Magazine Store

10 Fastest Growing BYOD Solution Providers 2016

Secure Enterprise Mobility Solutions made simple: SyncDog, Inc.

The Bring Your Own Device (BYOD) market size is estimated to be valued at USD 366.95 Billion by 2022, as per a new research report by Global Market Insights, Inc. Increased proliferation of smartphones and the roll out of services such as 4G LTE are expected to drive market growth in both developing and developed economies. As employees are more acquainted with their personally owned devices, they can perform tasks more efficiently, thereby boosting productivity at work. In addition, it also helps in minimizing operating as well as capital expenditure. Growing consciousness about advantages of adopting of this system will be critical for industry growth over the coming seven years. One of the premier players to have taken advantage of this opportunity in the BYOD market aggressively is SyncDog.

Founded in 2013 by Jonas Gyllensvaan, the origins of SyncDog began with another start-up that was acquired by Fixmo. That company was Conceivium, and it featured pioneering technology in mobile device management. Jonas was the co-founder of Conceivium, one of the principle architects of the mobile device technology. Eventually Conceivium was sold and Jonas saw that there was a gap in the market for an ISV offering a best-in-class secure mobile application container. From this market opportunity was borne SyncDog, headquartered in Reston, Virginia.

SyncDog is the leading independent software vendor (ISV) for building secure infrastructure frameworks that protect enterprise networks from cyber breach from mobile computing sources. The SentinelSecure™ product line for application containerization and IoT (Internet of Things) module monitoring provide the industry’s most proactive approach to securing enterprise mobility computing.

The SentinelSecure™ data security solution delivers military-grade secure mobile device partitions or “containers” that can secure emails/contacts, calendar items, IM apps, Internet browsers, mobile file stores and other business apps provisioned on personal devices to be used in a BYOD or COPE (corporate owned personally enabled) setting.

In Conversation with the Key Executive

What was the motivation to start the company, and how did it all come together?
When I started SyncDog in 2013, I had already been working in mobile technology for years and noticed growing gaps in the marketplace for mobile security. The large international full-service IT vendors had very little competition and this created a mobile security market with bullish business practices – rigid and expensive pricing structures, numerous acquisitions leading to poor or discontinued customer support, endless integration cycles, and mass-produced solutions with little focus on customer requirements that made sense. Ultimately, customers were tossed around with little alternative. I knew I could leverage my mobile technology subject matter expertise to challenge enterprise IT vendors with flexible, customer-centric solutions and service.

Can you help us understand the current market landscape?
The EMM market has evolved and matured to the point where a recent trend of consolidation has a large number of independent vendors absorbed into large international full-service IT vendors. This has changed the market in a way – leaving an innovation and flexibility void as MDM/EMM services are monopolized and commoditized. BlackBerry’s acquisition of Good Technology last year was a telling sign of power struggles among enterprise mobile IT vendors as well. With each acquisition, key resources and knowledge from the acquired company are let go. In its wake are the customers and end users struggling for affordable solutions and support to manage them. There’s an opportunity in this market for ISVs to step up with sharp, flexible security solutions that are cost-effective, easy to manage, and focus on customer requests.

How is your company positioned in the current market scenario?
SyncDog is uniquely positioned in the market to offer the most flexible solutions that deliver the most comprehensive mobile security. As previously stated, it is often the case that large international software vendors that develop and support resources from acquisitions is reduced to levels where it can’t support innovation and customer service. The acquiring companies generally go into a sort of maintenance mode with the solution that is acquired. It’s true there is some integration, but very little innovation.

In many cases, the acquiring company is after the customer base. The resulting ability to support, service, and provide personal attention following an acquisition is lacking or discontinued entirely we’ve seen some of with the Good Technology/BlackBerry merger. As an ISV, SyncDog bypasses the volatility trending in the EMM/MDM market by taking a personal, hands-on approach to customer requirements and using that ground-level feedback to build the most relevant mobile security solutions.

What are the pain points of the industry addressed by the company?
As BYOD, and COPE force organizations into better EMM strategies, attention must now be focused on securing the data on devices versus the physical management of devices. Mobility as a whole is turning into another endpoint for government and industry to manage as the market looks beyond MDM to determine what tool can be used to protect key data from all mobile threats – whether internal or external.

Aside from the volatility and unpredictability in the market due to ever-changing solutions, we’re noticing a “see-saw” problem in enterprise mobile security where government or industry would either have an EMM investment that was too secure to be functional, or too open to be secure. Many mobile containers out there connect via VPNs which are known to be slow and unstable. VPNs are also known for high resource utilization, and high total cost of ownership. Enterprises often find themselves with a device-level security tool that lacks the productivity they experience from working within the firewall.

Incorporating a containerized approach to mobile security shouldn’t eliminate the productivity advantage that mobile technology made possible in the first place, and that’s one of many reasons we created SentinelSecure™.

Please give us a brief overview of the products and services offered by your company.
SyncDog’s flagship enterprise mobility security product is SentinelSecure™. This containerized mobile workspace allows organizations to control and manage how employees exchange relevant, time-critical information back forth between their devices and the organizations’ secure networks. Our “containerized” mobility security partition protects organizational data by employing FIPS 140-2 certified (cert. #2687), AES 256-bit encryption with a simple software-based deployment and no impact to productivity or application functionality.

