:

  • Active Directory protection – eliminates the need to use Active Directory credentials
  • Two-factor authentication
  • Blocks DoS, DDoS and brute force attacks
  • Reverses proxy Lync publishing on Microsoft and non-Microsoft platforms

The solution, which can be easily installed and integrated, is available either as an add-on to Microsoft Forefront (ISA/TMG) or on a dedicated reverse proxy developed by AGAT – Bastion.

By using LyncShield the organization can determine which mobile devices will be granted access to the system.

AGAT intends to launch a similar solution for Microsoft’s SharePoint and Dynamics CRM in the first quarter of 2014.

Categories
BYOD Mobile Security Uncategorized

The risks of BYOD policies for businesses

A survey published this week indicates that The majority of IT and IT specialists believe their companies do not use tools or policies to protect corporate data from risks arising from Bring Your Own Device (BYOD) policy.

The research, which was conducted by the by the Ponemon Institute for Zix Corporation shows that 60 percent of IT professionals are unsatisfied with current BYOD solutions, mostly due to cost and inadequate security.

The report shows that 56% of IT managers claim their companies are looking to replace their current BYOD security solution. Moreover, an alarming 46%, those working in companies that support BYOD, said they do not use tools or policies to protect corporate data.

It is also interesting to note that 28% of respondents said that their companies have limited BYOD deployment due to and inadequate security tools (28%), while 37% answered that their companies use mobile device password policies only.

BYOD is clearly on the rise but organization using such policy should remember that risks include:

  • Smartphones and tablets are easy prey for thieves and people often lose their phones or leave them unattended in public places
  • Devices are personally owned, changing employee expectations about privacy and security.
  • Employees take work off-premises: A Harris Interactive Poll (2011) found that more than 50 percent of employees use portable devices (smartphones, tablets, laptops, and flash drives) to take sensitive information outside company facilities.
  • Employees are liable to copy data from the corporate network onto their personal devices even when told not to.
  • Employees value convenience more than security and if a security policy is overly cumbersome or inconvenient, employees will find a way around it.
  • Lack of effective tools to enforce a secure BYOD setup.