Technologies

Deep relationships. A diverse portfolio. Tangible results

We work with leading and visionary vendors across our three domains of excellence: Mobility, Cloud Security and Security Intelligence. We then invest in building powerful and deep relationships which include certification and becoming masters in the ecosystem.

We are uniquely positioned to understand how these market leading technologies work together and how they combine to deliver exceptional results. In many cases, Bridgeway’s strategy, project management, deployment and support capability are considered the de facto standard and recommended by our partners.

By working with the world’s most visionary vendors, we always have access to the technology which can best Deliver your chosen security and risk posture

 

Want to find out how IronWorks can help you prove and maintain the success of your mobility project?

New Call-to-action

The world’s leading security technologies

Bridgeway is here to help you choose the best-fitting solution.

Call us now on 01223 979 090

Accellion provide mobile solutions to enterprise organisations enabling increased business productivity while ensuring security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them.

Accellion provide mobile solutions to enterprise organisations enabling increased business productivity while ensuring security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them.

kiteworks is Accellion's next generation secure mobile file sharing and collaboration platform. kiteworks provides organisations with an intuitive, re-imagined user interface that empowers users to seamlessly access, share, and manage content across devices with a streamlined and consistent experience across mobile, web, and desktop.

kiteworks connects to existing content systems to provide a single user interface for mobile access to enterprise content, and enables secure external sharing while always maintaining integrity of the document of record.

Designed with unparalleled flexibility and scalability, Accellion provides organisations with less than 100 users to more than 100,000 users with flexible deployment options. Implementations can grow from a single office to a global distributed deployment.

kiteworks represents the leading private cloud platform optimised for security and control, which enforces data sovereignty for global deployments, and provides extreme scalability and agility via a three-tiered architecture. Accellion supports deployment in a private on premise, private hosted, or hybrid cloud; or FIPS 140-2 certified environment. All Accellion deployment options can be mixed and matched in a multi-site installation or installed as a standalone single site solution.

Eighty percent of Accellion customers choose to deploy the solution in a private cloud for increased data security and protection, often required by corporate and government organisations. With Accellion solutions, organisations can provide their users with secure anytime, anywhere access to enterprise information while protecting confidential information, ensuring compliance, improving employee productivity and reducing IT support.


Aruba, a Hewlett Packard Enterprise company, is a leading provider of next-generation networking solutions for enterprises of all sizes worldwide. The company delivers IT solutions that empower organisations to serve GenMobile -- mobile-savvy users who rely on cloud-based business apps for every aspect of their work and personal lives.

 

 

In the past, networks were designed to just pass packets. That is where Aruba saw an opportunity. What’s needed today is the ability for the network to learn and proactively tell you about performance or security anomalies. An autonomous model that constantly learns and provides the insights needed – before there are issues.

For Aruba, Learning is the present. Autonomous is the future. That is where Aruba is headed.

 

Aruba’s mobile-first, cloud-first approach addresses the fundamental changes in today’s business environment -- the move towards the digital workplace and the explosion of big data. Aruba allows IT professionals to build networks that keep up with these changes by migrating away from expensive-to-operate and proprietary infrastructures, which were originally designed for fixed network connections within the physical confines of the corporate headquarters. 

Bitglass is the Next-Gen CASB (Cloud Access Security Broker) providing organisations control over their corporate data being shared with cloud applications, regardless of application or device. 

Your company’s move to the cloud delivers flexibility and cost savings, but that doesn’t mean you should lose control of your data. Bitglass enables organisations of all sizes to adopt cloud while protecting data and maintaining regulatory compliance. Achieve data protection, threat protection, identity management, and visibility across all cloud applications.

Real-time Data Protection

Only a multimode CASB like Bitglass features both APIs and multi-protocol proxies for real-time data protection. Within any app that provides access via an API, CASBs can crawl files to identify sensitive data and threats. Proxies augment API controls for agentless security between any app and any endpoint.

