Mobile Application Management

Size: px
Start display at page:

Download "Mobile Application Management"

Transcription

1 Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER July 2012 Meeting the BYOD challenge with next-generation application and device management

2 Overview... 3 The Challenge... 4 MAM Functions... 5 MAM Principles... 6 MAM Users... 7 MAM Workflow... 8 Policy Management... 9 Enterprise App Store Application and Data Security Analytics & Reporting Summary

3 Overview Chief Information Officers (CIOs) across a variety of industries are today recognizing and grappling with a new and difficult challenge to their ability to secure mission-critical corporate data and applications. This challenge, variously dubbed the Consumerization of IT or the Bring Your Own Device (BYOD) trend, refers to end users increasing demands to access corporate resources from their personal smartphones, tablets, and laptops. As the lines between work and leisure continue to blur, professionals of all types want to be able to review reports, enter data into applications, and access corporate directories from the same devices on which they capture video of their kids sports performances. To meet this demand, IT teams must be able to provision, update, manage, analyze, and report on corporate applications, without impinging on users privacy rights or damaging end users personal property. A well-designed (MAM) solution enables IT teams to achieve fine-grained control over applications across a range of devices, over every type of network and deployment mode. 3

4 The Challenge Traditionally, application management has been part and parcel of IT s core function, whether across mainframe, minicomputer, client/server, or Webbased application systems. Provisioning, updating, patching, inventorying, monitoring, and retiring applications is most often the province of a centralized IT administrator or admin team, utilizing a variety of application management and security tools, both third-party and custom-developed. With the advent of mobile devices and software, most IT shops have adopted mobile device management (MDM) tools to control and manage company-issued laptops, tablets, and smartphones, ranging from Blackberrys and Windows Mobile phones for knowledge workers to ruggedized phones and tablets for field workers. As their name suggests, MDM tools enable administrators to control these devices at the hardware layer providing such functions as remote lockdown/wipe clean for lost or stolen devices, as well as restriction or suspension of device functions such as camera or barcode scanning. For company issued mobile devices, the type of command-and-control management provided by MDM has been sufficient, if sometimes overbearing. However, as IT shops now grapple with Bring Your Own Device (BYOD) strategies, they are increasingly seeking a more finely tuned, nuanced approach that mirrors traditional desktop application management: the new technology that meets this need is Mobile Application Management (MAM) software. In many ways, MAM solutions bring together the best of both worlds: the sophisticated and layered approach of desktop application management & security systems with the reach and remote, over-the-air capabilities of MDM systems. Mobile Application Management (MAM) Mobile Application Management refers to the ability to manage applications on mobile devices, remotely and from a centralized console. Applications are provisioned to a secure container on device, from which policies and data storage can be established and controlled. Security procedures such as Single Sign On and LDAP authentication are handled within a consistent MAM framework. Mobile Device Management (MDM) Mobile Device Management refers to software that enables IT to control device functions such as camera, GPS, on-device data stores, and more on remote mobile devices including smartphones and tablet computers. 4

5 MAM Functions MAM solutions help addresses the following key points: Policy enforcement Using a centralized administration console, security administrators can extend and enable policies on mobile applications. Mobile application delivery Using an embedded Enterprise App Store and management console, administrators provision apps to remote devices and make them available within an on-device secure container. Mobile application security Administrators use the centralized console to set policies around application access and usage by roles and other parameters. Mobile application updating Updates can be managed from the centralized consoles, and new application versions can be provisioned over the air or through scheduled synchronizations. User authentication As with desktop application management systems, MAM solutions utilize LDAP and other standardized authentication mechanisms to ensure user authentication User authorization Users can be authorized for application access and usage based on roles and other parameters such as location Version checking Administrators can remotely monitor application versions and usage from the centralized console Push services Managers can push updates and notifications to all remote/mobile users or to subsets as events dictate Reporting and tracking The MAM solution enables complete reporting and analytics on usage, application issues, user activation, downloads, updates, etc. A well-designed MAM solution should be able to manage applications built for the following environments: Native ios (Apple) Android apps Windows Mobile Blackberry HTML5 apps Corporate developed apps (using Apple XCode, Microsoft Visual Studio, etc.) Third party-developed apps MAM solutions enable administrators to add code to mobile apps that utilize specific MAM policy APIs. The APIs let the app communicate with the MAM server to enforce policies for that app and/or user, such as restricting usage to geo locations or copy/paste into/out the app or deleting on device data if the user s permissions are revoked. The MAM solution allows administrators to monitor activities such as app access/usage so that they can then check the current device and application state against the policies. Via the embedded libraries, the app communicates its status and activity back to the server not entire device status, which may allay concerns from employees, contractors, and business partners over how invasive the device management approach may be. Importantly, management is embedded in the app, so administrators do not have to manage the device itself. Thus, IT teams should be able to extend legitimate application management to a greater number of users than the universe of devices you actually manage. 5

