Windows 8 Devices Deliver: Simplified management done through a single pane of glass. Review infographic
|
|
- Preston Mason
- 8 years ago
- Views:
Transcription
1 Windows 8 Devices Deliver: Simplified management done through a single pane of glass Review infographic
2 Contents Executive Summary... 2 Introduction... 3 Overview... 3 Scenarios... 6 Scenario 1: Managing PCs and Mobile Devices... 6 Scenario 2: Management from the Cloud... 6 Scenario 3: App Development... 7 PC and mobile device management... 8 Key findings... 8 Managing PCs (with on-premise tools)... 9 Compliance... 9 Software provisioning OS deployment Asset tracking Remote power management Remote helpdesk support Group Policy Control Monitoring enterprise PCs Managing mobile devices with on-premise tools Management from the Cloud Integrated management solutions Third-party MDM solutions Managing apps development Key findings Cross-platform apps Creating secure apps Application development and marketplace environments Conclusions Logic20/20, Inc. 2013, all rights reserved. Page 1 of 20
3 Executive Summary This document is intended to explore the difference in the management capabilities between Windows 8.1, OS X 10.8 Mountain Lion, and ios 7. With the rise in corporate employees using their personal devices for work purposes, management tools have become more important than ever. Microsoft understands this and has created a variety of different tightly integrated programs for dealing with device management both onpremises and in the cloud. Apple only provides basic management functionality on their own and relies on thirdparty products for advanced functionality. While third-parties can offer tempting features, using third-party solutions can increase complexity of a company s overall device management solution. In terms of how Microsoft and Apple manage application development, both are actually in strong positions. However, Windows 8.1 fosters developers to create crossplatform applications that go between device type (tablet vs. desktop) and hardware type (x86 processor vs. ARM), which requires little to no additional coding. Apple development is more difficult in moving between desktop and tablets as they don t offer the same cross-platform ease as Windows 8.1. Windows Intune and System Center 2012 R2 Configuration Manager offer an app portal that can be used as a kind of enterprise app store. Apple offers an app portal that can be used as an enterprise app store for ipads, but not for Macs. These advantages make application development for an enterprise environment much more convenient on Windows 8.1. Logic20/20, Inc. 2013, all rights reserved. Page 2 of 20
4 Introduction This document is intended to be a feature-level deep dive into comparing the key management features of three competing operating systems: Windows 8.1, ios 7, and OS X 10.8 Mountain Lion. The purpose of this comparison is to provide a view of the competitive landscape as it relates to key management features. Each part compares the features of Windows 8 devices to similar features in ios and OS X devices. The Apple products have been researched using publicly-available information. Similarly, the Windows 8.1 information also primarily comes from the public domain. The audience for this document is technical and business decision makers, as well as subject-matter experts. Overview With the growth of smartphone and table usage, a trend has appeared of employees wishing to use their own mobile devices in the workplace. A vital decision enterprises need to make is how best to manage and deploy devices and platforms. This can understandably lead to concern over securing data while still allowing employees to use their devices. A growing market of Mobile Device Management (MDM) products have begun appearing that address these concerns. Research firms such as Ovum are urging vendors not to ignore this trend 1 : The percentage of full-time employees that exhibit BYOD [Bring Your Own Device] behavior is holding remarkably steady, despite attempts by companies to clamp down on it. This is not a phenomenon that is going to go away. Businesses need to stop hoping it will and put a strategy in place to manage it. - Ovum PC Life Cycle (PCLM) tool makers have noticed this corporate trend and have begun to include MDM features with several of their releases. 1 Source: Logic20/20, Inc. 2013, all rights reserved. Page 3 of 20