The standard configuration of SentinelSecure™ comes with a full suite of productivity applications including SharePoint, Enterprise and Local Chat, Geo-location Services, DropBox, a personal Information Management (PIM) suite, Office 365, Secure Mobile App Management & Development, File Sync, and many more. Applications are categorized in these four key workflows:

  • Secure Communications
  • Secure File Management
  • Secure Internet/Intranet Access
  • Secure Location-based services

SentinelSecure™ can be deployed as a standalone container or as a complement to existing EMM/MDM investments. We have a solid partner ecosystem and have certified integration with MobileIron EMM, Snow Software EMM, Notify Technology EMM, and Apperian Mobile Application Management Platform, and we have field integrations with other EMMs and MDMs. SentinelSecure™ has version builds available with industry-specific configurations for Healthcare and U.S. Government Department of Defense workflow requirements.

Finally, as IoT continues to mature, SyncDog offers its SentinelSecure™ Infrastructure Framework for IoT, an agent-based software that monitors IoT modules and tracks access to your network. This tracking data is sent to SyncDog’s EMM solution or any other EMM.

What are the differentiating factors that set SyncDog apart from its competitors?
Organizations need a mobile security solution that offers the best possible device-level security and SOC monitoring capabilities without sacrificing end-user productivity. We listen to our customers, and while we can never predict with 100% accuracy what the next big thing will be, our open, exploratory approach with existing and potential customers yields clearly defined development plans for our solutions. After that? We’re a small company with the ability to move quickly. We can make adjustments that satisfy customer requests more nimbly than full-service IT vendors. But most importantly, we make adjustments that make sense to customers and to the marketplace.

We are going to grow this business gradually, so I can remain informed in the day to day architecture and development decisions. Playing a personal role in the smallest parts of our customer relationships and solution development allows me to see trends and opportunities before they mature.

When we identify a problem, we act from the standpoint of “security first,” and all development decisions are made with this in mind; then flexibility – we adjust to the customer and deliver on key requirements quickly; then independence – we do not rely on a MDM or any other technical framework, so we can be easily deployed with no infrastructure dependencies; and finally, scalable integration – once deployed, the framework allows for unlimited investment by companies mobilizing their business workflows.

What is SyncDog’s Revenue Model?
SyncDog is based in the Washington, DC metro area. We sell our solutions through both direct and indirect channels. The flexibility of the mobile app container allows the solution to be sold as standalone or bundled with a number of industry-leading MDM solutions, most notably MobileIron. SyncDog also has technology partnering agreements with EMM providers Snow Software, Notify Technology, and MAM provider Apperian.

Snow Software, based in the EU provides a distribution and support channel in Europe. SyncDog also has offices in Canada with development and support staff also located there. We are currently working on establishing partner channels in Latin America and Asia.

Who are some of your biggest clients?
Given the nature of IT security across government and industry, our clients are proprietary and must remain anonymous. However, you can get a feel for our reach by looking at our partner ecosystem listed above.

What is the road map ahead for SyncDog?
SyncDog is continually improving the end-user experience in the SentinelSecure™ mobile container. We are working hard to increase application offerings, and our work with a couple of mobile app development partners is giving each organization a secure environment to develop productivity applications that speak to their individual requirements. We are also actively growing our partner ecosystem, teaming up with EMM, MDM, and MAM providers to give our customers the ability to deploy SentinelSecure™ as a complement to existing mobile security investments or as a standalone EMM solution.

Additionally, we are adding infrastructure to SyncDog SentinelSecure™ in the coming months to provide more context-capable deployment of end-user policy management per organization. Geo-location and geo-fencing via GPS data and time-sensitive policy enforcement are a couple of examples of new things in store for our customers. Geographically speaking, we are continuing to expand with a new development office in New Brunswick, Canada, and we have partnered with a large mobile solutions provider in Europe, Snow Software. This ecosystem will enhance customer service and we’ll better understand marketplace requirements, while increasing the reach of our vision. We hope that in the coming years our influence in mobile security will reach government agencies, law enforcement agencies, banking, finance, healthcare, and others. We’re already knocking on some of those doors right now.

“The most vulnerable point of intrusion on your network is a BYOD or COPE (corporate owned, personally enabled) end point. This means that every personal app, game, and personal mobile widget an employee downloads on his/her phone adds another layer of vulnerability to your network.”

Meet the Master

Jonas Gyllensvaan, CEO and Founder: Jonas Gyllensvaan is a serial entrepreneur with more than 20 years of experience in mobile IT solution development and software business development. Jonas has founded three successful start-ups and is a current board adviser to several others. Over the past 20 years, Jonas has designed, developed and implemented technology projects for government agencies and commercial enterprises in more than a dozen countries.

Jonas spends a good portion of his time visiting customers and traveling to leading industry conferences learning about client and marketplace needs, using this knowledge to build solutions with a focus on technology architecture, product design and business management. Across his 20-year career in mobile IT, Jonas has a proven track record of leading-edge product development, building profitable companies while forging beneficial business partnerships for clients.