Introduction to the Mobile Access Gateway

Size: px
Start display at page:

Download "Introduction to the Mobile Access Gateway"

Transcription

1 Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch Admin Console. For MAG system requirements and installation instructions, please refer to the AirWatch Mobile Access Gateway Installation Guide. The AirWatch Mobile Access Gateway (MAG) provides a secure and effective method for individual applications to access corporate resources. When your employees access internal content from their mobile devices, the MAG acts as a secure relay between the device and enterprise system. The MAG is able to authenticate and encrypt traffic from individual applications on compliant devices to the back-end system they are trying to reach. In This Guide Before You Begin This section covers topics and prerequisites you should familiarize yourself with so you can get the most out of using this guide. Architecture and Security This section provides sample architectures for both SaaS and on-prem deployments and explains how the MAG performs HTTP/HTTPS tunneling. MAG Security & Certificates This section explains how certificates are generated and used to facilitate communication between devices and the MAG. MAG System Settings This sections details some of the AirWatch Admin Console MAG settings you can configure once it is installed. What Business Challenge Does the MAG Address? Whether it s for a global sales staff member, a traveling executive, or any other employee trying to check work from outside of the office, mobile access to enterprise resources is becoming a necessity in today s work environments. This access extends to far more than just corporate access. Your employees may require access to: Corporate intranet sites to keep up with internal announcements and collaborate with other employees. Internal content repositories such as SharePoint or corporate network shares to access the latest presentations, board books, or financial records. Other internal resources to gather Business Intelligence (BI) data, provide secure transactions, or fetch the most recent corporate updates from mobile applications. Information Technology (IT) departments are not only faced with the challenges of providing widespread levels of access to their users; they must also address the many security concerns that arise by providing this level of access to a fleet of devices. Since many of the most common solutions such as SSL-VPN technology do not provide the ability to selectively provide access between different applications on mobile devices. Key concerns are the loss of corporate data into personal apps and the possibility of malware infecting your corporate network. To ensure that data-loss protection and infrastructure health are maintained, IT requires a solution to provide mobile access in a way that can: Provide access-control so that only approved and compliant devices may access the corporate network. Provide access to only business applications to prevent data-leakage as a result of unauthorized personal applications accessing corporate resources. View real-time updates of when and where mobile devices are accessing enterprise resources. 1

2 How Does the MAG Help With This Challenge? The AirWatch MAG makes it possible to meet all of the requirements of employee access and IT security by providing a secure and effective method for individual applications to access corporate resources. By serving as a relay between your mobile devices and enterprise systems, the MAG is able to authenticate and encrypt traffic from individual applications on compliant devices to the back-end systems they are trying to reach. Use the MAG to access the following internal resources over HTTP(S): Internal document repositories and content through AirWatch Secure Content Locker. Internal websites and web applications through AirWatch Browser. Any other enterprise system accessible over HTTP(S) from your business applications through AirWatch App Tunneling. In addition, you can use the MAG's Per App VPN functionality for ios devices to allow both internal and public applications to access corporate resources in your internal network. The App Tunnel mobile app supports both TCP traffic and HTTP(S) traffic. The MAG also provides a number of benefits over other mobile access technologies. Application-Level Mobile Access By providing access through conventional technologies such as SSL-VPNs, devices gain full access to enterprise resources regardless of whether resources are accessed within a business, personal or malicious application. This introduces the possibility of data-loss when sensitive data is collected in personal applications and potentially distributed. Additionally, these technologies put IT at the mercy of end users who may unknowingly have malicious applications on their devices that could compromise an entire network. The MAG includes the AirWatch App Tunnel, which allows individual applications to authenticate and securely communicate with back-end resources over HTTP(S) in the case of App Wrapping and HTTP(S) or TCP in the case of Per App VPN. By enabling the App Tunnel for select business or public applications, you can be certain that unauthorized, personal or malicious apps do not have access to your network. This also makes the MAG a vital component to enable BYOD in your organization. By separating access between personal and business applications and data on your device, a device can be thought of as having two owners: an employee with business needs and an ordinary user with personal needs. This means the MAG will allow business applications to access your enterprise systems over HTTP(S) but keep end-user personal applications segregated by preventing enterprise access. Further still, Per App VPN enables end-users to use some of their favorite public apps to access internal resources while ensuring all traffic remains secure. 2

