BITTIUM CORPORATION in User Provisioning Software

Are you from this Company?
BITTIUM
Oulu, Finland
1985
$51MN to $100MN
Enterprise
54 Likes
80 Buyers Negotiating

Summary

Bittium Secure Suite together with the secure Bittium Tough Mobile smartphones creates a network-wide secure zone that provides encrypted access to your organization's confidential data and services.

Features

Mobile Device Management: It has centralized remote management of the Tough Mobile and Android security features from the server.

Mobile Application Management: It manages private application library for providing applications to the device.

Secure Push Messaging: It has secure and scalable push system that can be easily implemented in apps. Familiar API, similar to common cloud messaging systems.

Log Server: It comes with visual log analytics for efficient incident response and even proactive incident avoidance.

Remote Attestation: Tough Mobile’s cryptographic hardware, TPM (Trusted Platform Module), provides proof that the remote device is exactly as it left the factory and carries unmodified, official firmware. 

Discussions

Strengths
  • +7
    Support & Maintenance
  • +12
    Less than 2
  • +8
    Medium
  • +10
    Role Management (Role based Network and resource access)
  • +14
    User Compliance and Governance
  • +12
    User Log Management
  • +13
    Cloud
  • +11
    Identity Synchronization
  • +9
    Privileged Access Security
  • +6
    Remote Support
  • +10
    Risk-based Access Control
  • +7
    Single Sign-On (SSO)
  • +7
    Monthly
  • +13
    Application Development Team
  • +14
    End-Users/Individuals
  • +9
    Finance
  • +5
    IT
  • +11
    Others (Specify)
  • +6
    Telecom
  • +11
    Product Branding
Cautions
  • -9
    Other Services
  • -8
    Planning and Consulting Services
  • -6
    System Integration Service
  • -11
    2 to 5
  • -7
    High
  • -9
    Low
  • -10
    More than 5
  • -11
    Administration and Management
  • -5
    Other Users
  • -13
    Password Management
  • -14
    Delegated access requests
  • -8
    Multi-factor Authentication
  • -14
    On-Premises
  • -5
    On-Site Support
  • -6
    Role Life Cycle management
  • -13
    Self-service access requests
  • -12
    Self-service profile changes
  • -12
    Information Security Specialists
  • -5
    Network Administrators
  • -6
    Others

BITTIUM Reviews

user-icon

Buyer, Telecom Infrastructure, SME

5
Jan 29, 2020

“They provide a wide range of templates”

They offer Product management utility which is very similar to the project instances where it elaborates on the most specific requirements which are identical to planning. They also provide a wide range of templates for project planning or management instances. Templates are time-savers with an inbuilt function of customizations.
Read less Read more
Useful (0) Not useful (0)
user-icon

Buyer, Telecom Infrastructure, SME

5
Jan 29, 2020

“A comprehensive solution provider for business-oriented platforms”

They provide a comprehensive solution for business-oriented platforms by adding additional information in the overall integration and file. The complete solutions offered by them are of enhanced quality and are well suitable for business-oriented programs.
Read less Read more
Useful (0) Not useful (0)
BITTIUM Presence in User Provisioning Software
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup