Sophos Mobile Control - Competitive Overview

Size: px
Start display at page:

Download "Sophos Mobile Control - Competitive Overview"

Transcription

1 Sophos Mobile Control - Competitive Overview Content Page Introduction to MDM Market overview, positioning and discovery questions 2 Lightweight vs Heavy weight approaches 3 Competitive comparisons AirWatch 4 MobileIron 5 Comparison Sophos vs AirWatch and MobileIron 6 Good Technology 7 Comparison Sophos vs Good Technology 8 Feature comparison Sophos vs Security Vendors 9 Objection Handling and MDM Vendor Capability Overview 10

2 Page 2 of 10 Sophos Mobile Control Introduction to MDM What is happening in the Mobile Device Management market? The MDM market is growing rapidly (>100% per year) with many new players. It will mature over time. To support a multitude of different device types, especially in the BYOD (Bring Your Own Device) environment As the above criteria cannot be met by MS Exchange ActiveSync There is little differentiation in the level of control of the mobile devices between the different MDM products as they are limited by what the mobile OS vendors allow on their platforms. Note: Be sceptical of MDM vendors claiming they are not affected by or can circumvent explicit OS limitations. This is probably not true or applies only to jail-broken or rooted devices. Apart from Blackberry, which can be closely managed by a Blackberry Enterprise Server (BES), Apple s ios is the most frequently adopted platform in enterprises. Android has proven less popular in the enterprise due to the limited MDM capabilities provided by Google. Some OEMs have developed their own MDM capabilities for Android but these are specific to that vendor. How does Sophos Mobile Control compete in this market? SMC is very light on the mobile device SMC is easy to implement and use for customers in the mid market SMC is non-obtrusive to the device user and requires minimal training SMC is part of our Complete Security Suites Sophos is a provider of complete security which means customers can cover all their security needs from one vendor. For the mobile area, this covers especially Sophos Mobile Security, our mobile AV solution and Sophos Mobile Encryption, our data protection solution SMC is backed up by 24/7 tech support; externally audited for quality and with optional service level agreements for complete peace of mind Why do customers buy MDM solutions? value proposition To get an inventory of all smartphones and tablets accessing the corporate network or data To push out security policies and settings over-the-air (OTA) To make sure only devices compliant with their policies have access to corporate and data To remotely lock or wipe a lost or stolen device To provide approved apps in an Enterprise App Store and control time-wasting or inappropriate applications To reduce the IT burden with over-the-air management and user selfservice web portal Discovery questions What resources are you planning to dedicate to the deployment and management of mobile devices? How will you know if devices are running malware or compromised apps? How do you know if devices are compliant and not jail-broken? How many vendors are you using to build your complete security solution? What level of technical support do you expect from your supplier?

3 Page 3 of 10 Lightweight vs Heavyweight / Container based approaches There are two approaches to mobile security and data protection currently available on the market, each with its advantages and disadvantages. - The lightweight MDM approach secures devices through a combination of security features available in the operating system and tools provided by the MDM vendor. - The heavyweight container app approach uses a proprietary app (container app) which holds all the data and provides all user functionality like , calendar and document editing. Lightweight approach Vendors: Sophos, MobileIron, AirWatch, Zenprise, McAfee, Symantec, Trend Micro Advantages: Keeps the native user experience, leading to happy users Only one log-in needed Low cost of implementation 1. Easy and quick to deploy 2. Minimal user training required 3. Low user support requirement Manage and control more aspects of the device e.g. camera, app store, VPN settings, proxy settings and many other Covers other areas of MDM like device inventory, compliance check, SW distribution Disadvantages: Can only manage, what the mobile OS allows, especially in the new sandbox type of runtime environment Separation of personal and company data only possible with support of the OS vendor (like ios) or some 3rd party tools (Dual Persona, Touchdown Mail client, ) Somewhat limited control of the company data (copy&paste, forward per mail, local unprotected files) Heavyweight / Container App approach Vendors: Good Technology, Excitor Advantages: Strong control of data 1. Full control over the capabilities of the app, like encryption, separation of corporate and personal data, copy&paste protection 2. Selective wipe of corporate/personal data is very easy Disadvantages: Different user experience in the container app is not very well accepted (e.g. log-in twice) The container app requires training as it is different from the host OS A container app comes with a number of restrictions in usability, which significantly lowers the user acceptance (call number from mail) Heavyweight app is often a burden to the phone in respect to performance and battery lifetime (see the app rating in the App Stores) This approach does not protect data in other apps The container is often limited to , calendar and address book, leaving all other data unprotected Does not configure the phones other settings As you can see from the lists above, both approaches have their pros and cons. A pure play container approach is mainly focused on data protection, but leaves device management requirements uncovered. After careful consideration we chose the lightweight approach as this aligns better with the requirements of our customers.

4 Page 4 of 10 Sophos Mobile Control vs. AirWatch Company Profile: AirWatch - Headquartered in Atlanta, USA, Founded Privately owned - Staff: Revenue: Unknown, Estimate million USD - Leaders in Gartner MDM MQ Product Mobile Device Management - Complete MDM functionality + extended MDM - Modern user interface, non-intuitive structure What we can exploit Complete Mobile Security - AirWatch has an offering, which includes MDM, MAM and Document Sharing (called MCM). Combining our Sophos Mobile Security offering, UTM appliances with captive page for mobile and our web appliances we offer a more complete solution. Global 24/7 Tech support - While AirWatch constantly improves its support offering, Sophos is still far ahead. Highlight our 24/7 offering and SCP certification. Complete Security from a global security vendor - AirWatch is just focused on Mobile Device Management and related features. As a global security vendor, Sophos can bring more to the table. Highlight all the benefits of a single vendor approach. SaaS Data center in Europe - Depending on the customer this may be a strength. For some mid-size customers in Europe and elsewhere, storing data in a SaaS solution in the European Union is perceived as positive. What to watch out for Nice looking user interface - Customers love the AirWatch interface at first look. If they compare SMC to AirWatch, make sure, they have used both interfaces. The AirWatch interface has a non-intuitive structure which takes time to get used to. Over Marketing - AirWatch is known for over-marketing their capabilities. They often claim support for a super set of ios and Windows Mobile capabilities. Suggest that prospects comparing AirWatch to SMC should confirm support for their environment with AirWatch. They always confirm supporting the same feature set as SMC. - This is especially true, if a prospect compares SMC against the AirWatch web page. Aggressive pricing - AirWatch has the most aggressive pricing in the MDM market. They are at the same price or 10% higher than SMC. We have heard of additional discounts beyond the public pricing. If you compete against AirWatch on pricing, please check the AirWatch web page for the latest pricing. It is changing quarterly (http://www.air-watch.com/pricing). Usually, SMC pricing can match AirWatch pricing, except for special offers or discounts. In some well-established regions, AirWatch has raised prices again and SMC can clearly undercut them. If you compete against AirWatch, try to offer multi-year contracts to undercut them and be aware of special offers. Handling objections AirWatch supports deployments over devices Yes, AirWatch might support such deployments, but at what cost. An AirWatch server supports only devices. Beyond this, a network load balancer, multiple servers and a common joined database is needed. The 100k installation would require >40 servers! Ask your customer to request a sizing from AirWatch for their larger deployment. AirWatch is in Gartner s leaders quadrant Undeniably, AirWatch is in the leader s quadrant, while Sophos is not. Sophos made it to the Gartner s MQ, after only 9 months in the market, which is a very good achievement. Please check the existing CIA regarding Gartner s report for more details. AirWatch provides more than MDM AirWatch claims to support multiple solutions beyond MDM: Mobile Security Mobile Content Management Mobile Application Management Mobile Management BYOD Management This looks good at first glance, but is marketing bloat. Mobile Content Management is the only valid solution, which can be sold separately. See Sophos components for comparison: Mobile Security > Security settings and compliance check. AW has no Mobile Security solution Mobile Content Management > Sophos Mobile Encryption Mobile Application Management > Built-into Enterprise App Store Mobile Management > Built-into EAS Proxy BYOD Management > A business need, not a feature, which Sophos address as well.