3 Application-Level Management Visibility and Access Control Because the MAG is architected as part of AirWatch Enterprise Mobility Management (EMM), administrators can view an intuitive and action-oriented display of mobile access information directly from the AirWatch Admin Console. This puts your system administrators in the position to manage proactively instead of reactively by easily identifying at-risk devices and managing exceptions. Since the MAG operates as a centrally managed entry point for devices to access corporate content and data over HTTP(S), access can automatically be configured by device, app and user based on corporate policy. Mobile Access Gateway Technologies and Features The MAG utilizes cutting-edge mobile application technologies in order to meet all the requirements of your users and IT. In general, each application that securely accesses corporate resources over HTTP(S) and through the MAG takes advantage of either Per App VPN or AirWatch App Wrapping, In-App Certificate Authentication and Encryption, and ultimately the AirWatch App Tunnel. In-App Certificate Authentication and Encryption When wrapping an application for corporate access through the MAG, AirWatch will automatically deploy a unique X.509 certificate to every installed application on every enrolled device. This certificate can then be used for mutual authentication and encryption between the application and the MAG. Unlike other certificates used for Wi-Fi, VPN and authentication, this certificate resides within the application sandbox and can only be leveraged within the specific app itself. By utilizing this certificate, the MAG can identify and allow only approved, recognized apps to communicate with corporate systems over HTTP(S), or, in the case of Per App VPN, TCP and HTTP(S). AirWatch App Tunneling You can enable app tunneling in a couple of ways: through App Wrapping for your internal apps only, or through Per App VPN for public or internal ios apps only. App Wrapping App Wrapping provides a simple and effective form of application tunneling to establish a direct, secure connection between your business applications and internal corporate systems that are accessible over HTTP(S). By wrapping your business applications, embedding a certificate for authentication and encryption, and proxying your HTTP(S) application 3

4 traffic through the MAG, you can dramatically empower your applications with the data stored within your internal systems that are accessible over HTTP(S) without any code-change or development effort. The workflow to enable and utilize app wrapping in AirWatch is shown below. 1. Start by wrapping your enterprise application through the AirWatch Admin Console and enable the proxy all traffic through the MAG feature. 2. AirWatch will embed a unique digital certificate and proxy settings that direct all traffic to the MAG within your application and deploy the app to your fleet. 3. As the wrapped application fetches data, only business applications on approved, compliant devices will be authenticated for enterprise system access by only trusting messages signed with one of the unique X.509 certificate deployed from AirWatch for app tunneling. 4. Once granted access, the MAG will provide a secure encrypted tunnel for access between business applications and enterprise systems by serving as a proxy between the two over SSL encrypted HTTPS. Per App VPN Per App VPN allows both internal and public applications to access corporate resources that reside in your secure internal network. It does this using ios 7 s Per App VPN capabilities, which lets certain ios applications access internal resources on an app-by-app basis. This means that some apps can be enabled to access internal resources while others are left unable to communicate with your backend systems. This is different from app tunneling via App Wrapping in that is supports both TCP and HTTP(S) traffic and works for both public and internally developed apps. However, for internal apps the App Tunnel App acts as an alternative option only if the sole requirement is tunneling into the internal network. Otherwise, you will need to use App Wrapping to take advantage of features such as integrated authentication, geofencing, offline access control, and so on. The workflow to enable and utilize Per App VPN in AirWatch is shown below. 1. First, you will need to configure the app settings in the AirWatch Admin Console on the MAG Settings page. More details will be available when the app is released. 2. Next, you will need to create an AirWatch App Tunnel VPN profile for your ios devices. Here is where you can select the Per-App VPN check box to enable Per App VPN for apps, and/or the Safari Domains from which end-users can connect to internal resources. 3. Finally, you will need to push any apps that you want to enable with Per App VPN functionality from the AirWatch Admin Console. A Use VPN check box on the Deployment tab of the Add Application page tells the application to use Per App VPN. MAG Use Cases with AirWatch Apps The MAG enables access to your internal resources that are available over HTTP(S), for example, internal websites or content repositories. Secure Internal Browsing By using the MAG in conjunction with AirWatch Browser, you can provide secure internal browsing to any intranet site and web application that resides within your network. Because AirWatch Browser has been architected with application tunneling capabilities, all it takes to enable mobile access to your internal websites is to enable a setting from the AirWatch Admin Console. By doing so, AirWatch Browser establishes a trust with MAG using an AirWatch-issued certificate and accesses internal websites by proxying traffic through the MAG over SSL encrypted HTTPS. This means 4