6 MAM Principles Well-designed solutions follow a set of guidelines or principles to ensure they meet the needs of corporate IT teams grappling with BYOD challenges. These principles include: Management primarily at the application, not hardware or firmware layer By focusing on provisioning corporate apps within a secure container on device and by abstracting the application and data away from the specifications of the device and OS, MAM solutions ensure that corporate assets can be securely controlled, without impacting users personal device functions or assets including ring tones, games, photos, videos, and personal apps. Management based on policies, rules and roles with the ability to set and enforce policies and assign roles and privileges to users and user groups, MAM software enables finely grained control of applications even on remote devices. Management as collaboration With the use of an enterprise app store, IT administrators can dispense with the command and control approaches of the past and enable users to see and select recommended apps from within an app store view, much as they select and download apps, games, music, videos, and ringtones from the Apple App Store or Google s Android Marketplace. This ability to offer users corporate apps within pre-defined policies meets the needs of BYOD environments while still ensuring corporate data integrity. Configure once, run everywhere. Because a well-designed MAM solution can incorporate management of mobile applications, data, and native device functions (such as GPS and camera), as well as management of embedded HTML and desktop web applications, IT teams can leverage the solution to configure all of their policies and rules, then manage the full range of applications mobile and desktop from a single source. ACL ACL is Access Control List which provides the privilege to an assigned user to perform various tasks such as deleting an application, editing an application, and publishing an application. Geofencing Geofencing refers to the ability to restrict or suspend mobile device and/or mobile application functions based on the location of the device. A classic example is the ability to turn off a device s camera function when the mobile worker is in a restricted or sensitive building or campus area. Visibility everywhere. With the basic foundation of application management within a secure container, MAM solutions can deliver complete visibility into application activity, down to the feature layer. App management policies and rules can also be created and established in the application design and build stage, using MAM development tool extensions. 6

7 MAM Users As with desktop application management systems, Mobile Application Management software functions are typically driven by IT or security administration teams, who can leverage MAM technologies to extend corporate data management and security procedures to end users personal mobile devices, without the need to control hardware or firmware layers. IT Administrators Deploy apps through a corporate-branded enterprise app store LDAP Lightweight Directory Access Protocol is an authentication server which verifies user name and password. Security and Compliance Officers Extend current security policies and procedure from the back office to the new mobile front office Enforce policies such as user authentication, encryption, offline access, document sharing restrictions without requiring changes to the apps Support BYOD apps on both personal and corporate-owned devices without compromising corporate policies or risking sensitive data loss Software Developers Corporate developers: Write apps with included policies and rules within interactive development environment (IDE) or scripting tools. Easily distribute apps for testing via the enterprise app stores or a custom app store ISV s: Enable apps to go mobile with policy management integrated into the offering 7

8 MAM Workflow follows a clear workflow beginning with IT management and incorporating IT administrators, application designers, and end users. The IT administrator manages the apps, users and devices from a web-based management console. A developer submits apps for distribution (or IT installs acquired apps) and the IT administrator then chooses which of the corporate policies to apply to the app before distribution. There may be a range of different policies depending on the sensitivity of the app or the data that it accesses. The policies are then applied with no changes required to the app. The IT administrator can then identify the category that the app should reside in and which users or groups of users will have access to it. When a new user is enrolled, the user receives an with a link to download the secure application container client onto their device. The device can either be corporate-owned or employee-owned. The app installs just like any other mobile app. The user then logs into the Enterprise App Store and can see all of the applications that they are entitled to download and install. If the user already has an app container client, he or she will receive a push notification that there is an app available for them (or an update to an existing app). The user runs the app like any other on their device the fact that the corporate apps are policy-managed is transparent. Following is an example policy establishment and management workflow: Role Action Outcome IT Management IT Administrator IT Admin / User Define IT Management defines policy guidelines. Create & Assign Administrators create and assign a set of Policies, Groups, Roles, and ACLs to the users as per the enterprise guidelines. They can do this manually or import through the ADS. Submit / Deploy Administrators or users submit and deploy applications. Administrators or users publish applications. Once published, it is available for targeted groups with appropriate privileges. Guidelines Policies Applications 8

