× Business
TelecomHealthcareDigital MarketingERPRetailMedia and EntertainmentOil and GasFood and BeveragesMarketing and AdvertisingBanking and InsuranceMetals and MiningLegalComplianceCryptocurrency
Technology
Big DataCloudIT ServiceSoftwareMobileSecurityNetworkingStorageCyber SecuritySAPData AnalysisloTBio TechQuality AssuranceEducationE-commerceGaming and VFXArtificial Intelligence
Platform
Cisco DATABASE Google IBM Juniper Microsoft M2M Oracle Red hat Saas SYMANTEC
Leadership
CEO ReviewCMO ReviewCFO ReviewCompany Review
Magazines
US ASIA ARCHIVE
Startups Opinion Yearbook Readers Speak Contact Us

Get unparalleled security for your Enterprise Mobility Applications from: SyncDog

image

“Battling cyber attacks today requires a new systematic approach that safely enables business operations and delivers application, user and content visibility and control. Only a purpose-built next-generation security platform can deliver on this promise and break the cycle of attacks.” –NirZuk

The internet has become a requisite part of life just like food and water. Billion dollar companies like Google and millions of small to medium firms in the planet structure their core businesses around it. It has a magnanimous presence that no one can ignore. Every network such as the internet has an Achilles heel that gets frequently exploited by malicious forces. Perpetrators in the form of hackers are the thorns that try to infect and deface business being conducted on the internet. Manhattan District Attorney Cyrus Vance, Jr. famously said “The Internet is the crime scene of the 21st century.”

Crime is now resilient in all aspects of the internet. Increasing cyber-attacks have forced Enterprises to install state-of-the-art systems to protect them against all kinds of cyber breaches and attacks. With evolving technologies like cloud and IoT and the increasing dependence of hand-held devices such as mobile phones, a need arises for a security software company that is proactive and continuously iterates its products and keeps them in sync with the latest technologies. SyncDog, and its product suite more than satisfies this need.

Meet the White Knight of your Enterprise Applications

SyncDog is the leading independent software vendor (ISV) for building secure infrastructure frameworks that protect enterprise networks from cyber breach from mobile computing sources. Incorporated in 2013, SyncDog has grown from its humble beginnings to an industry leading technology player. The company now competes with enterprise software vendors in the security industry with its flagship product-Sentinel Secure™.

Market Emplacement

SyncDog is an ISV focused on securing the enterprise data on mobile devices and tablets, and monitoring access to network data stores via mobility sources. The company has cutting-edge technology which encrypts and controls customers’ intellectual property. SentinelSecure’s™ containerized application approach provides a secure location on smart devices for enterprise data and applications. This enables end users to leverage mobile technology without prohibiting greater business work flows and functionality with higher levels of security.

Mitigating Mobility Security Challenges

The mobility security industry’s challenges include securing and encrypting applications, segmenting corporate IP and applications from the rest of the personal (BYOD and COPE) applications and data, and intrusive containers from competing solutions that negate functionality and performance on devices. SyncDog provides government-grade encryption without sacrificing performance and availability of business data and applications. The company also has a module monitoring product for IoT devices. It can collect log data from M2M IoT modules and populate MDM/EMM dashboards that can be SyncDog products or competing products. By 2020, there will be billions of M2M IoT connections and SyncDog I ahead of the curve on this development.

The Watchdog to Root For
SyncDog has more flexible pricing options than its competitors such as BlackBerry/Good Technology, MobileIron and AirWatch. This gives it a competitive edge, leading to lower total cost of licenses per seat and lower cost of installation and ownership. Additionally, SyncDog approaches customers in an independent consultative engagement, not relying on any other technical framework, thereby ensuring easy deployment of the solution with no infrastructure dependencies. It gives preference to security followed by flexibility in deployment options so that the customer’s end-user experience takes place without disruption. The company’s highly-flexible solution is a complementary tool to existing infrastructure and application security and compliance policies. Customer business strategies direct latest developments in SyncDog’s technology which generally come from CEOs, CIOs, CISOs and other senior managers directing the business. Most importantly, SyncDog leaders have been working on mobile device security since the late 1990s. SyncDog’s size positions it well to adjust to customer requests and make revisions to suit a multitude of changing requirements.

Winner of the 2015 TIC award for Change Agents, SyncDog has offices in Reston, VA USA and Ottawa, Ontario Canada.

SyncDog’s Product Offerings

The company has 3 main products:

  • SentinelSecure™ container for secure mobility.
  • SentinelSecure™ Infrastructure Framework for IoT.
  • Sentinel for Mobile Device Management, an MDM product.

The SentinelSecure™ container for secure mobilitydelivers defense-grade secure mobile device partitions or “containers” that can secure emails/contacts, calendar items, IM apps, Internet browsers, mobile file stores and other business apps provisioned on personal devices to be used in a BYOD or COPE (corporate owned personally enabled) setting.

The SentinelSecure™ product line for application containerization and IoT (Internet of Things) module monitoring provide the industry’s most proactive approach to securing enterprise mobility computing.