 

Zero-day Discovery and Unmanaged App Control

Intelligent Shadow IT discovery capabilities and unmanaged app controls are critical for identifying new, unknown applications. A Next-Gen CASB like Bitglass features a zero-day engine that automatically detects new upload paths in known and unknown apps to immediately restrict the upload of sensitive regulated dat

Rapid Deployment

Agentless proxies can be deployed in minutes— setup is simple and straightforward, with nothing to install for either admins or users. Bitglass is the only CASB hosted globally on elastic AWS infrastructure, making it highly scalable.


Dropbox for Business lets your team bring work anywhere, syncing their important files across all their devices. 

Dropbox for Business lets your team bring work anywhere, syncing their important files across all their devices. Powerful administration tools help you stay on top of your account and take control of your organisation’s information. Shared folders and links help keep everyone up to date, effortlessly. With Dropbox, team members can work together like they’re sitting right next to each other — even when they’re halfway around the world.

Manage your team

  • Get up and running: Seamlessly upgrade existing Dropbox accounts to Dropbox for Business, and transfer files to co-workers when people leave.
  • Centralise administration: Let your team focus on work — the admin console gives you one place to easily add or remove members, change team settings, and pay bills. Tiered admin roles let you manage your team more effectively by choosing one of three access levels for admins.
  • Gain visibility: Keep tabs on how your team’s using Dropbox for Business and what’s being shared. Filter by specific actions and generate activity reports from the admin console.
  • Simplify provisioning: Dropbox has partnered with trusted identity providers so you can use your existing onboarding and authentication processes.

Better collaboration and productivity

  • Share with just a click: Forget zipping a large file to send as an email attachment. When you link to the file in Dropbox, clients can view or download the latest version in seconds. You can also create groups to make sharing with the multiple people at the same time even easier.
  • Give the right people the right access: Dropbox for Business gives you control over permissions to shared folders and links, and lets you restrict members from sharing outside your team. You can also set limits on who can view or edit files within a shared folder, and protect shared links with passwords and expirations.
  • Simplify your workflow: Quickly find what you need by typing any word contained in a file with full-text search. With the Dropbox badge, see who’s working on a shared Microsoft Office file and more from within the document.

Safeguard company data

  • Protect files in transit and at rest: Your files are stored using 256-bit AES encryption, and SSL/ TLS creates a secure tunnel for data transfers between you and us.
  • Protect business data: If a device is lost or someone leaves your team, remotely delete the Dropbox folder to keep your business’s most important data safe. Further protect data with the ability to disable shared links from the admin console.
  • Put data in its place: Let every employee access both a personal and a work Dropbox, while keeping them separate on all their devices. Get reliable access. Keep your work available with storage designed for 99.999999999% durability.
  • Manage compliance: Dropbox's data centers, and their managed service providers undergo regular third-party audits. Dropbox's SOC 1, 2, and 3 audit reports are available, as are their ISO 27001 and 27018 certificates. Dropbox is also a member of CSA’s Security, Trust & Assurance Registry (STAR).
  • Guard user accounts: Put a trusted identity provider in charge of authentication with single sign-on (SSO), and add an additional layer of protection by securing Dropbox accounts with two-step verification.
  • Maintain privacy: Dropbox's privacy policy is designed to safeguard the collection, use, and disclosure of your business’ information, and they comply with the U.S.–E.U. and U.S.–Swiss Safe Harbor frameworks.
  • Enterprise solutions: Extend the capabilities of Dropbox for Business and seamlessly integrate your core IT processes with SIEM, DLP, eDiscovery, DRM, data migration, and identity management solutions from industry-leading providers.

Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and websites in more than 5,000 organisations spanning 85 countries.

Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and websites in more than 5,000 organisations spanning 85 countries. Entrust's identity-based approach offers the right balance between affordability, expertise and service.

With more than 125 patents granted and pending, these world-class solutions include strong authentication, physical and logical access, credentialing, mobile security, fraud detection, digital certificates, SSL and PKI.

With more than a decade of service to the globe's most elite organisations and governments, Entrust helps provide identity-based security with award-winning solutions that defend against sophisticated online and internal threats, increase corporate efficiency and comply with domestic and international regulations.

From security-conscious organisations to innovative government departments, Entrust's identity-based approach helps promote and protect the trust associated with digital identities.