9 Policy Management Policies are a set of rules which govern the device operations while the device is accessing enterprise resources. Policies can be created based on various constraints such as Current Security Rules, Network Permissions, Device Storage Permissions, Clipboard Permissions, Application Feature Permissions, and Phone Features. Policy management enables administrators to create, edit, publish, unpublish, delete, and change the state of the policy. Administrators create policies in a centralized web management console, then adjust and apply them to applications in the enterprise app store. To extend policies developed in other environments, administrators would follow these steps: The administrator first understands the signature of the API definition on a per platform basis. The administrator writes a custom policy for native API s and packages it as a library which then will co-exist with an existing MAM policy library. The administrator then registers the custom policy for a native API in the MA policy XML file. The infrastructure then invokes the new policy and as part of the build process, the admin console is regenerated. The administrator then carries out all the testing (including regression) necessary. The following is an example of customizing/extending a policy in the Kony Mobile App Manager solution: Identify the native API (e.g. the camera open () API) Extend the KonyPolicyWrapper class where policies are passed (i.e. allow or deny camera) is passed (for example: XYZPolicyWrapper) Write a method in XYZPolicyWrapper to implement the policy Map the native camera API with XYZPolicyWrapper in the XML file and the MAM infrastructure takes care of the rest. The Kony policy framework will invoke custom or Kony policy for a native API as defined in the MAM policy xml file. Example Policies Offline access On Device Data protection Restrict /Secure Data communication b/w device and server Authentication Camera, SMS, Phone, GPS, , and other API Document Sharing Restrict Cut, Copy and Paste from App to other App App - Idle time out and Expiration Time Allow App usage for pre- determined time [business hours only] Deny access to app while driving [GPS & cell triangulation data] 9

10 Fig 2: Example MAM management console screen 10

11 Enterprise App Store As mentioned previously, for IT teams to enable Bring Your Own Device strategies, a collaborative approach with users is called for. With an Enterprise App Store, employees are able to browse, discover, access, download and install approved apps quickly and conveniently, just as they can in Apple's App Store or Google's Android Market. To enable this, the well-designed MAM solution includes a customizable enterprise app store that is tightly integrated with the MAM console to ensure application distribution, security and policy administration. From a design standpoint, the ideal solution delivers this as an end-to-end, integrated approach to ensure any administration changes are immediately enabled and the employee experiences the appropriate storefront content and policies without errors or delays. Fig 3: Apps are submitted to the Enterprise App Store through the Management Console 11

12 Application and Data Security solutions handle application and data security primarily through the use of a secure app container, which gets delivered to the mobile device as its own meta application. The primary benefit of the secure container is total security of all its applications and data on the device. Initial provisioning of the container itself can be controlled through the use of trusted whitelists, profiles and passwords. All configurations, application definitions and data are encrypted. Even if the device is hijacked, jail broken or the container is copied, the contents are protected. All data transmissions over the network are encrypted. In addition, the container can be locked to a specific device, meaning that it will not start if copied to another device. Push Notifications Push Notifications is a generic service which allows you to send notifications to the registered devices on an event occurrence to multiple platform devices. If needed, the container can also be blacklisted, i.e., all applications and data will be automatically removed if an attempt is made to connect to the host. The container may be configured to automatically shut down if idle for a period of time or if the device goes into sleep mode. HTML can be securely executed inside of the container without the risks associated with a browser. All provisioning and access requests are audited. Secure App Container Following are some of the key features of a secure app container: Decommissioning and Blacklisting At any stage, an entire container or specific user may be blacklisted. This means that the next time that the container is started and has network access, all the relevant applications and data will be automatically removed from the device, i.e., reset back to its initial provisioning state. This functionality is essential if a device is lost or stolen. Device Lock Administrators may lock a container to a specific device, i.e., if it is illegally copied to another device, it will not start. This prevents any unauthorized backup or replication of the container data. Security The primary benefit of the secure container is complete security of all its applications and data on the device. The following is a summary of the security features: Initial provisioning of the container itself can be controlled through the use of trusted whitelists, profiles and passwords. All configuration, application definitions and data are encrypted. Even if the device is hijacked, jail broken or the container is copied, the contents are protected. All data transmissions over the network are encrypted. The container can be locked to a specific device, meaning that it will not start if copied to another device. The container may be blacklisted, i.e., all applications and data will be automatically blocked from being accessed. 12

