Technologies

Deep relationships. A diverse portfolio. Tangible results

We work with leading and visionary vendors across our three domains of excellence: Mobility, Cloud Security and Security Intelligence. We then invest in building powerful and deep relationships which include certification and becoming masters in the ecosystem.

We are uniquely positioned to understand how these market leading technologies work together and how they combine to deliver exceptional results. In many cases, Bridgeway’s strategy, project management, deployment and support capability are considered the de facto standard and recommended by our partners.

By working with the world’s most visionary vendors, we always have access to the technology which can best Deliver your chosen security and risk posture

The world’s leading security technologies

Bridgeway is here to help you choose the best-fitting solution.

Call us now on 01223 979 090

Accellion provide mobile solutions to enterprise organisations enabling increased business productivity while ensuring security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them.

Accellion provide mobile solutions to enterprise organisations enabling increased business productivity while ensuring security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them.

kiteworks is Accellion's next generation secure mobile file sharing and collaboration platform. kiteworks provides organisations with an intuitive, re-imagined user interface that empowers users to seamlessly access, share, and manage content across devices with a streamlined and consistent experience across mobile, web, and desktop.

kiteworks connects to existing content systems to provide a single user interface for mobile access to enterprise content, and enables secure external sharing while always maintaining integrity of the document of record.

Designed with unparalleled flexibility and scalability, Accellion provides organisations with less than 100 users to more than 100,000 users with flexible deployment options. Implementations can grow from a single office to a global distributed deployment.

kiteworks represents the leading private cloud platform optimised for security and control, which enforces data sovereignty for global deployments, and provides extreme scalability and agility via a three-tiered architecture. Accellion supports deployment in a private on premise, private hosted, or hybrid cloud; or FIPS 140-2 certified environment. All Accellion deployment options can be mixed and matched in a multi-site installation or installed as a standalone single site solution.

Eighty percent of Accellion customers choose to deploy the solution in a private cloud for increased data security and protection, often required by corporate and government organisations. With Accellion solutions, organisations can provide their users with secure anytime, anywhere access to enterprise information while protecting confidential information, ensuring compliance, improving employee productivity and reducing IT support.


Cisco Cloud Web Security provides industry-leading security and control for the distributed enterprise. Users are protected everywhere, all the time when using CWS through Cisco worldwide threat intelligence, advanced threat defence capabilities, and roaming user protection.

Cisco Cloud Web Security (CWS) provides industry-leading security and control for the distributed enterprise. Users are protected everywhere, all the time when using CWS through Cisco worldwide threat intelligence, advanced threat defence capabilities, and roaming user protection.

Features and Capabilities

Defend Against Web-Based Threats

Get near-real-time web protection, plus granular application visibility and control. CWS offers:

  • Zero-day defence through heuristics engines, signatures, and more in a single cloud-delivered service

  • Analysis of more than 100 TB of security intelligence and 13 billion web requests daily to detect and mitigate threats

  • Granular visibility and control of more than 150,000 applications and micro-applications

Defeat Advanced Malware
Get advanced malware protection with detection and blocking, continuous analysis, and retrospective alerting. CWS provides:

  • Advanced security for advanced threats to defeat known and unknown threats

  • Protection across the attack continuum—before, during, and after an attack

  • Superior visibility and control to see more detail and set granular policies

Reduce Costs

Move to an operating expenses (OpEx) model that lowers complexity for IT, while getting more out of your existing Cisco investment:

  • Reduce costs by 30 to 40 percent, compared with on-premises products, with best-in-class malware defence

  • Get built-in connector capability for Cisco web security appliances, firewalls, routers, and secure mobility clients

  • Lower OpEx; let Cisco manage the backend infrastructure, with instant access to threat and application intelligence

Scale Your Solution with High Availability

Don't worry about adding another box for your web security challenges. Support a distributed enterprise across headquarters, branch offices, and roaming devices with unified policy enforcement, management, and reporting:

  • Achieve 99.999 percent uptime

  • Right-size your web security investment with per-user subscriptions that scale as your business grows

Connect to the Cloud with Flexibility

Easily authenticate and redirect traffic to the Cisco Security Cloud with flexible network connectors. Cisco Security Cloud delivers a simple web security solution that does not require any additional hardware. Simplify deployment on existing Cisco infrastructure. Customers get:

  • Cisco Integrated Services Router Generation 2 (ISR G2) with CWS Connector –Save bandwidth, money, and resources by redirecting traffic from branch offices directly to the cloud.

