Welcome!

Microsoft Cloud Authors: Pat Romanski, Liz McMillan, Lori MacVittie, Elizabeth White, Yeshim Deniz

Blog Feed Post

Thursby Releases Secure CAC and PIV Browser for Good Technology

Arlington, TX, April 25, 2013 --(PR.com)-- The PKard web connection is fully encrypted and secure. Two-factor smart card login (chip ID card and PIN) is a requirement for strong user authentication for many government and highly regulated FORTUNE 500™ and Global 2000 organizations. Many of these same organizations are already Good Technology™ customers and are looking to combine Thursby’s widely deployed iOS secure browsing experience with Good’s broad set of mobile security solutions. The latest Net Applications market share data show that iPad and iPhone represent almost two thirds of all mobile browser traffic across all tablet and smart phone categories.

The Good Dynamics (GD) platform includes a number of application level security and management features such as remote locking and wiping, secure inter-app communication for things like document transfers powered by Good Dynamics AppKinetics™, as well as VPN-like access to intranet web.

Bill Thursby, President of Thursby Software, explains, "We appreciate the opportunity to broaden our work with Apple security and smart card technology in conjunction with Good’s mobile application methodology. For the first time, highly regulated customers will have a secure browser that supports strong authentication utilizing (but not requiring) U.S. Government CAC and PIV smart cards on the Good Dynamics platform.”

PKard for Good can be downloaded immediately via Apple’s iTunes app store. Good Dynamics end user licenses are required to enable use of the PKard for Good application. For additional information on Good Dynamics requirements, please visit www1.good.com/platform/mobile-application-security.

Link to the app on Apple’s iTunes App Store
itunes.apple.com/us/app/pkard-for-good-technology/id588376315?ls=1&mt=8

Link to Good Dynamics Marketplace
begood.good.com/gd-app-details.jspa?ID=325981&latestVersion=1.1.0.0&latestVersionID=326042

About Thursby Software Systems, Inc.
Thursby is celebrating over a quarter century of enterprise Apple integration, management and security specialization. Thursby is US-owned, operated and GSA-listed, with headquarters in Arlington, Texas. We have well over 70,000 clients, including organizations with thousands of devices under management, and well over a million software licenses sold to-date. Clients come from all seven continents and range from government, to finance, healthcare, energy, Fortune 500, Global 2000 companies, education, research, media and OEMs. For more information about Thursby and its solutions, please visit www.thursby.com.

Legal Disclaimers
GOOD™, GOOD FOR ENTERPRISE™, GOOD DYNAMICS® and the GOOD logo are trademarks of Good Technology Corporation and its related entities. All rights reserved.

Contact Information:
Thursby Software Systems, Inc.
Simon Hartley
(817) 478-5070
Contact via Email
thursby.com

Read the full story here: http://www.pr.com/press-release/487634

Press Release Distributed by PR.com

Read the original blog entry...

More Stories By PR.com Newswire

PR.com is a unique website where companies can promote literally everything about their business and/or organization in a one-stop, all inclusive business marketplace. A cross between a public relations and advertising entity, PR.com is a directory of businesses, products and services, jobs and dynamic articles that include exclusive celebrity interviews. In addition, PR.com is one of the most effective and widely used press release distribution services on the Internet. With a full PR.com company profile, each business listed on PR.com has a powerful means by which to generate quality leads as well as gain worldwide and local exposure for all of their products, services and other business information. PR.com offers the best advantages of the Internet on one website.

IoT & Smart Cities Stories
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in development and launches of disruptive technologies to create new market opportunities as well as enhance enterprise product portfolios with emerging technologies. His most recent venture was Octoblu, a cross-protocol Internet of Things (IoT) mesh network platform, acquired by Citrix. Prior to co-founding Octoblu, Chris was founder of Nodester, an open-source Node.JS PaaS which was acquired by AppFog and ...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace.
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...