5 that IT can not only provide greater levels of access to their mobile users, but also remain confident that security is not compromised by encrypting traffic, remembering history, disabling copy/paste, defining cookie acceptance and more. Secure Internal Content Access Finally, the MAG can also be used with AirWatch Secure Content Locker to allow your users to securely access content from an internal repository using the same application tunneling technologies. This means that your users can remotely access their documentation, financial documents, board books, and more directly from SharePoint or an internal fileshare. As files are added or updated within your existing content repository, the changes will immediately be reflected in Secure Content Locker, and users will only be granted access to their approved files and folders based on the existing access control lists defined in your internal repository. Using the MAG with Secure Content Locker allows you to provide unmatched levels of access to your corporate content without sacrificing security. Secure Access You can push the AirWatch Inbox as a public app and use the AirWatch App Tunnel for ios mobile app to connect to a backend Exchange server that is not public facing. This effectively secures the traffic between the AirWatch Inbox and the backend Exchange server. 5

6 Before You Begin Overview This section covers topics and prerequisites you should familiarize yourself with so you can get the most out of using this guide. In This Section Requirements See a list of requirements you must meet before configuring MAG settings in the AirWatch Admin Console. Note: For the hardware, software, and network requirements needed to install the MAG, please refer to the AirWatch Mobile Access Gateway Installation Guide. Recommended Reading See a list of additional guides that contain supplemental information about MAG. Getting Started See additional considerations you should know before you begin. Requirements To perform any of the actions mentioned in the MAG System Settings section, you must first install the MAG. For instructions on how to do this, and for the hardware, software, and network requirements needed to install the MAG, please refer to the AirWatch Mobile Access Gateway Installation Guide. Recommended Reading AirWatch Mobile Access Gateway Installation Guide This guide explains how to install the MAG and includes the necessary system requirements. 6

7 Getting Started Supported Configurations Use MAG in the following configurations: Sitting behind a network load balancer for high availability deployments. Supporting SSL offloading. Using HTTP or HTTPS transport. Supporting HTTP authentication of traffic from a network reverse proxy or Web Application Firewall (WAF). Acting as a relay (MAGR) node to secure traffic through multiple network zones. Definitions Note the following distinction between on-premise and SaaS deployments: On-premise refers to AirWatch deployments where your organization hosts all AirWatch components and servers on its internal networks. SaaS refers to AirWatch deployments where certain AirWatch components, such as the Console and API servers, are hosted in the cloud. 7

8 Architecture & Security Overview The MAG is a service you can install on physical or virtual servers running Windows 2008 R2 or higher. Install MAG on an on-premise server in either a DMZ or secured internal network zone. Additionally, you have the option to install multiple MAGs for load balancing and/or in a relay-endpoint configuration for additional security. When a managed device queries one of the systems with which it integrates, AirWatch App Tunnel encrypts the request and sends it to the MAG to make a local request to the back-end enterprise system. MAG secures the traffic between your devices and the corporate network using unique X.509 certificates for mutual authentication and encryption. In This Section Deployment Models See the various deployment models for both SaaS and on-premise deployments. HTTP and HTTPS Tunneling See descriptions about how MAG directs traffic using either HTTP or HTTPS tunneling. Deployment Models SaaS Deployments Basic Endpoint In a basic endpoint deployment, the MAG is behind a WAF and resides on an internal network. The traffic from your managed devices is sent securely over an HTTP or HTTPS transport and its message level is signed using unique X.509 certificates. All MAG deployment configurations support load balancing and reverse proxy. DMZ Relay In a DMZ relay deployment, the MAG is in the DMZ and internal network as either an endpoint or MAG relay because organizations do not have a WAF or reverse proxy. The diagram below illustrates the relay configuration in a SaaS configuration. This model allows requests from your managed devices to securely connect to the MAG relay node 8