13 A range of identity management options can be used to authenticate user access to the container through standard directory services, 3rd party security applications, custom functionality etc. Users can only access the applications and data that they are authorized to. The role-based provisioning is strictly controlled through the user profiling facility on the central Kony admin console. The container may be configured to automatically shut down if idle for a period of time or if the device goes into sleep mode. HTML can be securely executed inside of the container without the risks associated with a browser. All provisioning and access requests are audited. The secure container feature provides a flexible solution for mobility by allowing for identity management/rolebased provisioning and modular application implementation. 13

14 Analytics & Reporting To enable complete and effective BYOD strategies, the well-designed MAM solution should deliver integrated analytics and reporting capabilities. Administrators should be able to report, analyze and audit mobile application activity using build-in modules and industry standard analytic tools such as Adobe Omniture, IBM Coremetrics, Google Analytics, and Webtrends Analytics. Below are some example reports that can be run via the console: Apps: Total apps per platform Downloads: Total downloads per platform Mandatory apps not installed per user Information on users per device and per OS number of apps downloaded Information on apps number of users per device and per OS Fig 4: Example MAM analytics screen 14

15 Summary As end users accelerate the trend toward consumerization, IT leaders will need to implement management solutions that address the variety of devices, apps, and operating systems that make up today s increasingly diverse corporate computing environment. systems offer an approach that takes into account both the need to manage and control corporate data and the need to support end user autonomy and control over their own personal computing assets. Through innovations such as secure ondevice containers, policy injection and management, and targeted device management, MAM solutions can empower IT with the type of finely tuned architecture they need to meet the BYOD challenge. 15

16 About Kony Kony and the KonyOne Platform enable Fortune 500 companies to offer consumers and employees feature-rich mobile applications in less time and at lower costs than any other solution. Leveraging a Write Once, Run Everywhere single application definition, applications are designed and developed just once, in a device independent manner, and deployed across multiple channels, including native applications, device-optimized HTML5 and HTML4 mobile web, SMS, web gadgets, kiosks, and tablets. Kony s unique platform is proven to future-proof a company s mobile investment by enabling applications to be changed once for all channels, ensuring faster adoption of new operating systems and standards as they are introduced, while eliminating maintenance, upgrade and future development costs. Learn more at KONY SOLUTIONS, INC 7380 West Sand Lake Road #390 Orlando, Florida KONY (5669) Toll Free: Kony Solutions, Inc. All rights reserved. Kony and the Kony Mobile Application Platform are trademarks of Kony Solutions. Apple and iphone are trademarks of Apple Inc., registered in the U.S. and other countries. BlackBerry is a registered trademark of Research In Motion. Android is a trademark of Google Inc. Other product names mentioned are the property of their respective holders.

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,

More information

Back to the Future: Securing your Unwired Enterprise

Back to the Future: Securing your Unwired Enterprise Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Mobile Device Management Buyers Guide

Mobile Device Management Buyers Guide Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Mobile Application Development Meets the Mainstream

Mobile Application Development Meets the Mainstream Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER August 2012 Mobile Application Development Meets the Mainstream Fragmentation and Chaos Is the New Normal... 3 Content Consumption versus Content

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational

More information

Secure, Centralized, Simple

Secure, Centralized, Simple Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,

More information

IBM United States Software Announcement 215-078, dated February 3, 2015

IBM United States Software Announcement 215-078, dated February 3, 2015 IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,

More information

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

Statement of Direction

Statement of Direction Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

KonyOne Server Prerequisites _ MS SQL Server

KonyOne Server Prerequisites _ MS SQL Server KonyOne Server Prerequisites _ MS SQL Server KonyOne Platform Release 5.0 Copyright 2012-2013 Kony Solutions, Inc. All Rights Reserved. Page 1 of 13 Copyright 2012-2013 by Kony Solutions, Inc. All rights

More information

If you can't beat them - secure them

If you can't beat them - secure them If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

MOBILE DEVICE MANAGEMENT (MDM)

MOBILE DEVICE MANAGEMENT (MDM) PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows

More information

Securing Critical Corporate Data in a Mobile World

Securing Critical Corporate Data in a Mobile World Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...

More information

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...