  • Cisco ASA Firewall with CWS Connector – Our firewall integrates with Cisco ASA Software Release 9.0 to provide security at firewall performance without adding data centre or network complexity.

  • Cisco Web Security Appliance with CWS Connector – Take full advantage of content processing in the cloud with centralised management and policy enforcement.

  • Cisco AnyConnect Secure Mobility Client – Safeguard web-based transactions on roaming mobile devices to enforce distributed security policy anywhere your users go.

  • Advance Malware Protection – Get continuous visibility and control to defeat malware across the extended network and the full attack continuum—before, during, and after an attack.


Dropbox for Business lets your team bring work anywhere, syncing their important files across all their devices. 

Dropbox for Business lets your team bring work anywhere, syncing their important files across all their devices. Powerful administration tools help you stay on top of your account and take control of your organisation’s information. Shared folders and links help keep everyone up to date, effortlessly. With Dropbox, team members can work together like they’re sitting right next to each other — even when they’re halfway around the world.

Manage your team

  • Get up and running: Seamlessly upgrade existing Dropbox accounts to Dropbox for Business, and transfer files to co-workers when people leave.
  • Centralise administration: Let your team focus on work — the admin console gives you one place to easily add or remove members, change team settings, and pay bills. Tiered admin roles let you manage your team more effectively by choosing one of three access levels for admins.
  • Gain visibility: Keep tabs on how your team’s using Dropbox for Business and what’s being shared. Filter by specific actions and generate activity reports from the admin console.
  • Simplify provisioning: Dropbox has partnered with trusted identity providers so you can use your existing onboarding and authentication processes.

Better collaboration and productivity

  • Share with just a click: Forget zipping a large file to send as an email attachment. When you link to the file in Dropbox, clients can view or download the latest version in seconds. You can also create groups to make sharing with the multiple people at the same time even easier.
  • Give the right people the right access: Dropbox for Business gives you control over permissions to shared folders and links, and lets you restrict members from sharing outside your team. You can also set limits on who can view or edit files within a shared folder, and protect shared links with passwords and expirations.
  • Simplify your workflow: Quickly find what you need by typing any word contained in a file with full-text search. With the Dropbox badge, see who’s working on a shared Microsoft Office file and more from within the document.

Safeguard company data

  • Protect files in transit and at rest: Your files are stored using 256-bit AES encryption, and SSL/ TLS creates a secure tunnel for data transfers between you and us.
  • Protect business data: If a device is lost or someone leaves your team, remotely delete the Dropbox folder to keep your business’s most important data safe. Further protect data with the ability to disable shared links from the admin console.
  • Put data in its place: Let every employee access both a personal and a work Dropbox, while keeping them separate on all their devices. Get reliable access. Keep your work available with storage designed for 99.999999999% durability.
  • Manage compliance: Dropbox's data centers, and their managed service providers undergo regular third-party audits. Dropbox's SOC 1, 2, and 3 audit reports are available, as are their ISO 27001 and 27018 certificates. Dropbox is also a member of CSA’s Security, Trust & Assurance Registry (STAR).
  • Guard user accounts: Put a trusted identity provider in charge of authentication with single sign-on (SSO), and add an additional layer of protection by securing Dropbox accounts with two-step verification.
  • Maintain privacy: Dropbox's privacy policy is designed to safeguard the collection, use, and disclosure of your business’ information, and they comply with the U.S.–E.U. and U.S.–Swiss Safe Harbor frameworks.
  • Enterprise solutions: Extend the capabilities of Dropbox for Business and seamlessly integrate your core IT processes with SIEM, DLP, eDiscovery, DRM, data migration, and identity management solutions from industry-leading providers.

Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and websites in more than 5,000 organisations spanning 85 countries.

Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and websites in more than 5,000 organisations spanning 85 countries. Entrust's identity-based approach offers the right balance between affordability, expertise and service.

With more than 125 patents granted and pending, these world-class solutions include strong authentication, physical and logical access, credentialing, mobile security, fraud detection, digital certificates, SSL and PKI.

With more than a decade of service to the globe's most elite organisations and governments, Entrust helps provide identity-based security with award-winning solutions that defend against sophisticated online and internal threats, increase corporate efficiency and comply with domestic and international regulations.

From security-conscious organisations to innovative government departments, Entrust's identity-based approach helps promote and protect the trust associated with digital identities.


iPass gives access to the world's largest commercial Wi-Fi network, with inflight Internet and far more hotels, airports, and business venues than any other network. Users get easy, reliable connectivity virtually anywhere they roam.

iPass is a global Wi-Fi roaming market leader for enterprise employees and service provider subscribers. iPass knits the world’s commercial Wi-Fi networks together to create a single global Wi-Fi network. With the massive acceleration of the broader Wi-Fi industry, where every mobile phone, tablet and laptop is Wi-Fi enabled, and where Wi-Fi has become the preferred connectivity option for billions of devices, iPass is uniquely positioned to take advantage of the expanding global demand for Wi-Fi services.

iPass provides global enterprises and telecommunication carriers with cloud-based mobility management and Wi-Fi connectivity services. Through a proprietary technology platform and global Wi-Fi network, iPass offers enterprises cross-device, cross-network, seamless Wi-Fi connectivity services and significant cost savings. iPass also offers global telecommunication carriers Wi-Fi enablement services that allow these carriers the ability to monetise their Wi-Fi networks and enable data roaming solutions for their subscribers.

iPass advantage: A unique set of Wi-Fi assets

Unique four-party global authentication fabric and exchange infrastructure
Comprehensive cloud-based iPass Open Mobile mobility platform for a wide variety of computing and mobile devices and provider networks
Largest global and commercial Wi-Fi network ecosystem

iPass: A Wi-Fi leader

13 million global Wi-Fi access points across 120 countries and territories
1.3 million unique users on the iPass mobility services platform in 2013
12.4 million user authentications processed by iPass’ global infrastructure in 2013
62 million iPass enabled Wi-Fi sessions in 2013
158 global Wi-Fi operators with whom iPass’ authentication infrastructure is integrated
74,670 strategic venues including hotel and conference venues and global airports

iPass: Business focus

Enterprise mobility

Global Wi-Fi for enterprises (Open Mobile Enterprise – OME): iPass serves the connectivity and security needs of enterprise customers and their business travellers. Their value to the enterprise is seamless connectivity, improved productivity and significant cost savings. At the end of 2013, iPass had over 1300 enterprise customers, including 130 of the Fortune 500.

Consumer mobility

Global Wi-Fi for service providers (Open Mobile Exchange – OMX): Started in 2012 with the objective of making global Wi-Fi available on telecommunication carriers’ subscriber bills. This business is in the early stages, but already had 23 carriers signed globally at the end of 2012. Additionally, there are millions of potential end users available through mobile operators, traditional telcos and cable operators, as well as other telecommunication service providers, that can be users of the iPass global Wi-Fi network.


IronWorks is the MobileIron reporting interface you've always dreamt of. IronWorks unleashes the power of MobileIron's data, automatically generating scheduled reports that provide senior management with actionable insights and may help your organisation save significant amounts of money.

Compliance made easy

Alongside trend charting and insightful analysis, with IronWorks you can monitor how staff and devices comply with your mobile IT policies. IronWorks is ideal for compliance reporting: its reports can assist you with GDPR, ISO27001 and regulatory framework requirements.

A daily security health check

IronWorks also provides a daily security check. This mini report identifies and warns of expiring certificates, weak encryption protocols, and whether the administration console is accessible from the internet. 