9 in the DMZ. It also allows for the relay node to further send traffic to an internal MAG endpoint node for back-end system integration. All traffic requests to the MAG relay and MAG endpoint are signed using unique X.509 certificates. It is setup for either HTTP or HTTPS transport. All MAG deployment configurations support load balancing and reverse proxy. On-Premise (non-saas) Deployments Single Mobile Access Gateway In a basic endpoint deployment, the MAG is behind a WAF and resides on an internal network. The traffic from your managed devices is sent securely over an HTTP or HTTPS transport and its message level is signed using unique X.509 certificates. All MAG deployment configurations support load balancing and reverse proxy. Relay for Multiple Network Zones In a multiple network zones deployment, the MAG is used in an on-premise (non- SaaS) environment to integrate with internal systems from a DMZ server connection. All MAG deployment configurations support load balancing and reverse proxy. 9

10 HTTP and HTTPS Tunneling For both SaaS and on-premise configurations, MAG utilizes one of the following methods for connecting to internal sites such as a SharePoint or wiki site: HTTP Tunneling MAG traffic is sent over both ports 2010 and 2020 using the conventions outlined under HTTP Tunneling. The benefit of this method is you get better network performance, since HTTPS traffic is not being encrypted twice in transit. HTTPS Tunneling MAG traffic is sent over one port either port 2010 or 2020 using the conventions outlined under HTTPS Tunneling. The benefit of this method is you only have to open two ports (2010 or 2020, in addition to 443) as opposed to all three. In essence, both options offer comparable security. In addition, for both methods, general access to internal resources (for example, files on a server) is done over 443 with an SSL connection. These two methods are detailed below: HTTP Tunneling With this method, you will utilize both port 2010 and 2020 to filter HTTP and HTTPS traffic, as described below. Port 2010 (Utilizing an HTTP tunnel for HTTPS traffic) When accessing an end site, such as SharePoint, an intranet, or wiki site on an internal network, that is HTTPS, a device application will request that MAG make a secure tunnel to the site it is trying to reach. The 2010 port is used for HTTP "CONNECT" tunneling of end site traffic all the way up to the final destination server. This will be used only when the end site is HTTPS, so that a secure tunnel is established between the browser and actual site end-to-end. The MAG will not be aware of the traffic inside that tunnel. MAG makes sure the tunnel is certificate authenticated with an end device s certificate and that all traffic is encrypted inside of the tunnel. For example, if a user accesses an internal wiki site, https://<internalsite>.wiki.com, the traffic is encapsulated within an HTTP tunnel and sent over port The connection terminates once it reaches the MAG and is sent over to the internal resource as HTTPS. 10

11 Port 2020 (HTTP traffic encrypted and sent as HTTPS) This port is used for MAG to act as a reverse proxy, in case the end site you are accessing is HTTP. A request to access the end site comes over as HTTPS to MAG, so that the entire traffic is encrypted up to the MAG over the Internet. Essentially, the MAG performs a port reversal: HTTP Traffic is encrypted and sent on the HTTPS port. HTTPS traffic is encapsulated within an HTTP tunnel and sent to the HTTP port. Any kind of communication is authenticated using the certificates generated by the root certificate, which is unique to every AirWatch instance. For example, if a user accesses the same wiki site, except at the HTTP traffic is encrypted and authenticated using certificates and sent over port This connection terminates once it reaches the MAG and is sent over to the internal resource as HTTP. Note: When utilizing HTTP Tunneling, you will specify port values for both the Default HTTP Port and Default HTTPS Port in Console Settings, as described in the Mobile Access Gateway Installation Guide. Refer to the diagram below to see an illustration of these separate ports and their usage: HTTPS Tunneling With this method, you will utilize one port either 2010 or 2020 to filter both HTTP and HTTPS traffic through an encrypted HTTPS tunnel, as described below. Port 2010 or Port 2020 (Traffic sent through an HTTPS tunnel) When accessing an end site, such as SharePoint, an intranet or wiki site, traffic is sent through an HTTPS tunnel, regardless of whether the end site is HTTP or HTTPS. For example, if a user accesses a wiki site, whether it is or https://<internalsite>.wiki.com, the traffic is encrypted in an HTTPS tunnel and sent over either port 2010 or port 2020 whichever you have configured. This connection terminates once it reaches the MAG and is sent over to the internal resource as either HTTP or HTTPS. Note: When utilizing HTTPS Tunneling, you will enter '0' for Default HTTP Port and either 2010 or 2020 for the Default HTTPS Port in System Configuration, as described in the Mobile Access Gateway Installation Guide. Refer to the diagram below to see an illustration of these separate ports and their usage: 11