GuardiCore is a datacentre security company that enables our customers to more effectively control east-west traffic and more quickly and efficiently detect and respond to breaches. 

We do this by providing a single, scalable platform that covers five critical capabilities for effective datacentre security: visibility, micro-segmentation, breach detection, automated analysis and response. Our real-time breach detection capabilities feature high-interaction, dynamic deception technology that quickly identifies active breaches with extremely low false positive rates.
A lightweight, distributed architecture scales to cover all east-west traffic without impacting performance, and can support virtually any data centre infrastructure, whether workloads are running on bare metal, virtualised environments, containers or in private or public clouds. The net result to our customers is the ability to gain detailed visibility into their datacentre traffic, make well-informed policy decisions for micro-segmentation and reduce the “dwell time” for active breaches to stop them before they result in data theft or other damage.

IronWorks is the MobileIron reporting interface you've always dreamt of. IronWorks unleashes the power of MobileIron's data, automatically generating scheduled reports that provide senior management with actionable insights and may help your organisation save significant amounts of money.

Compliance made easy

Alongside trend charting and insightful analysis, with IronWorks you can monitor how staff and devices comply with your mobile IT policies. IronWorks is ideal for compliance reporting: its reports can assist you with GDPR, ISO27001 and regulatory framework requirements.

A daily security health check

IronWorks also provides a daily security check. This mini report identifies and warns of expiring certificates, weak encryption protocols, and whether the administration console is accessible from the internet. 

Trends. Comparisons. Scheduled reports

IronWorks delivers actionable insights through long-term trend analysis. Easily compare current status with previous reports and therefore identify short, and long-term deviations. Give visibility to senior executives of your mobile device estate. Schedule and automate emailed reports, choosing the report frequency, type and email distribution. 

Locate your mobile devices and recover them

It's all too easy to lose or misplace a mobile device. IronWorks provides last known location data via a simple map interface. Now you can recover those missing devices and repurpose your valuable investment. 

Save money on licences

Licences can be complex to manage within an organisation and may become inefficient. IronWorks has a proven track record of saving organisations money. IronWorks calculates the most cost-effective licence policy instantly.


Technology case study

case-study-mobileiron

This report shows how the ICT teams of four NHS organisations are using MobileIron Enterprise Mobility Management (EMM) solutions to manage mobile device proliferation and demands from employees for greater mobility; and enabling user-driven innovation while maintaining security over their mobile estates.

Read the case study

‘Healthcare On The Move: Four UK NHS Mobility Deployments’

LogRhythm solutions deliver the insight needed to detect, defend against and respond to the most sophisticated cyber threats.

LogRhythm solutions deliver the insight needed to detect, defend against and respond to the most sophisticated cyber threats. They also help companies efficiently meet compliance requirements and proactively respond to operational challenges. LogRhythm's Security Intelligence Platform uniquely combines next generation SIEM, log management, host forensics and network forensics with advanced analytics to help customers defend against today’s cyber threats.

LogRhythm is an enterprise-class platform that seamlessly combines SIEM, Log Management, File Integrity Monitoring and Machine Analytics, with Host and Network Forensics, in a unified Security Intelligence Platform. It is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment.

LogRhythm delivers:

Next Generation SIEM and Log Management

Independent Host Forensics and File Integrity Monitoring

Network Forensics with Application ID and Full Packet Capture

State-of-the art Machine Analytics

Advanced Correlation and Pattern Recognition

Multi-dimensional User / Host / Network Behaviour Anomaly Detection

Rapid, Intelligent Search

Large data set analysis via visual analytics, pivot, and drill down

Workflow enabled automatic response via LogRhythm's SmartResponse

Integrated Case Management


Lookout is a cybersecurity company that predicts and stops mobile attacks before harm is done. Lookout’s cloud-based technology is fuelled by a data set of the world’s mobile code and the predictive machine intelligence to analyse and make sense of the data.

Lookout is a mobile security company that predicts and stops mobile attacks before harm is done to an individual or an enterprise. Lookout’s cloud-based technology is fuelled by a global network of more than 100M mobile sensors and tens of thousands of apps that are added daily. With this data set of the world’s mobile code and the predictive machine intelligence to analyse and make sense of the data, Lookout can identify connections that would otherwise go unseen and stop cybercriminals from attacking mobile devices. 

 

The world’s leading mobile network operators, including AT&T, Deutsche TelekomEEKDDI, Orange, Sprint, T-Mobile and Telstra, have selected Lookout as its preferred mobile security solution. Headquartered in San Francisco, Lookout has offices in Boston, London, Singapore, Tokyo, Toronto and Washington, D.C.


Mimecast is a leader in enterprise cloud services for the security, archiving and management of email and corporate human generated data.

Mimecast is a leader in enterprise cloud services for the security, archiving and management of email and corporate human generated data. UK based data centres ensure UK jurisdiction for email archiving, a must for most organisations.

Email Security
Mimecast provides an always-on, cloud-based email security solution that reduces the complexity of protecting your organisation from malware, spam and data leakage. The service delivers robust 100% anti-virus and 99% anti-spam service levels, with 0.0001% spam false positives. An advanced mail transfer agent (MTA) acts as your email bridgehead in the cloud, stopping known and emerging email borne threats before they reach your network.

Enterprise Information Archive
Mimecast Enterprise Information Archiving provides a secure, dependable and highly scalable solution to growing information management challenges. A single, tightly integrated cloud platform delivers unified and secure enterprise email archiving as well as file archiving and IM archiving.
- Instantly protect valuable intellectual property assets through a purpose-built, highly secure and trusted cloud platform with 100% service availability SLA.
- Delight users and speed workflows with rapid search and content retrieval through a single, intuitive search interface across a choice of desktop and mobile apps.
- Comprehensive compliance, eDiscovery and litigation support through perpetual retention and documented, tamper-resistant chains of custody.
- Reduce cost and complexity through a single cloud platform and administrative console.

Office 365
While the capabilities of Office 365 are sufficient for some business, others – particularly in the enterprise space – will need additional third party products and services to address specific requirements not supported by Office 365.  These may relate to organisational complexity, risk management considerations, or the simple concern around having so much mission critical technology dependent on a single vendor.  Having made the decision to move email to the cloud, CIOs will not want to purchase LAN-based products to meet these requirements.
Mimecast provides a rich set of cloud services designed to meet the specific needs of Office 365 customers. We effectively remove barriers to adoption and accelerate deployment, by offering a blended cloud solution that integrates with Office 365.

Unified Email Management
Mimecast Unified Email Management (UEM) uniquely combines comprehensive email security, continuity and archiving solutions in a single, tightly integrated cloud-based service managed from a single administration console.


The leader in Enterprise Mobility Management (EMM) and Mobile Device Management (MDM) software, enabling organisations to securely deploy the latest generation of smartphones and mobile devices.

MobileIron's mission is to enable global companies to become Mobile First organisations, embracing mobility as their primary IT platform in order to transform their businesses and increase their competitiveness.

Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. Mobile First organisations focus on building superb mobile user experiences that are available anywhere users need them. They have to move fast and adopt new technologies rapidly.

Enterprise Mobility Management - EMM

Smartphones and tablets have transformed the way we interact with applications and content in our personal lives and now end users want that experience at work. To meet this growing demand, IT requires an enterprise mobility management solution to provision the apps and content users want, while maintaining privacy and data security.

Enterprise Mobility Management

By providing an enterprise mobility management (EMM) solution that meets both user demands and IT needs, MobileIron is enabling organisations to become truly Mobile First. The MobileIron Platform allows IT to secure and manage devices, apps and content providing end-users with instant access to corporate data on a device of their choice. With this purpose built EMM platform, organisations can spend more time innovating and driving business and less time securing mobile devices.

With MobileIron, organisations can enable the following:

Mobile Device Management - MDM
The MobileIron platform enables IT to secure and manage a diverse set of mobile devices, automatically provision enterprise settings such as Wi-Fi and VPN and provide end-users with secure access to corporate email. If a device should fall out of compliance, IT can define remediation actions that will either notify the user of policy violations or selectively wipe corporate information without touching any personal data. The MobileIron Platform consists of MobileIron Core, a security and management policy engine, MobileIron Client that automatically configures the device to function in an enterprise environment, and MobileIron Sentry, an intelligent security gateway.

