PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
November 2008

Security services: Fiberlink's MaaS360 Mobility Platform

MaaS360 Mobility Platform Fiberlink Price: Starts at $15,000; additional reporting and analytics modules start at $20,000 per module Chances are good that many of your employees work remotely all or much of the time. Chances are they may not even be connecting regularly into the corporate network via VPN, leveraging their ubiquitous Internet connectivity and SaaS offerings like That makes keeping their laptop security--never easy--up to date a big-time problem. Fiberlink, a mobile services provider, has addressed this issue with the latest iteration of its security/remote management offering, MaaS360. The service handles remote device updates, such as OS patches, automatically as long as the user connects to the Internet, without waiting for that infrequent LAN connection. "The main drivers were the ability to update endpoints, laptops--controlling them when it comes to protection. We can set policy if the machine is not on the corporate network," says Vince Skinner, IT network/security analyst for Fiberlink ...

Access this PRO+ Content for Free!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

Safe Harbor

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product Review: Symark PowerADvantage 1.5

    Symark's Symark PowerADvantage allows Unix hosts to become member servers of an AD forest and leverage AD's centralized user management and authentication capabilities.

  • Product Review: Shavlik's NetChk Compliance

    Shavlik's NetChk Compliance automates compliance and provides control by actively managing system and security settings and allows the IT manager to identify and mitigate risks.

Columns in this issue