Palo Alto Networks has launched new software to protect enterprise data on mobile devices.
GlobalProtect offers new capabilities that helps organisations deliver protection for enterprise data that resides on mobile devices, while respecting personal boundaries.
The new capabilities extend an organisations’ ability to control access to enterprise applications and data based on key policy criteria such as application, user, device, and device state.
According to a company statement, early enterprise adopters of the BYOD trend have relied on technologies like mobile device management, mobile application management, or enterprise mobility management to address their device management needs, but these fall short in security measures.
GlobalProtect blends the necessary device management and network security technologies into a single integrated product to manage the device, protect the device, and control the data movement.
Through the native integration of these three core capabilities, GlobalProtect enables organisations to address their security needs and the privacy requirements of the user, while maintaining the productivity power of the native app experience.
Exeter finance, senior security engineer Blake Wofford, said his company was pleased with the ability to extend protection to mobile devices with GlobalProtect.
"We looked at the options on the market for mobile security and felt that GlobalProtect provided what we needed the most – a way to make sure that the devices were safe for use in our corporate environment.”
Palo Alto Networks senior vice president, product management, Lee Klarich, said the new offering lets customers manage the often conflicting goals of enabling the use of mobile devices, keeping the network protected from malware and unauthorised data access, and respecting the users’ privacy.
"Most important, GlobalProtect allows enterprises to retain the productivity benefits of the native mobile app experience while extending our Next-Generation Firewall and global threat intelligence capabilities from the network core to the endpoint device.”