Talon Cyber Security introduced TalonWork Mobile, a version of its TalonWork browser made specifically for mobile endpoints.
With TalonWork Mobile, customers can extend secure access and control to the mobile endpoints that are used to connect to corporate resources and data, yet are historically unmanaged by organizations.
Talon is the first secure enterprise browser provider to support mobile as part of its device coverage, working with customers to inform future capabilities and address specific use cases. For example, one prominent use case for early adopters is securing frontline workers that connect to corporate resources from mobile devices. Customers leverage TalonWork Mobile to ensure secure access for the single-purpose applications used by mobile workers, such as those in insurance, manufacturing, transportation, construction, healthcare, professional services and retail.
“For every CISO we are engaged with, secure access for mobile devices is top of mind, especially as organizations develop special-purpose applications to stay competitive and reduce costs,” said Ohad Bobrov, co-founder and CTO, Talon Cyber Security. “In today’s distributed environments, employees and third parties need to connect to the business while on the move. TalonWork Mobile delivers secure access for on-the-go workers in a native way and gives organizations deep security visibility and control, uniquely positioning us to address this widespread market need.”
The TalonWork browser allows customers to provide secure access to the applications that power their businesses, including core business, communication, and single-purpose applications. TalonWork also enables organizations to ensure proper security posture for all mobile devices in use across their environments, without the need for device enrollment.
Specific benefits and capabilities delivered through TalonWork Mobile that empower organizations to safeguard enterprise assets include:
- Enforce and restrict mobile access: TalonWork can enforce and restrict mobile access to corporate resources based on a device’s security posture and user credentials.
- Granular visibility and control: Organizations benefit from…