5 Page 5 of 10 Sophos Mobile Control vs. MobileIron Company Profile: MobileIron - Headquartered in Mountain View, CA, USA. Founded in Privately owned. - Staff: ~500 - Revenue: Unknown, estimated million USD - Leaders in Gartner MDM MQ Product Advanced Mobile Device Management - Complete MDM solution but lacking extended MDM functionality - Poorly structured UI What we can exploit Complete Mobile Security - MobileIron has an offering, which includes MDM and MAM. Document protection has just been added recently and we have very little details on this. With our Sophos Mobile Security offering, UTM appliances with captive page for mobile and our web appliances we can offer more, than they have. Global 24/7 Tech support - MobileIron s support organization is not positioned to support the product globally. For example their webpage says APJ and EMEA customers: please contact your regional partners for MobileIron Support inquiries. This results in overly long support cycles in case a partner is not able to handle the support request. Complete Security from a global security vendor - MobileIron is just focused on Mobile Device Management and related features. As a global security vendor, Sophos can bring more to the table. Try to play vendor consolidation and support simplifications. If the customers buys everything from one source. Simple SaaS Solution - MobileIron s SaaS offering Connected Cloud is not as easy to setup and use as the SMC SaaS offering. It always requires a server to run in premise at a customer. Setup times at MobileIron and at the customer are much higher than with SMC. This is driven by the MobileIron architecture, which is not designed as a SaaS solution. Highlight the fact, that SMC SaaS offering is up and running in minutes without any change to the corporate IT SaaS Data center in Europe - For a lot of mid-size customers in Europe, storing data in a SaaS solution hosted in America is a critical point. Highlight the fact, that the SMC SaaS offering is hosted in a German data center Pricing - MobileIron has positioned itself as a premium vendor, resulting in a pricing which is >50% higher than Sophos and a minimum deal size of 100. In Germany they send customers below 100 away. If you feel, that the customer is price sensitive, this might give you a competitive edge What to watch out for Customer references - MobileIron is strong in reference customer sales. They can provide a success study for almost every industry, region and customer size. This is related to their time in the market.

6 Page 6 of 10 Comparison - Sophos Mobile Control vs. AirWatch / MobileIron Sophos AirWatch MobileIron Complete Security Vendor Yes No - MDM only No - MDM only Easy to use interface Yes Yes with some complexity in navigation Complex interface, not clearly structured Example: Compliance Settings are mixed with device settings. Compliance mitigation is in another place Mobile security offering Y N N Secure document exchange Y - Sophos Mobile Encryption Y - Secure Content Locker N Tech Support Availability 24/7 Global support operations. 24/7 - US based. Some issues with support have been raised, especially non-us. MI supports only 8-6 PST. EMEA and APJ customers have to contact MI partner/supplier Tech Support Accreditation SCP certified None None Price for 100 users (list price per user or device /year -unless stated otherwise) On premise Subscription: $31,50 Perpetual: $50, % maintenance/year Hosted Subscription: $44.50 On premise Subscription: $39,00 Perpetual: $50, % maintenance/year Hosted Subscription: $54 On premise Subscription: 55 Perpetual: 86, % maintenance/year Hosted Subscription: $48 /year $4 /month Minimum license size 10 user 25 user* Platforms Gartner comments Android, Apple ios, BlackBerry, Windows Mobile See CIA for responses to Gartner (Sophos internal only) *A onetime activation fee of $1,500 is required for accounts with less than 100 devices Android, Apple ios, Mac OS X, BlackBerry, Symbian, Windows Mobile, Windows Phone AirWatch needs to raise its level of local support outside the U.S. 100 user Android, Apple ios, BlackBerry, Symbian, webos, Windows Phone It does not have its own encryption capabilities