The SentinelSecure™ Infrastructure Framework for IoT provides a data feed from IoT modules into the Sentinel Server (mobile security monitoring) or other Enterprise Mobility Management (EMM)/Mobile Device Management (MDM) solution. SentinelSecure™ for IoT is the EMM industry’s only mobility infrastructure for securing enterprise datacenters from threats originating from IoT-connected devices.

imageThe SyncDog architecture protects both data at rest and data in transit through the Federal Information Processing Standard or FIPS 140-2, AES 256 bit encryption. SentinelSecure™ can be provisioned across the SyncDog Sentinel Server, a flexible agent-based MDM platform, or with any EMM/MDM solution.

Utilizing the SyncDog Sentinel Server (or comparable MDM) equipped with the SentinelSecure™ monitoring framework, IT security administrators have the enterprise visibility to incorporate mobile device security into organizational network management strategies that includes the proper audit trails for compliance.

Clientele and Verticals
The company is currently in a pilot program with a branch of the U.S. Government. SyncDog caters to verticals such as Government, Healthcare, Financial Services, Insurance and Aerospace and has a variety of clients from these sectors.

Partners
SyncDog has a network of partners around the world which include both technology and reseller partners. Industry partners who provide technology solutions that complement the SyncDog Technology are App47, Artifex, Arxan, Mobileyes, etc. The reseller partners are immixGroup, Star Communications, Vinitech and Mobileyes.

Case Study

SyncDog Secures the Metropolitan Police Department

The metropolitan police department faced a series of issues with crime scene restructuring. The problems that plagued them were:

  1. Elevated risk levels of data loss while getting the crime-scene data to their secure data center.
  2. Segmentation of Insecure data such as images, video, voice recordings and SMS texts from personal data on employee devices.
  3. Huge time delay in getting the crime-scene data into MPD’s secure network environment.

The MPD deployed SyncDog’s Sentinel Infrastructure Framework and SentinelSecure Container™ in to its system for handling the crime-scene data and the results were stunning.

  • The workflow for getting images, video and audio recordings to the secure network data store was dramatically streamlined. When an image or video was captured, automation sent the data immediately to the secure network. The need to transfer with SD card via laptop was eliminated and the risk to lost data was reduced.
  • With the addition of the SyncDog SentinelSecure™ container, law enforcement images, video, texts, and other recordings were segmented from personal data and high-risk personal games/applications. The container wrapped the law enforcement data in a secure environment protected by FIPS 140-2 grade encryption with an AES 256 algorithm.
  • With the simplification of the crime-scene processing workflow and added security, detectives and crime-scene techs could focus more on police work and worry less about auditing and compliance while investigating.

“The SentinelSecure™ product line for application containerization and IoT (Internet of Things) module monitoring provide the industry’s most proactive approach to securing enterprise mobility computing.”

News Flash

SyncDog, Inc. and Mobileyes Consulting, Inc. announce mobile app platform to improve patient outcomes at Connecticut-based mental health provider Counseling Centers of New England (CCNE)

SyncDog, Inc., the leading ISV for mobile application containerization and IoT module management, today announced Phase I of a comprehensive HIPAA-compliant workflow and messaging platform that allows mental health counselors and patients to communicate across mobile devices and tablets, with workflow templates designed specifically for counselors. The comprehensive mental health platform, SentinelSecure™ Mental Health Manager or MHM, will be deployed as a cloud-based application across the FIPS 140-2 compliant, SentinelSecure™ framework, a secure mobility IT infrastructure with secure containerized workspace that segments personal applications from corporate applications and data. Within the partnership, Mobileyes Consulting will facilitate as principle architect of the codebase for the MHM application that will connect mental health counselors with patients, improving communications and putting the patient in closer proximity to their healthcare providers. Please visit www.syncdog.com for the rest of the story.

Knowing the Gallant Paladin

Jonas Gyllensvaan, CEO and President – Jonas is a serial entrepreneur with over 20 years of experience in the information technology industry. He has been heavily involved in the day-to-day architecture and development of products for SyncDog from day one. Much of the innovation of SyncDog comes from the unique ability of Jonas to convert business requirements to technology and systems processes. He has founded three successful start-ups and has acted as an advisor to several other companies. Jonas has designed, developed and implemented technology projects for government agencies in over a dozen countries. His focus areas are technology architecture, product design and business management. He has a proven track record of leading edge product development, technology architecture, building profitable companies, and high level business partnerships.

“We are the leading ISV for containerized application security for enterprise mobile computing.”

Future Milestones

SyncDog is focused on constantly improving the end-user experience of the secure container. It will continue to increase the number of business tools and the secure interaction of applications within the product. Additionally, the company will be expanding the infrastructure of SyncDog Secure in the coming months in order to provide more context-capable deployment of end-user policy management for the corporation. Geo location and Geo fencing using GPS data and time sensitive policy enforcement are a few examples of new functionality that SyncDog will be bringing to the market in the next couple of quarters of 2016.

 

YOU MIGHT ALSO LIKE::

ENROLL FOR UPCOMING ISSUE