12 12

13 MAG Security & Certificates Overview This section outlines how the certificates used to authenticate communication among the AirWatch Admin Console, MAG, and end-user devices. In This Section Initial Setup See the process flow that occurs upon initial setup of the MAG. Certificate Integration Cycle See the process flow for how certificates are created and routed when using the MAG. Initial Setup 1. MAG connects to the AirWatch API and authenticates with the AirWatch Admin Console Username and Password. Traffic requests are SSL encrypted using HTTPS. Setup authorization is restricted to admin accounts with a role enabled for an MAG setup role (see preliminary steps). 2. AirWatch generates a unique identity certificate pair for both the AirWatch and MAG environments. The AirWatch certificate is unique to the group selected in the AirWatch Admin Console. Both certificates are generated from a trusted AirWatch root. 3. AirWatch sends the unique certificates and trust configuration back to the MAG server over HTTPS. The MAG configuration trusts only messages signed from the AirWatch environment. This trust is unique per group. Note: Any additional MAG servers set up in the same AirWatch group as part of a highly available (HA) loadbalanced configuration are issued the same unique MAG certificate. For more information about high availability, please refer to the AirWatch High Availability and Disaster Recovery Guide. Certificate Integration Cycle 1. AirWatch generates Device Root Certificates that are unique to every instance during the installation process. The Device Root Certificate is used to generate client certificates for each of the applications and devices. 2. The certificate an application uses to authenticate with the MAG is only provided after the application attempts to authenticate with the AirWatch enrollment credentials for the first time. 3. MAG gets the chain during installation. The MAG installer is dynamically packaged and picks these certificates at the time of download. 13

14 Communication between the MAG and device-side applications (such as AirWatch Browser, Secure Content Locker, wrapped applications using app tunneling) is secured by using the identity certificates generated during installation. These identity certs are child certificates of the Secure Channel Root certificate. 4. MAG makes an outbound call to the AWCM/API server to receive updated details on the device and certificates. The following details are exchanged during this process: DeviceUid, CertThumbprint, applicationbundleid, EnrollmentStatus, compliancestatus. 5. MAG maintains a list of devices and certificates and only authenticates communication if it sees a certificate it recognizes. X.509 (version 3) digitally signed client certificates are used for authentication. 14

15 MAG System Settings Overview Once the MAG is installed you can configure a number of advanced settings and enable MAG functionality in the AirWatch Browser and Secure Content Locker apps. Doing so will ensure all HTTP(S) traffic for the specified apps/content repositories is routed through the MAG. In This Section Configuring Advanced MAG Settings See the additional MAG settings you can configure after it is installed. Configuring AirWatch Browser with MAG See how to enable the AirWatch Browser to leverage the MAG and secure your internal network from the public Internet. Configuring Content Repository Access through the Secure Content Locker with MAG See how to enable access to an integrated content repository through the MAG using the AirWatch Secure Content Locker. Configuring an External App Repository with MAG See where to configure authentication settings for your external app catalog, if applicable. Configuring Advanced MAG Settings A number of advanced MAG settings let you change the log levels and outbound proxy behavior between a MAG relay and API/AWCM servers from the AirWatch Admin Console. 1. Navigate to Groups & Settings All Settings System Enterprise Integration Mobile Access Gateway and select the Advanced tab. 2. Configure the following settings: a. Enable API and AWCM outbound calls via proxy Enable this option if the communication between the MAG relay and AirWatch API or AWCM is through an outbound proxy. b. Show detailed errors Enable this option to ensure client applications (for example, AirWatch Secure Browser) are informed when the MAG fails to authenticate a device. c. Log Level Set the appropriate logging level for the MAG service, which will determine how much data is reported to the MAG.log files. 3. Select Save. Note: After modifying any of these settings, you must restart the MAG service for the changes to take effect. 15