7 Page 7 of 10 Sophos Mobile Control vs Good Technologies Company Profile: Good Technologies Inc. - Based in Sunnyvale, California, USA. - Products: Good for Enterprise (suite consisting of Good Mobile Messaging, Good Mobile Control, Good Mobile Access, Good Dynamics), Good for Government (access card integration, S/MIME support) Product Good for Enterprise Good is one of the few vendors who have adopted the container app approach to managing mobile devices. This means that one application is used to access secure and for document exchange. What we can exploit SaaS Offering - Good does not offer any SaaS solution. Highlight our flexibility in deployment and fast time to go live. Sophos does not touch mails - All data send to the Good app on the device has to go via the Good NOC in America. The architecture is similar to the Blackberry architecture. This is a concern for many customers, particularly outside USA. Pricing - Good is offered at a premium price. With SMC, we will undercut Good pricing in most cases. Note: Good has just recently (Oct 2012) released a lightweight MDM offering similar to SMC. Pricing information on this product is still unknown. Usability & Employee acceptance The Good container app brings with it all the downsides of the heavy weight approach. - Usability: It has a proprietary user interface, which differs from native apps. Restrictions imposed by data protection in the container will also affect the way people can use the system, causing problems with usability. For example (depending on configuration of the container app): o o o o Users cannot dial a number directly from the container The caller s number is not linked to an address book entry, so the user cannot see, who is calling If a user wants to add a new address, he/she must make sure to add it to the Good app and not to the device address book New mails are not shown on the phone. The user has to login to the system and press sync, before new mail will arrive - Lifting these restrictions would void the security provided. - System Impact: Another area of user annoyance is the burden the Good app puts on the phone. The phone will slow down, the app uses a lot of memory and the battery lifetime will suffer. Check the App Store for user comments and use as proof points. What to watch out for Good is loved by the CISO - If the CISO is driving the decision for an MDM solution, the customer will favor restrictive solutions like Good. Try to get end users into the deal. Link them to the ratings of Good on the Apple App Store or Google Play (https://play.google.com/store/apps/details?id=com.good.android.gfe and https://play.google.com/store/apps/details?id=com.good.android.webkit.ging erbread) Selective Wipe SMC can wipe information instantly. Users with personal devices need to balance the convenience of using their device when deciding to use it for both personal and business use. Most personal devices are backed up on personal computers. Handling Objections You need Good to successfully implement BYOD - Good make a lot of noise about data security in BYOD. They claim that only the container approach will deliver the needed level of security. It all depends on the security needs of the customer. Especially on ios, the builtin data separation and data protection covers most requirements and leaves few needs for a container app. Remember to bring back the conversation to user satisfaction. Offer a trial of SMC and ask the customer to compare satisfaction. o The container app has its own password, so the user must login twice

8 Page 8 of 10 Comparison - Sophos Mobile Control vs. Good Technologies Opportunities Customer value & Proof point - Sophos How Good Technologies does it Single login Users only need to log in to a device once Users are forced to log in to the Good app as well as entering the normal device log-in. This can cause frustration in the long term. Uses existing infrastructure SMC requires no changes to existing communications. All and calendar communications are routed via Good s operations center in USA. This introduces delay and may cause privacy concerns in some markets. Tech Support availability as standard 24/7 telephone, Web/ Business hours only telephone Mon-Fri. Web/ Tech Support Accreditation SCP certified None Price for 100 users (list price) Subscription: $31,50 Perpetual: $50,00 Street prices of >$100 have been reported Impact on the mobile device (battery, memory) Little impact on battery life or memory consumption Significant impact on battery life and memory consumption Usability Little impact on device usability Depending on configuration, significant impact on usability in standard operations (e.g. call number from mail) Gartner comments See CIA for responses to Gartner (Sophos internal only) Pro It has a large installed base in regulated sectors, such as financial services, government, defense, public sector, healthcare and professional services Con The cost of the Good solution is relatively high per user seat There are no cloud offerings, nor does Good yet integrate with major cloud-based service providers.