Mobile Application Management - MAM
MobileIron provides an end-to-end solution that provisions, delivers, secures, and retires mobile apps. With these capabilities, IT can manage the entire application life cycle: from making the applications available to employees through the Apps@Work private enterprise app store; to securing applications on the device; containerising corporate apps from personal apps using MobileIron AppConnect.

Mobile Content Management - MCM
With MobileIron's integrated solution, IT can enable end-users to securely access and manage enterprise documents residing in a variety of content repositories, including Sharepoint, WebDav, and CIFS. MobileIron’s MCM solution also ensures that corporate email attachments are encrypted and can be viewed using authorised applications including MobileIron Docs@Work. Additionally, end users can securely browse corporate intranet content without the need for a device-wide VPN using MobileIron Web@Work.


NetMotion optimises and secures all traffic to mobile devices across any network, application or operating system which delivers an unparalleled mobile user experience, increases operational efficiencies and resolves performance issues in real time.

Overcome the challenges of mobile environments by delivering reliable connections, speeding issue resolution, and monitoring mobile users in real-time with the NetMotion product suite.

NetMotion Mobility is an intelligent solution that not only secures connections and data, but enhances and optimizes network connectivity to ensure business-critical applications are always accessible. It is the component of NetMotion’s Mobile Performance Management solution that accelerates, optimizes and secures all mobile device traffic supporting any network, application or operating system.

NetMotion Diagnostics gives IT teams and business managers the real-time visibility and operational intelligence to productively manage, support and understand their investments in mobile technologies. It allows them to diagnose connectivity-related problems, whether on the mobile device, GPS unit, corporate servers, or across any of the private or public networks being used. It dramatically speeds resolution of issues with remote devices to ensure mobile users stay productive. Diagnostics can also export mobile information and event data to SIEM and BI systems for extending their visibility and value outside the firewall.

Performance Analytics and Diagnostics deliver constant real-time analytics on mobile devices (Windows, iOS, and Android), applications and networks – private and public. The robust data offers a true picture of how workers, devices and applications are using bandwidth, allowing IT to make smarter decisions to tune and enhance the user experience and productivity. And since it is often difficult to tell whether apparent connection problems are caused by the multiple networks (cellular, WiFi, Ethernet, etc.), applications or device hardware, complete troubleshooting information allows IT to respond quickly and get the worker productive again. With the analytics and real-time integration with SIEM and BI analysis tools available (e.g., the NetMotion Mobile Deployment application in Splunkbase), responsible business managers are better equipped for decision making regarding their investments in and operation of mobile technologies.

Want more information on how to optimise your mobility field services?

Download NetMotion's e-book on Field Service Mobility Best Practices now.

 


OneLogin, an innovator in enterprise identity management, provides the industry’s leading SaaS solution for managing internal and external users across all devices and applications. 

OneLogin, an innovator in enterprise identity management, provides the industry’s leading SaaS solution for managing internal and external users across all devices and applications.

OneLogin is named Leader in Forrester WaveTM: B2E Cloud IAM, Visionary in Gartner’s IAM as a Service Magic Quadrant and a Major Player in IAM by IDC.

OneLogin’s cloud identity management platform provides more than 2,000 customers with secure single sign-on, multi-factor authentication, integration with common directory infrastructures such as Active Directory and LDAP, user provisioning and more.

OneLogin is SAML-enabled, providing an open source SAML toolkit adopted by over 400 ISV’s, and is pre-integrated with over 4,000 applications commonly used by today’s enterprises, including Microsoft Office 365, Google Apps for Work, Salesforce.com, ServiceNow, BMC Remedyforce, Box, Egnyte, EMC Syncplicity, Oracle CRM On-Demand, SuccessFactors, WebEx, Workday, and Zendesk. OneLogin, Inc. is backed by CRV, The Social+Capital Partnership, and Scale Venture Partners.