rolex
SSupported by cloud hosting provider DigitalOcean – Try DigitalOcean now and receive a $200 when you create a new account!

Secure.Systems Delivers A Rich And Unimpeded Mobile Experience For Employees Working Remotely

Listen to this article

SyncDog is an independent software vendor for building mobile frameworks that extend app functionality to devices while securing corporate and government networks from mobile-endpoint threat. Below is our recent interview with Jonas Gyllensvaan, Entrepreneurial Business & Technology Leader at SyncDog:

Jonas Gyllensvaan

Q: Could you tell us something more about your flagship solution, Secure.Systems?

A: SyncDog’s flagship solution, Secure.Systems™, delivers a rich and unimpeded mobile experience for employees working remotely, and supports a multitude of enterprise collaboration apps within a NIST-certified (FIPS 140-2 cert. #2687), containerized workspace. Secure.Systems™ is ideal for organizations that want to deliver a rich mobile app experience across BYOD, CYOD (choose your own device), or other remote device policies. SyncDog works with SMBs and enterprise-sized organizations in Healthcare, DoD/Federal Government agencies, Financial Services, and other industries where data security standards are tightening their grip on the way information is managed.

Q: How did you get started in the software business?

A: When I started SyncDog in 2013, I had already been working in mobile technology for years and I began noticing growing gaps in the marketplace for providing mobile security solutions. The larger full-service IT vendors had very little competition, and this created a mobile security market with bullish business practices-rigid and expensive pricing structure, numerous acquisitions leading to poor or discontinued customer support, endless integration cycles, and mass-produced solutions with breadth of footprint but lacking in depth of function. Ultimately, customers were left with few alternatives. I knew I could leverage my mobile technology subject matter expertise to challenge enterprise IT vendors with flexible, customer-centric solutions and service. This is our mission, and we’re encouraged by the traction we’ve gained in just a short period of time.

SyncDogRecommended: Taty Construction – The Company With One Mission To Build What Matters On Time And On Budget

Q: You’ve been named one of 2017’s 30 Best Companies to Watch; could you tell us something more?

A: 2017 was a great year for us and we attribute that to our strong customer and partner relationships. We take a personal approach with our customers and partners, and this direct line of communication helps us make sure the product fits their requirements and helps our development roadmap hit the target with more accuracy in future versions. We continue to speak with the analyst community to deliver solutions for marketplace need in the ever-changing InfoSec world. We try to keep our products ahead of the game and keep the mindset that they will change within a year. We’re a smaller company with the ability to move quickly and adapt faster than mega-software IT vendors and this allows us to stay up to date with customer needs.

Q: Tell us a little about the mobile security market you are in?

A: Enterprise mobility management is a growing market as more enterprises are allowing employees to access company data off personal devices and adopting Bring Your Own Device (BYOD) policies to provide the best end-user experience. However, these devices can be a big risk to an organization’s security network and data security standards. Seventy-four percent of organizations either already use or are planning to adapt BYOD policies, according to Tech Pro research. With more organizations using mobile devices, comes more risk, malware, and hackers. Mobile devices are highly vulnerable to cyber threats and our goal is to increase their protection without losing functionality. Secure.Systems™ is unique in that it satisfies data security requirements without compromising the end-user experience.

Q: Tell us something that we don’t know about this market that should raise some eyebrows.

A: Mobile devices are extremely vulnerable to cyber threats without the proper defense system. There were 1.5 million new incidents of mobile malware in the first quarter of 2017 alone, according to McAfee Labs. It’s a tough decision companies must make to allow employees to use their personal devices but it cheaper for the employer, easier on the employee and allows data to be shared more smoothly and remotely. However, organizations must make sure they are keeping up with data security standards.

Compliance is the largest challenge in cyber security, and when GDPR regulation is enacted in May 2018 in Europe we think many organizations worldwide will be thrown off-balance. Mobile malware is only increasing in sophistication and frequency, and the penalties for breaches that expose non-compliance will be heavier than ever. Penalties for GDPR non-compliance will alter the playing field for security and compliance worldwide. Secure.Systems™ provides organizations with a secure, containerized workspace in accordance with the compliance mandates in GDPR, HIPAA, FISMA, PCI DSS, and others.

SyncDogRecommended: Approyo – Simplifying SAP Solutions for All Businesses

Q: How are you different from competition?

A: Our flagship enterprise mobility security product, Secure.Systems™ provides a defense-grade mobile workspace that allows organizations to control and manage how employees work remotely and exchange relevant, time-critical information back and forth between their devices and the organizations’ secure networks, without sacrificing application functionality. Other products out there don’t offer our suite of workplace applications like SharePoint, Office Suite, Office 365, Enterprise Chat and more in a military-grade container that secures organizations’ data both on employees’ devices and in transit to the datacenter. Our product is also easily deployed and managed and can be quickly installed by users.

SyncDog is uniquely positioned in the market to offer the most flexible solutions that deliver the most comprehensive security. It is often the case that large international mega-software vendors build less-than-stable, high-bandwidth solutions with high total costs of ownership. The support and service that follows often leaves customers wanting – or as we’ve seen in Good Technology’s case, support and service is discontinued due to an acquisition. As an ISV, SyncDog bypasses this volatility and support insufficiencies trending in the EMM/MDM market by taking a personal, hands-on approach to customer requirements and using that data to build the most relevant mobile security solutions.

Q: Can you share any use cases?

A: Case Study: An Attestation of Success
Client: Large Metropolitan Police Department
Industry: Law Enforcement

Background: Crime scene processing is often chaotic and unpredictable. Adherence to workflow and process for the initial assessment of the scene and subsequent information gathering are critical success factors in solving and preventing future criminal activity. The MPD audit determined that the process of uploading data to the secure datacenter was both cumbersome and risky.
Challenges:
• Audited MPDs struggled to transfer data from a crime-scene to the MPD’s secure datacenter securely, and unsecured SMS texts about investigations were often found on BYOD or CYOD devices. Both mobile security insufficiencies presented a high risk of data leaks with the change to negate cases.

IT faced the challenge of managing the workflow, managing security intelligence on employees’ mobile devices as they work in the field, and facilitating an efficient transfer of information from mobile devices to the department’s secure network environment.
Results:
• SyncDog’s Secure.Systems™ container provided the typical MPD with dramatically improved workflow and law enforcement compliance when handling sensitive crime-scene data.
• The solutions were deployed quickly, easily configured, and intuitive to learn, and provided secure data transfer to their secure network from a NIST-certified FIPS 140-2 certified (#2687), AES 256-bit encrypted container residing within each device.
• This simplification of crime-scene processing and security ties up the loose ends of traditional processing such as Micro SD cards and unprotected SMS texts, and allows police and detectives to focus more on investigations than security risks, auditing, and compliance.

Q: What are you working on for 2018 and beyond?

A: We will continue our path to organic growth in the U.S. through direct channels and leveraging partners in both the U.S. and Europe to expand overseas. We will continue to work in just a few verticals (banking/finance, healthcare, government, aerospace) where we have traction.

SyncDog has also been steadily adding leadership resources and development infrastructure to serve its customers in the most attentive ways possible, including the recent addition of Brian Egenrieder, SyncDog’s new VP of Sales. Brian brings more than 24 years of sales leadership and experience in the software and business solutions industry.

SyncDog’s development team is also continually improving the end-user experience for the most productivity and ease-of-use within the Secure.Systems™ container, as well as working hard to increase application offerings that speak to enterprise workflows.

Activate Social Media:
Facebooktwitterredditpinterestlinkedin
,
Mercedes-Benz-EQS