Come work with us
Are you an industry thought leader with a strong network in mobile, cloud, or web and the ability to build new business? Fed up with endless meetings, stifling bureaucracy, and caps on your potential? Explore a unique opportunity to drive your own future as Sourcebits Studio Director.
Sourcebits Studios are discrete practice groups with focus in specific areas from Mobile Enterprise Applications to Web Gaming. Each is headed by a highly qualified Studio Director who is responsible for driving their Studio’s projects from initial client engagement to final delivery.
Studio Directors are industry leaders in mobile, cloud, and UX design—from the former CEO of the world’s largest open-source mobile platform, to an Apple Design Award winner.
As a Director you’ll share completely in the success of your studio, and have full authority to run it as your own business unit—with unlimited potential. At the same time, you’ll have access to all of the resources Sourcebits provides as a global company backed by Sequoia Capital and IDG Ventures. Sourcebits gives an unprecedented level of support and trust to Studio Directors, and Directors return that trust by delivering spectacular service and results for their clients.
You’ll work with amazing people throughout the company who care as deeply about the success of your clients’ projects as you do. Because Studios work together, clients have access to the best minds in mobile, web, and cloud development across multiple platforms and disciplines. At the core of Sourcebits Studios you’ll find more than 400 Sourcebits employees, each whom bring their extreme passion and focus to client projects across a wide range of talents and skills.
We’re looking for a few people who share that passion and focus and can back it up with a track record of success. If you think you have what it takes to lead your own Studio, get in touch below to learn more.
Mobile Risk Management
Sourcebits provides your organization with highly customized enterprise security solutions based on your industry and company-specific requirements.
Along with software solutions, Sourcebits also introduces effective enterprise security guidelines and practices that help customers cut costs on redundant software, improve processes and make overall security more efficient.If your enterprise has embraced the bring your own device (BYOD) trend, you’ve already experienced the heterogeneous deployments of BlackBerry, Android, iOS, Windows Phone and other mobile platforms that are becoming the norm.
Smartphones and tablets are the new hub for a vast range of business and consumer apps provided by both commercial developers and internal IT departments. And with technologies like Bluetooth and NFC, machine-to-machine (M2M) interactivity is on the rise. Mobile devices are now being used as wallets, ID badges, and more. The new opportunities are signiﬁcant and the BYOD approach can lead to real cost savings for organizations. But along with this comes an unprecedented and complex set of security and compliance risks that require a thoughtful approach to mobile risk management.
Securing Enterprise Mobility One Device at a Time
Sourcebits recently delivered a comprehensive security app to address one enterprise client's concerns over the increased risks of lost or stolen mobile devices, unsecured networks, and mobile data backup failure. The solution addressed these issues across multiple platforms, one mobile device at a time, with features including:
Virus and Malware Protection
Protecting a mobile device starts with software that prevents viruses and malware from being installed in the ﬁrst place. But because no software is ever truly virus or malware proof, Sourcebits addresses and minimizes the physical risks unique to mobile devices as well.
Proactive Lost or Stolen Device Alert
When a mobile device is lost, stolen, or just left behind, the longer it’s gone, the less likely it will be returned, and the more likely the risk of a security breach. The solution we created uses a variety of signals to determine that the device was likely lost or forgotten, then sends an email to the user with the
device location, the time the device was “lost”, and a list of login attempts, transactions, calls, and SMS messages that were received or sent during the ensuing period. The device can also be remotely locked, wiped (completely or selectively), or instructed to sound an alarm. Read Case Study Alert User of an Unsecured Network or Region In a typical use case, a user goes to an airport and attempts to log into various non-secured WiFi hotspots to see if he can get free internet while waiting to board. The app notices that the user is attempting to connect to an unknown, non-secure network, and sends a clear, strong warning, “You are attempting to connect to a non-secure network. Assume that everything you do, all passwords you enter, and all websites you view will be public knowledge. Do you really want to do this?”
In another use case, a user lands in a region rife with cyber espionage, activates their device and receives the following notiﬁcation: “You are now in a region that is known for poor online security — please assume that all transactions and communication will be monitored.”
Strong warnings provided at the right time help make users more accountable for their actions and can signiﬁcantly increase user compliance with security protocols.
Device Backup Auditing and Thresholds
While users may initially conﬁgure their devices to backup their data on a regular basis, there’s often no easy way to know that the data is actually being backed up on a regular basis. The app scans the device at regular intervals and notiﬁes the user when there’s a large amount of data that hasn’t been backed up.
Mobile Security for Enterprise Accounting
A premier accounting application software vendor provides a complete accounting solution for businesses across the globe. They partnered with Sourcebits to develop a mobile application which facilitates an easy and intuitive way to record ﬁnancial transactions on the iPhone and sync them back to a centralized accounting server. Transactions included highly sensitive data such as quotes, orders, invoices, activity slips, and expense statements, and we helped the client understand that as mobile devices reduce friction in recording transactions they also introduce new threats. To prevent any data breaches, Sourcebits ensured that the app met a broad range of security requirements:
While any user can download the base app from the app-store, in a business environment users will need to authenticate against a central Identity Management Server before gaining access to ﬁnancial transactions and the full feature set. During the initial account setup, we used a two-factor authentication scheme to provide additional protection against phishing & malware.
Lost or Stolen Device
Mobile devices are easy to use, and easy to lose. Sensitive data (access credentials, transactions and customer data) can fall into the wrong hands and be compromised. For this application, transactions logged and stored on the device were encrypted using one of the highest standards for encryption–AES-256–to ensure critical application data will not be compromised. Providing a further layer of security, if a user reports a lost or stolen phone a “remote-wipe” enforces removal of all sensitive data.
Password Aging and Strength Policies
In addition to providing authentication services, the centralized server enforced security policies including strong passwords, pasword aging, maximum re-tries, and limited access for users not current with the latest security updates and patches.
In the newly mobile world, enterprise security is more important than ever. As a global expert in enterprise security, Sourcebits design-driven development methodology incorporates security as an integral focus at every phase of your project, from high-level architecture to application design, testing, launch, and ongoing deployment.
Looking for custom Mobile, Cloud, or Web development services?
Watch the video.
FROM THE BLOG
Piotr Gajos Sourcebits' tagline is "Design-Led Engineering," and we mean it. Our design team is made up of everyone fro Read More…