9 Page 9 of 10 Sophos Mobile Control vs. Security Vendors Sophos Mobile Control Symantec Mobile Management McAfee Enterprise Mobility Management Trend Micro Mobile Security Kaspersky Endpoint Security for Mobile Managed through Symantec IT Management Suite (Altiris) or MS System Center on premise. There is no hosted SaaS option. Integrates with the epo management console. Hosting offered by 2e2 to ISPs and large enterprises not the SMB market. This product integrates with existing Office Scan management consoles. It has weak app management and they don t support Apple s volume purchasing. Kaspersky lacks an MDM solution per se. KESM is in essence a consumer product with basic security features. Can be managed from K. Security Center. No support for Apple ios. Platforms Android 2.2+ Apple ios 4+ BlackBerry Windows Mobile 6.1+ Android 2.0+ Apple ios 4.0+ Windows Phone Windows Mobile Android 2.2+ Apple ios 4.x+ BlackBerry Windows Phone 7.x Android Apple ios BlackBerry 5.0+ Symbian S60 3 rd, 5 th Windows Mobile Android BlackBerry Symbian Windows Mobile MDM MQ Position Niche Challenger Niche Niche - Device Inventory Over the Air enrollment and config. Lock, Wipe & Locate Self-Service Portal Optional Enterprise App Store Device Messaging Compliance Enforcement MS Exchange ActiveSync Proxy Jailbreak detection SaaS No. of downloads from Google Play 1K-5K K-50K N/A Apple ios Client Managed security (SMC 3.0) ios/android Profile Manager (SMC 3.0) SCEP Support (SMC 3.0)

10 Page 10 of 10 General Objection Handling Sophos is not listed as a leader in the Gartner 2012 MDM MQ It is our first year in the MQ and we are well-positioned in the upper right of the niche players quadrant. We were the highest placed new entry We were included after just 9 months on the market The MQ positioning was done before our acquisition of Dialogs Sophos is not as feature-rich as some competitors We deliver complete security without complexity and are innovating fast We strive for simplicity and the most relevant features, not the most features No other vendor provides the same combination of complete security and ease of use Our capabilities closely match those highlighted as critical by Gartner (see below) MDM Vendor Capability Overview This capability overview is based on Gartner s Critical Capabilities for Mobile Device Management report published August While Sophos was not included we have made a mapping of SMC to generate comparative scores. AirWatch MobileIron Good Sophos Policy enforcement and compliance Security Containerization Application Management Document sharing and management Scalability SaaS and cloud delivery models

Mobile Device Management Buyers Guide

Mobile Device Management Buyers Guide Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

Sophos Mobile Control

Sophos Mobile Control Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Secure, Centralized, Simple

Secure, Centralized, Simple Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,

More information

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert

Achieving Multi-Platform Support in the BYOD Era. Presented by: Kaushik Srinivas and Josh Lambert Achieving Multi-Platform Support in the BYOD Era Presented by: Kaushik Srinivas and Josh Lambert Agenda Impact of mobile within the workplace Key bring your own device (BYOD) platforms Future trends in

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Mobile Device. Management-

Mobile Device. Management- Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Device Independence - BYOD -

Device Independence - BYOD - Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

AirWatch Pricing EUR. Effective May 15 th, 2013 Expires September 30 th, 2013

AirWatch Pricing EUR. Effective May 15 th, 2013 Expires September 30 th, 2013 AirWatch Pricing EUR Effective May 15 th, 2013 Expires September 30 th, 2013 Included Included Mobile Device Management Mobile Device Management (MDM) Manage corporate or employee-owned devices, configure

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Mobile Device Management and Security Glossary

Mobile Device Management and Security Glossary Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

Ben Hall Technical Pre-Sales Manager

Ben Hall Technical Pre-Sales Manager Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality

More information

A guide to enterprise mobile device management.

A guide to enterprise mobile device management. WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta. Addressing the BYOD Challenge with Okta Mobility Management Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Executive Summary The Impact of BYOD BYOD can be a very polarizing

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Mobile Device Security Risks and RemediaAon Approaches

Mobile Device Security Risks and RemediaAon Approaches Mobile Device Security Risks and RemediaAon Approaches Raj Chaudhary, Principal, Crowe Horwath LLP In- Depth Seminars D11 CRISC CGEIT CISM CISA Informal Poll What is your Atle/role? Internal Audit IT Audit

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Codeproof Mobile Security & SaaS MDM Platform

Codeproof Mobile Security & SaaS MDM Platform Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

BENEFITS OF MOBILE DEVICE MANAGEMENT

BENEFITS OF MOBILE DEVICE MANAGEMENT BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

The Security of MDM systems. Hack In Paris 2013 Sebastien Andrivet

The Security of MDM systems. Hack In Paris 2013 Sebastien Andrivet The Security of MDM systems Hack In Paris 2013 Sebastien Andrivet Who am I? Sebastien Andrivet Switzerland (Geneva) Specialized in security Mobiles (ios, Android) Forensic Developer C++, x86 and ARM (Cyberfeminist