More information

Codeproof Mobile Security & SaaS MDM Platform

Codeproof Mobile Security & SaaS MDM Platform Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,

More information

Simplifying and Empowering the Implementation of Enterprise Mobile Strategy

Simplifying and Empowering the Implementation of Enterprise Mobile Strategy mfrontiers white paper November 2013 Enterprise Mobility Management Platform with Simplifying and Empowering the Implementation of Enterprise Mobile Strategy Page 1 of 9 Simplifying and Empowering the

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags) perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise

More information

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen Enterprise Mobile App Management Essentials Presented by Ryan Hope and John Nielsen 1 Mobile App Trends Global mobile app downloads to exceed 30B by 1016 US and Europe account for over 70% of the market

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

PEGA MOBILITY A PEGA PLATFORM WHITEPAPER

PEGA MOBILITY A PEGA PLATFORM WHITEPAPER PEGA MOBILITY A PEGA PLATFORM WHITEPAPER Background Mobile devices now outnumber computers as a means of connecting to the Internet. This new mobile ubiquity presents opportunities for the enterprise to

More information

McAfee Enterprise Mobility Management

McAfee Enterprise Mobility Management Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers

More information

IBM MobileFirst Managed Mobility

IBM MobileFirst Managed Mobility Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the

More information

Corporate-level device management for BlackBerry, ios and Android

Corporate-level device management for BlackBerry, ios and Android B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and

More information

MAM - Mobile Application Management

MAM - Mobile Application Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY DATASHEET HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY Gold level EMM for BlackBerry Regulated-level security for BlackBerry 10 devices Ultimate security. BlackBerry 10 devices managed by BES10 with

More information

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should

More information

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

More information

Mobile Data Collection Using COMMANDmobile

Mobile Data Collection Using COMMANDmobile Addressing the Challenges of Going Mobile Mobile Data Collection Using COMMANDmobile Table of Contents Introduction... 3 Challenges of Going Mobile... 4 Existing Infrastructures... 4 Configuration Management...

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation

Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM

More information

Enterprise Mobility Management

Enterprise Mobility Management Enterprise Mobility Management Security Without Compromising User Experience SESSION ID: SPO2-R03 Brian Robison Principal Technology Evangelist, XenMobile Citrix Systems, Inc. Providing the freedom to

More information

BENEFITS OF MOBILE DEVICE MANAGEMENT

BENEFITS OF MOBILE DEVICE MANAGEMENT BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management

More information

BYOD Policy Implementation Guide. BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment

BYOD Policy Implementation Guide. BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Oracle Mobile Security

Oracle Mobile Security Oracle Mobile Security What s New in OMSS 11gR2 Patch Set 3 ORACLE WHITE PAPER MAY 2015 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes

More information

Good for Enterprise Good Dynamics

Good for Enterprise Good Dynamics Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

MOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS

MOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS MOBILE APP SECURITY THROUGH CONTAINERIZATION: 10 ESSENTIAL QUESTIONS WHITE PAPER OVERVIEW: WHY DOES MOBILE SECURITY MATTER? Mobile devices present a unique dilemma to the enterprise. On the one hand, workers

More information

"Secure insight, anytime, anywhere."

Secure insight, anytime, anywhere. "Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others

More information

Enterpise Mobility Lexicon & Terminology

Enterpise Mobility Lexicon & Terminology 1 Enterpise Mobility Lexicon & Terminology www.openratio.com By Rabih Kanaan 1 Amazon SNS Amazon Simple Notification Service (SNS) is a push messaging service that makes it simple & cost-effective to push

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

Corporate Mobile Policy Template

Corporate Mobile Policy Template Updated July 2011 Three major changes have occurred over the past 18 months that require updates to your organization s mobile policy. These changes include widespread adoption of tablet devices, changes

More information

Storgrid EFS Access all of your business information securely from any device

Storgrid EFS Access all of your business information securely from any device Datasheet Storgrid EFS Access all of your business information securely from any device September 2014 2014 STORGRID International Holding BV. This document is created with the utmost care. To prevent

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

GO!es MOBILE. YOUR Enterprise. The Challenge. The Solution. Mobilise Your Services Reach Anybody, Anywhere, Anytime

GO!es MOBILE. YOUR Enterprise. The Challenge. The Solution. Mobilise Your Services Reach Anybody, Anywhere, Anytime YOUR Enterprise GO!es MOBILE The Challenge Mobile devices are the latest and hottest channel for m- services delivery and mobile marketing campaigns. Today s enterprises are deploying consumer-oriented

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

Database FAQs - SQL Server

Database FAQs - SQL Server Database FAQs - SQL Server Kony Platform Release 5.0 Copyright 2013 by Kony, Inc. All rights reserved. August, 2013 This document contains information proprietary to Kony, Inc., is bound by the Kony license

More information