Fixmo SafeZone v5.0
July 01, 2013
Base price: $60 per user per year.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Simple installation, configuration and client control; completely isolates corporate data.
- Weaknesses: None evident.
- Verdict: A solid performer, exactly as advertised. We make this newcomer to our annual mobile device security group our Best Buy.
Mobile device management products shouldn't have to be complicated, and Fixmo SafeZone from Fixmo is proof of that. Incorporating 256-bit AES encryption, two-factor authentication support and a secure sandbox model into an easy-to-deploy application, SafeZone is a great choice for administrators who want robust data security on their users' mobile devices, simply.
Product setup was incredibly simple. We were provided access to a cloud-based server hosted by Fixmo. However, the on-premises server installation requires only a Windows 2008 server and a Microsoft SQL database server. User and device administration was configured via a web browser. Once we created a user and specified an email address, the server, port and activation token details were sent to our test user. After downloading the SafeZone application to our test device, we input those credentials and the software automatically created our encryption keys and tied them back to the server. We were then presented with a configuration screen where we specified our email account information. Once that was done, the product was ready to use.
The product functions as a secure sandbox, completely isolating corporate data from the end-user device. All data is encrypted with FIPS 140-2-compliant, 256-bit AES encryption. Policies can be set governing minimum password requirements, idle time before requiring re-authentication, and length of time the device is permitted to be out of contact with the server before the secure sandbox is wiped. Administrators can configure one-time passwords to be used in certain events, such as reaching the configurable limit for failed authentication attempts, reaching the aforementioned time limit for the device to be out of contact with the server, or when a manual device lock is specified. Applications are provided within the sandbox that offer secure access to a user's email, calendar and contacts. Document creation and editing is provided via the included Picsel SmartOffice 2, which offers support for Microsoft Word, Excel and PowerPoint files, as well as support for viewing and annotating PDF files. The secure camera application allows users to take and email photographs - all within the encrypted sandbox. The alternative, cloud-based server deployment requires VPN access to gain a connection with those same internal sites, but is a simple-to-use alternative that companies with small or no IT departments will find useful.
Documentation is provided on the company's website through a client portal, which offers a knowledge base and a number of PDFs. Separate documentation is provided for the server portion, as well as for the iOS and Android clients. Each PDF is clear and definitive, with easy-to-follow instructions covering each feature.
Fixmo offers two levels of support - basic and premium. Basic provides email, phone and web-based assistance options eight hours a day, five days a week. The premium add-on can be purchased for an additional per-user cost, and extends the support hours to 24/7.
Fixmo SafeZone is available at a base price of $60 per user per year. The premium support package tacks on an additional $5 per user per year.
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows
- Acer breach caused by improperly stored data
- Check Point tracks two waves of Cerber ransomware hitting U.S., UK
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components