Download PDF version Contact company

UK MVNO Anvil Mobile has announced the availability of Option’s Cloudkey, the first complete solution for instant and secure, fully authenticated, mobile access over 3G networks. Cloudkey combines strong authentication and workflow to secure access to corporate network-based applications, data and services using 3G mobile broadband.

While DSL broadband lines have a fixed IP address that can be logged into the corporate firewall to support a secure VPN connection, 3G mobile broadband typically uses a dynamic IP address and sends data over the insecure public internet via a shared APN (Access Point Name). With Option, Anvil has overcome this security flaw by enabling the delivery of mobile broadband with a fixed IP address, a low latency Layer 2 (L2TP) 3G connection and a private APN. As the data is tunnelled through carrier class networks, it does not traverse the public internet.

For higher levels of security, Option’s Cloudkey integrates VASCO DIGIPASS token exchange to provide strong user authentication. Corporate resources are accessed through an authenticated session that configures the browser to deny access to external sites except those allowed through the corporate portal. Furthermore, when a user logs off and the Cloudkey is removed, the host PC does not have any record of activity, including sites visited and documents created or opened. Consequently if the computer goes missing, confidential corporate intelligence remains secure. Anvil also offers a premium version of Cloudkey that incorporates digital signatures and additional advanced security features.

“GSM and GPRS networks were too slow for remote applications, but 3G has opened up remote and mobile access where applications can be used as though you have a DSL broadband connection,” said Ian Philip, CEO at Anvil Mobile. “Cloudkey harnesses 3G connectivity and provides reliable and secure authentication to avoid the dangers of unauthorised access to corporate information and applications and eliminates the risk of sensitive information being stored on portable devices that can be easily lost or stolen.”

Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?