Trends. Comparisons. Scheduled reports

IronWorks delivers actionable insights through long-term trend analysis. Easily compare current status with previous reports and therefore identify short, and long-term deviations. Give visibility to senior executives of your mobile device estate. Schedule and automate emailed reports, choosing the report frequency, type and email distribution. 

Locate your mobile devices and recover them

It's all too easy to lose or misplace a mobile device. IronWorks provides last known location data via a simple map interface. Now you can recover those missing devices and repurpose your valuable investment. 

Save money on licences

Licences can be complex to manage within an organisation and may become inefficient. IronWorks has a proven track record of saving organisations money. IronWorks calculates the most cost-effective licence policy instantly.


Technology case study

_

This report shows how the ICT teams of four NHS organisations are using MobileIron Enterprise Mobility Management (EMM) solutions to manage mobile device proliferation and demands from employees for greater mobility; and enabling user-driven innovation while maintaining security over their mobile estates.

Read the case study

‘Healthcare On The Move: Four UK NHS Mobility Deployments’

janusNET provides practical, cost effective data security and data loss prevention (DLP) systems that are used throughout government and industry.

janusNET provides practical, cost effective data security and data loss prevention (DLP) systems that are used throughout government and industry.

The solution is based upon a suite of products providing comprehensive classification and protection of files created in Microsoft environments, together with a mobile security capability.

By ensuring that everyone classifies every document or message when created, janusNET provide a functional DLP solution which protects against accidental data loss.

The benefits of classifying email and documents

Classifying information is the simplest and most valuable information security activity that an organisation can undertake. Strangely, and possibly because it is based on traditional (paper) methods, the technique is not as valued as it should be. Classifying emails, or classifying documents - it offers several immediate benefits:

It is easy to do
It is a concept that is intrinsically understood
It provides meaning and relevance to information
It constantly re-affirms the relevance of Information Security and raises security awareness
It invokes a simple (but effective) security culture

The janusSEAL products from janusNET ensure that every email and document is classified when created - each one has a "tag" your security systems can recognise.

The janusSEAL products convert your existing systems into functional Data Loss Prevention (DLP) solutions, delivering protection from accidental data loss, the major reason for incidents, at a fraction of the cost of other forms of DLP.

The janusNET solutions represent great value because the above benefits are quickly and easily realised.

Great value and pragmatic mobile security for BYOD

Everybody has a smartphone now and the capacity to access the corporate network, so staff's productivity and working convenience can be improved. You just have to ensure that appropriate information is delivered to the right device. Most email, calendar and contact information is not confidential. In fact, probably 80-90% of email traffic requires no control.

Rather than assume everything is sensitive and the mobile device has to be locked down, janusNET have taken an approach to control just the sensitive material (at most about 5-10%) of communications and allow the rest to flow. This is your solution to the Bring Your Own Device (BYOD) problem. Just secure the sensitive material. If you have deployed BYOD already, and just want to tighten up your controls then janusGATE Mobile, an award winning mobile security solution, should be just what you need.


LogRhythm solutions deliver the insight needed to detect, defend against and respond to the most sophisticated cyber threats.

LogRhythm solutions deliver the insight needed to detect, defend against and respond to the most sophisticated cyber threats. They also help companies efficiently meet compliance requirements and proactively respond to operational challenges. LogRhythm's Security Intelligence Platform uniquely combines next generation SIEM, log management, host forensics and network forensics with advanced analytics to help customers defend against today’s cyber threats.

LogRhythm is an enterprise-class platform that seamlessly combines SIEM, Log Management, File Integrity Monitoring and Machine Analytics, with Host and Network Forensics, in a unified Security Intelligence Platform. It is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment.

LogRhythm delivers:

Next Generation SIEM and Log Management

Independent Host Forensics and File Integrity Monitoring

Network Forensics with Application ID and Full Packet Capture

State-of-the art Machine Analytics

Advanced Correlation and Pattern Recognition

Multi-dimensional User / Host / Network Behaviour Anomaly Detection

Rapid, Intelligent Search

Large data set analysis via visual analytics, pivot, and drill down

Workflow enabled automatic response via LogRhythm's SmartResponse

Integrated Case Management


Logtrust collects, correlates and analyses machine, system and user data in real-time to offer unprecedented capabilities of security intelligence, business and IT monitoring, operation and applications management and compliance.