16 Configuring AirWatch Browser with MAG Following MAG installation, configure the AirWatch Admin Console for communication with the MAG by enabling proxy mode to protect your network from the public Internet: 1. Navigate to Groups & Settings All Settings Apps Settings and Policies Security Policies. 2. Select Enabled for App Tunnel and specify the App Tunnel Mode as Mobile Access Gateway. 3. Optionally, enable the split MAG Tunnel for ios devices by entering URLs into the App Tunnel Domains field. If a URL that is about to be invoked contains a domain that matches the list in the settings, this URL request goes through the MAG. If the URL's domain does not match the domain in the list, it should go directly to the Internet. Leave the text box empty to send all requests through the MAG. 4. Select Save. 5. Ensure the AirWatch Browser is using the Shared SDK profiles for ios and Android by navigating to Groups & Settings All Settings Apps AirWatch Browser and selecting them under SDK Profile. Configuring Content Repository Access through the Secure Content Locker with MAG The Content Repository allows administrators to link to folders, network drives or SharePoint directories containing various documents for upload into the Secure Content Locker. You can do this by: 1. Navigate to Content Settings Content Repository. 2. Select Add. 3. Enter a Name relevant to the content directory. 4. Provide the Type of content repository with which you wish to integrate and the full path to Link to the directory location rather than the root domain. For example, input instead of 5. Enter Organization Group and User details as necessary. 6. Enable Access via MAG to communicate with a SharePoint directory within the corporate network. Complete this action if the file system or SharePoint drive is not accessible from AirWatch server s domain. 7. Complete the remaining settings. Note: When setting up repository access via the MAG, the entire folder hierarchy will not be synced when you add the repository. By default, repository content will sync only up to two folder levels. Other sub-folders will sync as the AirWatch Admin Console or devices request them. On the Console, the sync occurs when performing a manual sync action inside of a sub-folder. On the device, the sync occurs when an end user navigates to a sub-folder. Note: On some locked down environments where the MAG server does not have permission to impersonate the calling user to check access to a shared network folder, end users will receive an Impersonation Failed message when trying to access a content repository using their credentials. To resolve this issue, administrators need to add Allow log on locally and Log on as a service to each user in the Local Security Policies on the MAG server under Security Settings > Local Policies > User Rights Assignment > "Allow log on locally". This needs to be done for all users that will be accessing content so they can successfully invoke user impersonation from the MAG Windows Server to the Windows Network File Share. 16

17 Note: For more information about how to integrate with content repositories, refer to the AirWatch MCM Guide. Configuring an External App Repository with MAG Traffic to and from the External App Repository, if used, also flows through the MAG though no additional configuration by the end user is required. To verify External App Repository credentials to ensure access, navigate to Groups & Settings All Settings Apps Catalog External App Repository. 17

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Introduction to the AirWatch Cloud Connector (ACC) Guide

Introduction to the AirWatch Cloud Connector (ACC) Guide Introduction to the AirWatch Cloud Connector (ACC) Guide The AirWatch Cloud Connector (ACC) provides organizations the ability to integrate AirWatch with their back-end enterprise systems. This document

More information

Introduction to the AirWatch Browser Guide

Introduction to the AirWatch Browser Guide Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser

More information

Introduction to the Secure Email Gateway (SEG)

Introduction to the Secure Email Gateway (SEG) Introduction to the Secure Email Gateway (SEG) Overview The Secure Email Gateway (SEG) Proxy server is a separate server installed in-line with your existing email server to proxy all email traffic going

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Cloud Services MDM. Overview & Setup Admin Guide

Cloud Services MDM. Overview & Setup Admin Guide Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.

PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway. PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Published Date July 2015 Contents Executive Summary 3 Introduction

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

What is the Barracuda SSL VPN Server Agent?

What is the Barracuda SSL VPN Server Agent? The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

MaaS360 On-Premises Cloud Extender

MaaS360 On-Premises Cloud Extender MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration

F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Administering Jive Mobile Apps

Administering Jive Mobile Apps Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Reference Guide. What's New in BES12 Cloud

Reference Guide. What's New in BES12 Cloud Reference Guide What's New in BES12 Cloud 711-60712-123 Published: 2016-06-20 SWD-20160620151902701 Contents What's new in BES12 Cloud...5 Supported features by device type... 5 Compatibility and requirements...11

More information

Good for Enterprise Good Dynamics

Good for Enterprise Good Dynamics Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity

More information

WatchDox SharePoint Beta Guide. Application Version 1.0.0

WatchDox SharePoint Beta Guide. Application Version 1.0.0 Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

Employee Active Directory Self-Service Quick Setup Guide

Employee Active Directory Self-Service Quick Setup Guide Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

System Administration Training

System Administration Training Table of Contents 1 Components: Web Server Components: SQL Server 3 Components: File System 4 Components: Other Components 5 Server Configuration: Pre-Requisites 6 Server Configuration: Running the Installer

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

LifeSize Transit Deployment Guide June 2011

LifeSize Transit Deployment Guide June 2011 LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services

DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP

More information

Laptop Backup - Administrator Guide (Windows)

Laptop Backup - Administrator Guide (Windows) Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

JUNOS PULSE APPCONNECT

JUNOS PULSE APPCONNECT White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of

More information

Conference Controller Deployment Guide

Conference Controller Deployment Guide Conference Controller Deployment Guide BES 5.0/May 2014 Page 2 of 7 1. Introduction This document outlines the processes for wirelessly deploying the LoopUp Conference Controller for BlackBerry to users

More information

Setup Guide: Server-side synchronization for CRM Online and Exchange Server

Setup Guide: Server-side synchronization for CRM Online and Exchange Server Setup Guide: Server-side synchronization for CRM Online and Exchange Server Version 8.0 Microsoft Dynamics CRM 2016 Authors: Elad Ben Yosef, Sumanta Batabyal This document is provided "as-is". Information

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

Cloud Services MDM. Telecom Management Admin Guide

Cloud Services MDM. Telecom Management Admin Guide Cloud Services MDM Telecom Management Admin Guide 10/24/2014 CONTENTS Telecom Management... 2 Enabling Telecom Setting... 2 Creating and Managing Telecom Plans... 3 Dynamic Assignment... 4 Dashboard Usage...

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Websense Support Webinar April 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with

More information

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single

More information

Monitoring Hybrid Cloud Applications in VMware vcloud Air

Monitoring Hybrid Cloud Applications in VMware vcloud Air Monitoring Hybrid Cloud Applications in ware vcloud Air ware vcenter Hyperic and ware vcenter Operations Manager Installation and Administration Guide for Hybrid Cloud Monitoring TECHNICAL WHITE PAPER

More information

Deploying the BIG-IP System with Oracle E-Business Suite 11i

Deploying the BIG-IP System with Oracle E-Business Suite 11i Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and

More information

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions 1800 ULEARN (853 276) www.ddls.com.au CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Length 5 days Price $5500.00 (inc GST) Overview The objective of Implementing Citrix NetScaler

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS)

Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS) Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS) December 25 th, 2015 V.1.0 Prepared by: Manoj Karunarathne MCT, MCSA,

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

Implementing PCoIP Proxy as a Security Server/Access Point Alternative Implementing PCoIP Proxy as a Security Server/Access Point Alternative Overview VMware s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Zenprise Device Manager 6.1.5

Zenprise Device Manager 6.1.5 Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in

More information