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Blank Slide. For additional content

Blank Slide. For additional content Blank Slide For additional content 1 Merck Boosts Mobile Development and BYOD Flexibility with AirWatch by VMware Michelle Burnett, Enterprise Account Executive, AirWatch by VMware Explosive Growth of

More information

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM

More information

Good for Enterprise Good Dynamics

Good for Enterprise Good Dynamics Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

MobileIron and Samsung Value Proposition

MobileIron and Samsung Value Proposition MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global

More information

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt Mobile Device Management Andrius Šaveiko andrius.saveiko@atea.lt Content Mobile Device Management (MDM) where to start? Situation on MDM market MDM solutions very similar, but very different ios, Android,

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Mobile device and application management. Speaker Name Date

Mobile device and application management. Speaker Name Date Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Enterprise Mobility Services

Enterprise Mobility Services Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users

More information

McAfee Enterprise Mobility Management

McAfee Enterprise Mobility Management Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers

More information

The Truth About Enterprise Mobile Security Products

The Truth About Enterprise Mobile Security Products The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

J David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com)

J David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com) MDM Solutions Strengths, Weaknesses, Obstacles, Solutions J David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com) Nick McSpadden (nick.mcspadden@sacredsf.org)

More information

Five Steps to Android Readiness

Five Steps to Android Readiness Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and

More information

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows

More information

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are

More information

Unified Windows Device Management in the Enterprise

Unified Windows Device Management in the Enterprise Unified Windows Device Management in the Enterprise Chuck Brown Product Management Jimmy Tsang Product Marketing Lenovo ThinkPad 8 Giveaway Tweet @MaaS360 with event hashtag #MaaS360Win Winner will be

More information

BYOD in the Enterprise

BYOD in the Enterprise BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security whitepapers@contextis.co.uk October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

MOBILE DEVICE MANAGEMENT (MDM)

MOBILE DEVICE MANAGEMENT (MDM) PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Mobile Device Management Buyer s Guide

Mobile Device Management Buyer s Guide Mobile Device Management Buyer s Guide An Insider s View of the MDM Market Get to the bottom line on your MDM software decision Introduction The information contained in this document is based on the experience

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

The User is Evolving. July 12, 2011

The User is Evolving. July 12, 2011 McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0

More information

Technology Shifts. Mainframe Windows Desktop Internet

Technology Shifts. Mainframe Windows Desktop Internet Technology Shifts Mainframe Windows Desktop Internet 1975 1980 1985 1990 1995 2000 2005 Mobile Technology Shift March 12, 2010 March 7, 2012 How Significant? Declining PC Sales In the wake of Apple s ipad

More information

IT Self Service and BYOD Markku A Suistola

IT Self Service and BYOD Markku A Suistola IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

More information

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011 Consumerization of IT Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011 1 Agenda What is consumerization of IT? What s the hype? And why now? Media tablets in the enterprise 2 Is

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

IBM United States Software Announcement 215-078, dated February 3, 2015

IBM United States Software Announcement 215-078, dated February 3, 2015 IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

Total Enterprise Mobility

Total Enterprise Mobility Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate

More information

GETS AIRWATCH MDM HANDBOOK

GETS AIRWATCH MDM HANDBOOK GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü

More information

Salmon Group, Inc. An 8(a) Certified, Veteran owned company

Salmon Group, Inc. An 8(a) Certified, Veteran owned company www.salmongroupinc.com info@salmongroupinc.com Main Office: 888.751.5551 Fax: 240.607.6712 About Us We are a: Maryland-based, Veteran Owned Corporation Certified participant of the SBA 8(a) and Small Disadvantaged

More information

Mobile App Management:

Mobile App Management: Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management

More information

Generating leads with Meraki's Systems Manager. Partner Training"

Generating leads with Meraki's Systems Manager. Partner Training Generating leads with Meraki's Systems Manager Partner Training Agenda Systems Manager overview Starting the conversation & uncovering opportunities Sales tools and collateral Systems Manager solution

More information

Why Digital Certificates Are Essential for Managing Mobile Devices

Why Digital Certificates Are Essential for Managing Mobile Devices WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information