Logtrust collects, correlates and analyses machine, system and user data in real-time to offer unprecedented capabilities of security intelligence, business and IT monitoring, operation and applications management and compliance.

Security Intelligence - Real-time security monitoring and alerting.

With Logtrust service you’ll be able to manage every aspect of your security. Use the powerful query, correlation and reporting tool, create dashboards to keep you informed in real-time about your most important information, and monitor your systems and users’ activity and more.

Business Monitoring - Global business visibility in Real-Time.
You can create and personalise your dashboard to include the most relevant information for your company and/or business and set business alerts (delivered in real-time) to inform you of important events within your business, such as: every time there’s a new sale, each time there’s a new subscriber for your applications, when sales surpass a fixed amount …

IT Monitoring - Gain a holistic view of your systems with Logtrust.
The Logtrust system monitoring application provides the real-time status of customers’ infrastructures, analysing a large set of parameters and showing detailed charts with each machine’s historical data.

Behavioural Analytics - Discover the future.
The Logtrust Behavioural Analytics engine consists of a set of metrics that allows you to be informed about the habits of your systems, applications and related variables.

Real-time Big Data - Real-time every time.
The Logtrust Big Data Cloud Technology platform allows companies of any size to gain real-time operational and business intelligence.

Compliance - Meet multiple requirements for collecting, storing and auditing event data.
Most IT/security laws, regulations and best practices require data to be held for specific periods of time, the protection, tracking and control of access and usage of sensitive information and the monitoring of logs.

Complement your SIM/SIEM - Raise your security levels.
Integrate your company logs and even those of your SIM/SIEM with Logtrust and increase your correlation possibilities while raising your security levels.

Unique point of view - All your information analysed in a single platform.
A single entry point to analyse events from firewalls, systems or webservers, all data generated by your applications, in short, all your machine data…

Geolocation - Enrich your data and obtain meaningful insights.
The Logtrust platform provides easy to use and real-time geolocation capabilities, enriching your data and allowing visualisation on a wide range of maps.

Troubleshooting - Quickly identify and resolve problems.
Logtrust helps you to accelerate troubleshooting across servers and applications. It also allows you to diagnose network issues by searching logs from routers and other devices.

Log Management - Manage a huge volume of data in an easy way.
Logtrust Log Management allows you to have a complete visibility across all your infrastructure and business and you will be able to obtain insights, make decisions, improve your security, and always in real-time.


Lookout is a cybersecurity company that predicts and stops mobile attacks before harm is done. Lookout’s cloud-based technology is fuelled by a data set of the world’s mobile code and the predictive machine intelligence to analyse and make sense of the data.

Lookout is a mobile security company that predicts and stops mobile attacks before harm is done to an individual or an enterprise. Lookout’s cloud-based technology is fuelled by a global network of more than 100M mobile sensors and tens of thousands of apps that are added daily. With this data set of the world’s mobile code and the predictive machine intelligence to analyse and make sense of the data, Lookout can identify connections that would otherwise go unseen and stop cybercriminals from attacking mobile devices. 

 

The world’s leading mobile network operators, including AT&T, Deutsche TelekomEEKDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Headquartered in San Francisco, Lookout has offices in Boston, London, Singapore, Tokyo, Toronto and Washington, D.C.


Mimecast is a leader in enterprise cloud services for the security, archiving and management of email and corporate human generated data.

Mimecast is a leader in enterprise cloud services for the security, archiving and management of email and corporate human generated data. UK based data centres ensure UK jurisdiction for email archiving, a must for most organisations.

Email Security
Mimecast provides an always-on, cloud-based email security solution that reduces the complexity of protecting your organisation from malware, spam and data leakage. The service delivers robust 100% anti-virus and 99% anti-spam service levels, with 0.0001% spam false positives. An advanced mail transfer agent (MTA) acts as your email bridgehead in the cloud, stopping known and emerging email borne threats before they reach your network.

Enterprise Information Archive
Mimecast Enterprise Information Archiving provides a secure, dependable and highly scalable solution to growing information management challenges. A single, tightly integrated cloud platform delivers unified and secure enterprise email archiving as well as file archiving and IM archiving.
- Instantly protect valuable intellectual property assets through a purpose-built, highly secure and trusted cloud platform with 100% service availability SLA.
- Delight users and speed workflows with rapid search and content retrieval through a single, intuitive search interface across a choice of desktop and mobile apps.
- Comprehensive compliance, eDiscovery and litigation support through perpetual retention and documented, tamper-resistant chains of custody.
- Reduce cost and complexity through a single cloud platform and administrative console.

Office 365
While the capabilities of Office 365 are sufficient for some business, others – particularly in the enterprise space – will need additional third party products and services to address specific requirements not supported by Office 365.  These may relate to organisational complexity, risk management considerations, or the simple concern around having so much mission critical technology dependent on a single vendor.  Having made the decision to move email to the cloud, CIOs will not want to purchase LAN-based products to meet these requirements.
Mimecast provides a rich set of cloud services designed to meet the specific needs of Office 365 customers. We effectively remove barriers to adoption and accelerate deployment, by offering a blended cloud solution that integrates with Office 365.

Unified Email Management
Mimecast Unified Email Management (UEM) uniquely combines comprehensive email security, continuity and archiving solutions in a single, tightly integrated cloud-based service managed from a single administration console.


The leader in Enterprise Mobility Management (EMM) and Mobile Device Management (MDM) software, enabling organisations to securely deploy the latest generation of smartphones and mobile devices.

MobileIron's mission is to enable global companies to become Mobile First organisations, embracing mobility as their primary IT platform in order to transform their businesses and increase their competitiveness.

Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. Mobile First organisations focus on building superb mobile user experiences that are available anywhere users need them. They have to move fast and adopt new technologies rapidly.

Enterprise Mobility Management - EMM

Smartphones and tablets have transformed the way we interact with applications and content in our personal lives and now end users want that experience at work. To meet this growing demand, IT requires an enterprise mobility management solution to provision the apps and content users want, while maintaining privacy and data security.

Enterprise Mobility Management

By providing an enterprise mobility management (EMM) solution that meets both user demands and IT needs, MobileIron is enabling organisations to become truly Mobile First. The MobileIron Platform allows IT to secure and manage devices, apps and content providing end-users with instant access to corporate data on a device of their choice. With this purpose built EMM platform, organisations can spend more time innovating and driving business and less time securing mobile devices.

With MobileIron, organisations can enable the following:

Mobile Device Management - MDM
The MobileIron platform enables IT to secure and manage a diverse set of mobile devices, automatically provision enterprise settings such as Wi-Fi and VPN and provide end-users with secure access to corporate email. If a device should fall out of compliance, IT can define remediation actions that will either notify the user of policy violations or selectively wipe corporate information without touching any personal data. The MobileIron Platform consists of MobileIron Core, a security and management policy engine, MobileIron Client that automatically configures the device to function in an enterprise environment, and MobileIron Sentry, an intelligent security gateway.

Mobile Application Management - MAM
MobileIron provides an end-to-end solution that provisions, delivers, secures, and retires mobile apps. With these capabilities, IT can manage the entire application life cycle: from making the applications available to employees through the Apps@Work private enterprise app store; to securing applications on the device; containerising corporate apps from personal apps using MobileIron AppConnect.

Mobile Content Management - MCM
With MobileIron's integrated solution, IT can enable end-users to securely access and manage enterprise documents residing in a variety of content repositories, including Sharepoint, WebDav, and CIFS. MobileIron’s MCM solution also ensures that corporate email attachments are encrypted and can be viewed using authorised applications including MobileIron Docs@Work. Additionally, end users can securely browse corporate intranet content without the need for a device-wide VPN using MobileIron Web@Work.


OneLogin, an innovator in enterprise identity management, provides the industry’s leading SaaS solution for managing internal and external users across all devices and applications. 

OneLogin, an innovator in enterprise identity management, provides the industry’s leading SaaS solution for managing internal and external users across all devices and applications.

OneLogin is named Leader in Forrester WaveTM: B2E Cloud IAM, Visionary in Gartner’s IAM as a Service Magic Quadrant and a Major Player in IAM by IDC.

OneLogin’s cloud identity management platform provides more than 2,000 customers with secure single sign-on, multi-factor authentication, integration with common directory infrastructures such as Active Directory and LDAP, user provisioning and more.

OneLogin is SAML-enabled, providing an open source SAML toolkit adopted by over 400 ISV’s, and is pre-integrated with over 4,000 applications commonly used by today’s enterprises, including Microsoft Office 365, Google Apps for Work, Salesforce.com, ServiceNow, BMC Remedyforce, Box, Egnyte, EMC Syncplicity, Oracle CRM On-Demand, SuccessFactors, WebEx, Workday, and Zendesk. OneLogin, Inc. is backed by CRV, The Social+Capital Partnership, and Scale Venture Partners.


Wandera offers a cloud-based data gateway that sits in the path of mobile data supporting a mission-critical aspect of your enterprise mobile strategy.

Advanced mobile threat prevention and data optimisation.

Wandera’s Secure Mobile Gateway (SMG) is a scalable offering that provides protection from mobile threats together with visibility and control of data usage and costs. It operates simultaneously on the device and in the cloud, combining constant device monitoring with real-time scanning of the data stream.

Wandera’s EMM Connect ecosystem integration lets companies use their existing MDM to deploy the Wandera app directly on to end user devices. EMM Connect then continues to sync with the MDM for ongoing management

 

Wandera offers three unique services that are built on top of the Secure Mobile Gateway: Secure, Extend and View.

  • Secure – Stop zero-day threats before they compromise your corporate data
  • Extend – Reduce data usage and costs by up to 60%, domestically and when roaming
  • View – Gain important insight into enterprise mobility with itemised, real-time reporting

Key Benefits

  • Mobile threat detection and prevention (zero-day and known threats)
  • Data savings and control through policy and compression
  • Control of roaming costs and eliminate bill shock
  • Cost itemisation and bill split
  • Visibility into mobile productivity and data usage

Webalo is an easy, fast alternative to traditional mobile application development – an affordable, scalable and integral part of the IT enterprise mobility infrastructure.

Webalo is an easy, fast alternative to traditional mobile application development – an affordable, scalable and integral part of the IT enterprise mobility infrastructure that, out-of-the-box, seamlessly integrates and interoperates with enterprise applications and data, Enterprise Mobility Management platforms, and Android, Apple, BlackBerry, and Windows mobile devices.

Webalo mobilises enterprise applications and data in minutes, delivering secure bi-directional, transactional interactivity 100x faster and at a fraction of the cost of traditional mobile application development.

Webalo is enterprise mobility made easy. It uses a simple point-and-click, web-based process that anyone can master to connect smartphones and tablets to the enterprise applications and data you already have.

Every enterprise-to-mobile connection can run on any Android, Apple, BlackBerry, or Windows mobile device through a single, secure mobile client, and each connection gives mobile employees the exact data and functions they need to whiz through tasks and workflows more productively.

Create an infinite number of connections, tasks, and workflows and run them through a single, universal client app on smartphones and tablets.

Webalo Advantages for IT Professionals
Meeting the demands of every business unit’s mobility requests for access to databases, reports, XML Web services, and websites is an overwhelming burden for IT. Yet Webalo lets you meet each one so quickly and easily that you’ll exceed all expectations for delivery and deployment

Webalo Advantages for Business Users
In minutes, Webalo can put interactive, bi-directional, transactional access to IBM, Microsoft, Oracle, SAP, Salesforce.com, and in-house custom-built applications on the smartphone or tablet you already use – securely. Productivity never improved so fast.

Any Data. Any Device. Any Minute.
Give employees productivity-enhancing, individualised access to the enterprise data, tasks, and workflows they rely on – the business mobility capabilities that simplify and streamline their work.