At the recent SC Magazine conference on securing and managing mobile devices I met with a new vendor in the sector.
Based in Sydney, Australia, janusNET offers email filtering technology without any need for software for the mobile, ensuring no dilemma for a business if it is a personally-owned device.
Managing director Greg Colla said that the janusNET technology separates the LAN from the mobile, connects to the Exchange server and allows for layered best-of-breed deployment to the server.
Colla said that often a problem with mobile security software is that it affects the performance of the device and annoys the user, so technology needs to be transparent to the user so that they have control.
“With email encryption you might forget to select it and if it is going outside your country it may go via somewhere where traffic may be monitored, so we brought in a policy to enable a civil servant to classify information,” he said.
“So when you send a message, you must be able to classify it and prior to policy, you use a secure network but the problem is a user does not know what a secure network is, so all backend rules should be automated.”
The janusGATE technology allows users to connect to the Exchange server via ActiveSync. Before a message is out of the firewall and organisation, you can inspect for keywords, attachments and if you see an important document attempting to be sent, an administrator can classify it as sensitive and deliver a notification to the recipient informing them that they cannot do that.
Colla said: “At an organisation, an architect can use the best solution and allow a 'bring your own device' (BYOD) policy. They can use a complete Active Directory group to subscribe users to a policy on deployed devices so they are locked down and you can set policy to protect information to the phone. With the non-approved devices it is less so, as you cannot lock down the phone, but it will allow filtered information.”
He concluded by talking about the ability to decrypt an encrypted message on a phone, commenting on there being decryption applications available, but he said what will be interesting will be when the operating system can decrypt itself.
The debate on mobile device management will roll on and on, but so will the solutions.