FancyFon Software: Centralized Control of Enterprise Mobility
Bartosz Leoszewski, CEO
“We approach mobile security not as a product but as an ongoing process that takes place on a daily or hourly basis,” begins Bartosz Leoszewski, CEO of FancyFon Software, as he engages in a dialogue concerning the surge in cyber threats. This forward-thinking statement focuses on the ongoing growth of bring-your-own-device (BYOD) programs that have placed immense pressure on IT administrators to manage the diverse mix of laptops, phones, and tablets making their way into the enterprise network. While organizations today are on a quest for efficient solutions that can manage all their apps, websites, and data silos, Leoszewski and his team at FancyFon Software are moving in a direction ahead of its time to offer more comprehensive mobile security solutions. These solutions, he stresses, not just provide management and enforce security console on the devices, but also analyze what is happening in the devices itself to detect potential threats. “Our major focus is to sell mobile security as a service rather than a product,” says Leoszewski.
Keeping security as a main component and differentiator in mind, FancyFon builds comprehensive mobile applications that help in managing, analyzing, and controlling the mobile devices as well as their content. With the help of FancyFon’s Enterprise Mobility Management (EMM) platform, enterprises can collect data and real-time status of the mobile devices, subsequently analyzes for a suspicious user, operations, files and also behavior on the device, to identify and mitigate threats.
We don’t just offer EMM solutions, rather we build a whole secure workplace infrastructure based on EMM platform
“We don’t just offer EMM solutions, rather we build a whole secure workplace infrastructure based on EMM platform,” asserts Leoszewski. FancyFon’s enterprise mobility management platform helps organizations in managing every aspect of security from networks, OS and app vulnerabilities. To secure the exchange of data across shared or public networks, the company has built VPN connections for each client that meets security requirements of the client’s infrastructure. By allowing employees to exchange or access the data securely through mobile devices anywhere on the campus, FancyFon’s EMM platform improves productivity and flexibility while offering high-end enterprise level security. The IT teams can now gain visibility and control over a large fleet of smartphone devices, at a single location to radically improve the security of both devices and associated data.
Once the company has secured all the devices, which is manageable using their EMM platform, they help customers in building simple applications for retrieving emails on the devices, securing their voice communications and more.
Catering to numerous customers across different sectors such as government, telco, financial, energy and pharmaceutical, the company’s EMM platform has gained traction over the nine years of its existence in the marketplace. FancyFon has partnered with companies such as Navayo, a cybersecurity firm based in Hungary to encrypt all the calls, chats, and video conferences to thwart suspicious activities. Based on their experience working in the mobility landscape, FancyFon has built a knowledge base that comprehends the difference between normal and unusual behavior. “For instance, it’s normal for a user to check email for five times a day, but if the activity repeats in between 1 am and 6am—that’s unusual. We are building intelligence that allows our platform to detect such malicious activities and automatically remediate them,” explains Leoszewski.
Along the path of innovation, FancyFon is planning to integrate artificial intelligence and machine learning into their EMM platform to provide an additional layer of security for mobile devices. By doing this, the system can detect something new that was never defined before, and open new ways to mitigate security threats without the intervention of a security administrator.
This content is copyright protected
However, if you would like to share the information in this article, you may use the link below: