Data security system enables rapid deployment and secure management of services over-the-air
MISSISSAUGA, Ontario – (April 18, 2006)–When it comes to security, managed service providers (MSP) have a tall order: rapid deployment, multiple platform support, easy and secure management of services and upgrades to thousands of devices. Certicom Corp. (TSX: CIC) announced today that Mobile Armor is using Certicom technology to expand its wireless suite of security products to include IPSec for virtual private network (VPN) connectivity that meets the needs of MSPs.
"Mobile Armor provides the 'best of breed' mobile security solution for protecting critical data and information on mobile devices, laptops, and desktops," said Chand Vyas, chairman and CEO of Mobile Armor. "Integration of Certicom's highest quality, standards-based IPSec VPN functionality into our existing solution provides a secure and trusted method to wirelessly deploy and manage services."
Relying on Certicom's experience in developing security for resource-constrained environments, Mobile Armor was able to integrate a standards-based VPN client that is about one-tenth the size of the desktop version but with equivalent functionality. The Mobile Armor solution, with Certicom's VPN technology, provides the tools required to secure the enterprise, including cross-platform centralized management and reporting; data and network protection; and compliance and remediation. Mobile Armor's next-generation technology security solution currently ensures the data integrity of the U.S. Department of Defense, small to large enterprises and MSPs.
"By working with Certicom, Mobile Armor is able to accelerate its time to market with secure VPN connections that support leading platforms and gateways," said Ian McKinnon, Certicom's president and CEO. "Mobile Armor's solution offers mobile service providers the means to safely manage and deliver services 'over the air' with unparalleled security."
Under the terms of the agreement, Mobile Armor will pay a one-time license fee, professional services fees and royalties on a quarterly basis, on deployment of products.
About Mobile Armor
Privately held, Mobile Armor is a St. Louis based leading provider of Enterprise Mobile Data Security (EMDS™). Mobile Armor develops and markets the next-generation software suite that enables dynamic organizations to fully protect business, financial and operating information and data. Mobile Armor's solution has been certified to meet the standards and guidelines for security set by the National Institutes of Standards and Technology, an agency of the United States Government. Visit www.mobilearmor.com
Certicom protects the value of your content, software and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com
Certicom, Certicom Security Architecture, Certicom Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder, Security Builder API, Security Builder BSP, Security Builder Crypto, Security Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder NSE, Security Builder PKI and Security Builder SSL are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders.
Except for historical information contained herein, this news release contains forward-looking statements that involve risks and uncertainties. Actual results may differ materially. Factors that might cause a difference include, but are not limited to, those relating to the acceptance of mobile and wireless devices and the continued growth of e-commerce and m-commerce, the increase of the demand for mutual authentication in m-commerce transactions, the acceptance of Elliptic Curve Cryptography (ECC) technology as an industry standard, the market acceptance of our principal products and sales of our customer's products, the impact of competitive products and technologies, the possibility of our products infringing patents and other intellectual property of fourth parties, and costs of product development. Certicom will not update these forward-looking statements to reflect events or circumstances after the date hereof. More detailed information about potential factors that could affect Certicom's financial results is included in the documents Certicom files from time to time with the Canadian securities regulatory authorities.
The shares of the company described above have been offered only to qualified institutional buyers in reliance on Rule 144A under the Securities Act of 1933, as amended (the "Securities Act"), and outside the United States pursuant to Regulation S of the Securities Act. The shares have not been registered under the Securities Act and may not be offered or sold in the United States or to a U.S. Person absent registration or an applicable exemption from registration requirements.
This press release does not constitute an offer to sell or the solicitation of an offer to buy any security and shall not constitute an offer, solicitation or sale in any jurisdiction in which such offering would be unlawful.
For further information, please contact:
|Lisa Courtney Lloyd||Wendy Moore-Bayley|
|Jolita Communications||Certicom Corp.|
|(613) 271-7512||(613) 254-9268|