5 This document analyzes this emerging field of device management tools as well as other categories relevant to platform and device management in enterprises as they compare between Microsoft and Apple platforms. The following table summarizes the areas that will be examined, and how Windows 8.1 compares to the two Apple platforms: Management Areas Managing PCs (on-premise tools) Managing mobile devices (on-premise tools) Windows 8.1 versus ios N/A (Managing a full enterprise range of PCs with ios or Windows RT devices is not in the scope of this paper) With the introduction of Windows 8.1, additional mobile device management (MDM) functionality is now built into the OS. Now both Exchange Active Sync and upper level solutions such as Active Directory for powerful and secure enterprise scenarios. Windows 8.1 is bringing Microsoft on-par with third party MDM features, while offering a more unified device management approach compared to ios. Windows 8.1 versus OS X Windows 8.1 s PC management features offer a compelling choice for enterprises compared to OS X. Microsoft s powerful software provisioning and OS deployment tools offer administrators the power and flexibility to control device proliferation across companies of all sizes. Group policy control leverages Microsoft s Active Directory which makes it easy for managing devices on a corporate infrastructure. OS X relies primarily on third-parties to implement these features which can add complexity to a PC management implementation. Windows 8.1 s new built in MDM functionality puts it in a strong position against Apple when also paired with Windows Intune for more powerful integrated MDM. OS X also offers a mature feature set for MDM, but must rely on third-parties for enterprise level management which can add additional complexity for administrators for managing devices. Logic20/20, Inc. 2013, all rights reserved. Page 4 of 20
6 Management Areas Managing apps development Windows 8.1 versus ios A Windows 8 app is compatible with both ARM and x86 devices whereas developers on Apple s ios platform have to design specifically with the size differences in mind if they wish to put their ipad apps onto an iphone; two different apps are often required for this. Microsoft is also able to allow for easy sideloading and simple tools such as Zero Install which allows developers to run and update apps without installing them. Apple developers must buy a yearly subscription to develop and distribute in-house apps. Windows 8.1 versus OS X Windows 8 apps are also compatible between ARM/x86 mobile devices and full Windows 8.1 PCs as well. Apple developers must develop specific apps between ios and OS X. UI code is only one of the attributes that needs to be rewritten when converting apps between ios and OS X. Windows 8.1 development makes it easy to scale between devices as required. Logic20/20, Inc. 2013, all rights reserved. Page 5 of 20
7 Scenarios The following scenarios demonstrate some of the key features compared in this document. Focus on IT admins and users. Scenario 1: Managing PCs and Mobile Devices IT administrator Shawn is responsible for managing over a hundred devices across his company. His workplace includes not only company computers, but employee mobile devices that must be managed as well. Thankfully, Shawn is able to accomplish this by using several Microsoft device management solutions. Shawn uses the Microsoft Deployment Toolkit and Security Compliance Manager along with System Center 2012 R2 Configuration Manager (ConfigMgr) in order to help automate the compliance management process so that the devices on the network meet industry and company standards. Using the Microsoft BitLocker Administration and Monitoring tool, he s able to set BitLocker encryption on the PCs and BitLocker To Go for employees portable drives. After getting that work done, Shawn then starts to deploy the company s approved software to the computers using ConfigMgr. A new update has just come out for Windows 8.1 and Shawn uses ConfigMgr to ready the deployment of the update to the rest of the computers. At the same time, an update came out for one of the company s mobile applications which he ll also be able to deploy with the help of Windows Intune. If Shawn had wanted to use an Apple solution for ios or OS X for these kinds of PC management solutions he would have had to research and purchase a third-party product. Additionally, he would have had to learn how to use the new tool as opposed to having the familiar single pane of glass approach that Microsoft s solutions offer. Later that day Beth, a new hire, has gotten her phone connected to the company system and has just been handed her new computer. When she boots up the computer she must put in the BitLocker password that she was provided in order to get access to the computer. Once she gets access she is prompted for a Windows Update which she accepts and waits to download and then reboot. While waiting she decides to check the company s paycheck app on her phone and finds out that it also requires an update that she is prompted to download. Once the updates are complete, her computer and phone are up-to-date and she can begin her work. Scenario 2: Management from the Cloud Sam is an IT administrator for a company that has offices all over the world with many employees who travel to client sites. Using Windows Intune and ConfigMgr, Sam has set the password functionality on the employee s mobile device and laptop. Several high level employees of the company have access to highly confidential material on their devices so Sam decides to assign them to a group that she is able to track separately from the rest of the company for reporting purposes. Logic20/20, Inc. 2013, all rights reserved. Page 6 of 20
8 Rebecca is one of the employees with a device containing confidential material. To her horror, she has just realized that she left the device at a restaurant several hours ago. She returns to find the device is gone. She contacts Sam in IT for assistance. Before Rebecca has even called IT, Sam was alerted to a possible problem when Rebecca s device became locked after several attempts at access it with the wrong password. Sam is able to confirm with Rebecca that it wasn t her who forgot the password and they decide to have Sam erase the confidential data on the phone to prevent anyone from accessing it. Apple s Profile Manager for OS X and ios would have allowed Sam to implement many of these device management features, but it is not recommended for use in large, enterprise scale device management scenarios. Third-parties would need to be used for larger implementations. Scenario 3: App Development Ryan is a software developer who is interested in developing an app for both Windows 8 devices, including Windows RT devices. Wanting the app to work on touch screens, Ryan consults Microsoft s Dev Center to learn more about Windows 8.1 s touch language. He also uses several design patterns to help him decide on the layout. All the basic languages that Ryan knows how to use (C#, Visual Basic, C++, etc.) are compatible with Windows 8.1 as well. Once his app is completed he finds that it works on a 10in. Windows RT tablet, an 8in. Windows 8 tablet, and his desktop computer. Since the app he is developing is a line-of-business (LOB) app and he has not had his IT department test it yet, Ryan decides to sideload the app instead of initially publishing it to the Windows Store. Once the app is ready for enterprise deployment, Ryan uses System Center Configuration Manager or Windows Intune to manage the deployment, offering a simple, single pane of glass solution. For ios and OS X, Ryan could only use Apple s volume purchase program combined with a third-party mobile device management solution, which would be a more complicated scenario for him to learn and manage. Logic20/20, Inc. 2013, all rights reserved. Page 7 of 20
9 PC and mobile device management PC management tools help organizations cut costs involved in PC ownership and management by providing the ability to remotely manage PCs throughout their entire lifecycle. This includes planning, initial deployment, ongoing management, software deployment, disaster recovery, and OS/hardware migrations. Having the option to select an efficient and cost effective PCLM tool is a key consideration for enterprises during the platform selection process. In addition to PC management tools, MDM services have matured greatly in the last year. Having a strong, integrated MDM solution is also a smart consideration enterprises should not take lightly. Key findings The following section compares Windows 8.1, ios 7, and OS X 10.8 Mountain Lion based on their management capabilities: Compliance, OS Deployment, and application delivery: Microsoft offers free support with its ADK (Assessment and Deployment Kit) and MDT (Microsoft Deployment Toolkit). System Center 2012 R2 Configuration Manager (ConfigMgr) is a separate Microsoft product that provides powerful management functionality. Domain Join and Group Policy Control are both strongly integrated features of Windows 8.1 as well. Apple s own OS X server software Profile Manager only offers basic functionality to configure, manage, and deploy systems for enterprises, while its Netinstall is more effective dealing with smaller installations than larger enterprise requirements. Third-party solutions offer comparable features between OS X and Windows 8.1, but can add additional complexity for IT administrators to implement and manage. Mobile device management: With the release of Windows 8.1, Microsoft is offering expanded options that will allow third party products such as AirWatch and MobileIron to provide stronger enterprise device scenarios, putting Windows 8.1 on par with OS X and ios MDM solutions. Microsoft s ConfigMgr and Windows Intune still offer a more closely integrated system that removes the potential complexity adding third-party solutions may create. Logic20/20, Inc. 2013, all rights reserved. Page 8 of 20
10 Managing PCs (with on-premise tools) Tools that help enterprises manage PCs help cut the time and costs involved with PC ownership and management by offering to manage the entire PC lifecycle from: OS deployments to software deployments to migrations to continuing management. A powerful and cost efficient PCLM tool is something that all enterprises will need to consider while selecting a platform. This section examines the following PC management features: Compliance (including encryption) OS deployment/application delivery Asset tracking Monitoring and support Group Policy Control Compliance Microsoft offers free tools with Windows 8.1 called Microsoft Deployment Toolkit (MDT) 2 and Security Compliance Manager (SCM) 3. MDT integrates with SCM to guarantee that the Windows 8.1 deployment is fully secure. Windows 8.1 offers a separate tool known as System Center 2012 Configuration Manager (ConfigMgr) 4 which enhances the compliance features and assists IT with assessing and enforcing compliance measures. This ensures that enterprises reduce their IT risk and that they meet the industry standards as well as their own corporate standards. ConfigMgr automates sections of the compliance management process which greatly reduces complexity for the client. Administrators can set a baseline of their own choosing or follow industry standard policy templates that Microsoft provides as part of their IT Governance and Compliance Solution Accelerators 5. These can check for OS version, required applications installation and configuration settings, and OS configuration settings. With the baseline in place, ConfigMgr pushes it down to the client agent. The agent regularly confirms the compliance status of the client system against their set baseline. 2 Source: 3 Source: 4 Source: 5 Source: Logic20/20, Inc. 2013, all rights reserved. Page 9 of 20
11 In addition to all of this, ConfigMgr also has the fully featured ability to report. Administrators can check the compliance of a full environment which gives them the ability to: Check desktop, laptop, server, and mobile device configurations Check for unauthorized configurations Prioritize compliance Apple s OS X comes with their Profile Manager feature which provides basic deployment, configuration, and management of systems, but it lacks the advanced compliance, reporting, and remediation features of ConfigMgr. Instead of an integrated solution, OS X relies on third-party solutions such as Citrix 6 to meet the features of the more integrated Window 8 solutions. While these solutions offer comparable features, the possibility that IT administrators will need to deal with another, non-integrated system is something that enterprises should not ignore. OS X must also rely on third-parties for encryption compliance, while Windows 8.1 offers Microsoft BitLocker Administration and Monitoring (MBAM) which is a strong in-house solution for large-scale management of BitLocker implementations. For Windows 8 devices and portable storage devices, BitLocker To Go and BitLocker Driver Encryption protect their data. Earlier this year Microsoft launched MBAM which offers new functionality such as: Faster deployment speed IT administrator support for dealing with lost PINs Support for more complex PINs that so not accept simple PINs like Apple also does not offer any tools for ios that allow administrators to manage the compliance of their devices and again must rely on third-parties for solutions. Software provisioning Microsoft s ConfigMgr is much more context-aware in its ability to deliver applications that it was previously able to. To choose the best way of delivering an application to a user it analyzes the network and device capabilities. It can choose a variety of delivery methods such as: Local installation Application virtualization streaming Presentation server Integration with Citrix XenApp8 6 Source: 7 Source: 8 Source: Logic20/20, Inc. 2013, all rights reserved. Page 10 of 20
12 User centricity is also achievable using ConfigMgr using a new application model which lets administrators select specific applications and send them to specific users instead of devices. This means that ConfigMgr is able to grade a user s relationship with their device(s) and choose which experience that user should receive. An example of this can be when a user updates an app on their work laptop it will use Microsoft Installer, but if they access it on their unsecured home PC it may be delivered using App-V in order to keep data more secure. These new tools give IT administrators the power and flexibility to control device proliferation across their company which is a unique competitive piece of functionality that puts Windows 8.1 and ConfigMgr in a very good position compared to their competitors. Apple s NetInstall allows users to upgrade their computers without the need to disable or attach OS or third-party software. NetInstall also allows them to manage third-party and Apple installs, name computers, add MDM configurations, and bind to directory services. Apple s Profile Manager allows for automatic configuration updates over the air for ios devices. NetInstall is an effective product for small scale implementations, but Windows 8.1 and ConfigMgr offers support for large-scale implementations along with its powerful application delivery model. OS deployment As was previously touched upon in the above section on compliance, Microsoft s MDT along with ConfigMgr allows for an automated and extremely customizable solution for configuring and deploying desktops and servers. For the version of Windows being used, IT administrators can put together a solution for delivering updates, security fixes, patches, applications, and more in one distribution. IT administrators can also use task sequences to automate the OS deployment. The Task Sequencer allows IT administrators to group tasks, which makes deployments more efficient and easier. To improve the end-user experience, tighten security, and shrink downtime there is additional support for a variety of deployment scenarios including: Computer to computer In-place migrations Offline or removable media OEM PXE The strong feature set of ConfigMgr s OS deployment functionality helps organizations simplify upgrades, reduce the cost of OS deployments, improve security during deployments, and use native Windows 8.1 toolsets. As a result, IT administrators will find the tool easier to use and do not have to spend time learning a third-party solution. Apple s NetInstall software will do basic OS deployments and distribution, but does not have as many fully featured capabilities as Microsoft s ConfigMgr. Logic20/20, Inc. 2013, all rights reserved. Page 11 of 20
13 The ios operating system updates are usually very large changes and third-party MDM solutions are usually required to update along with the OS update. This can cause headaches for IT administrators because of the complexity of ensuring the MDM solution and all devices running the updated OS are functioning properly. Asset tracking Windows Intune and ConfigMgr make use of Microsoft Exchange ActiveSync in order to perform asset tracking for both PCs and mobile devices. Apple uses both OS X Server and Remote Desktop 9 for asset tracking. Remote Desktop lets IT administrators search, track, and report on a large number of hardware and software attributes across a network. Due to asset tracking being based on PSLM/MDM capabilities Microsoft and Apple s unified solutions along with third-party solutions all offer comparable features for tracking and reporting devices on a network. Remote power management Microsoft uses ConfigMgr for power management and in Windows 8.1 has included additional report and power management functions such as: Ability to set policies for individual user groups Ability to allow users to opt out of power management policies Reports that show devices which are currently excluded from those policies Administrators working with OS X can use Apple s Energy Saver to perform power management on OS X devices. Features include setting sleep and shutdown times along with scheduling start-ups. These features, in addition to Microsoft s ConfigMgr functionality, put Windows 8.1 ahead in power management. ios devices do not offer native remote power management and must rely on third-party apps or MDM s to accomplish this simple task. 9 Source: Logic20/20, Inc. 2013, all rights reserved. Page 12 of 20
14 Remote helpdesk support Windows 8.1 includes basic helpdesk functionality such as passcode wipes, remote device wipes, screen sharing, and remote device locking. Microsoft also offers an integrated helpdesk support system called System Center Service Manager This change control and helpdesk management product helps enable automation of IT service management and the reporting features allows for tracking, management, and reporting of information across all aspects of System Center components. Using OS X Server software, Apple offers a self-service portal for remote helpdesk support that also offers the basic helpdesk features that Microsoft offers. In order to match the more powerful, integrated features provided by Windows 8.1, Apple would need to rely on third-party offerings which has the potential to add additional cost and complexity to an enterprises IT helpdesk solution. Group Policy Control Group policy control is a very helpful ability for enterprise companies to have. Microsoft s advanced, integrated group policy features allow IT administrators to control a large amount of settings for computers in a network s ecosystem such as: Setting users wallpaper Setting the chrome used by Windows Setting the default browser Permitting access to external drives and/or directories Permitting the connection of external devices These group policies can be managed through Active Directory which makes it even easier to manage devices that are part of the corporate infrastructure. With Windows 8.1, MDM management features are built into the OS and can even allow for management of mobile devices. Apple does not have such strong, built-in functionality for group policy control and must rely on third-parties yet again in order for IT administrators to have many of the functions that Windows 8.1 provides. Third-party vendors actually leverage Microsoft s own Active Directory so that ios and OS X devices can be managed 10. This is a clear advantage for Microsoft as they are much more easily able to integrate with their own technologies than a third-party. 10 Source: Logic20/20, Inc. 2013, all rights reserved. Page 13 of 20
15 Monitoring enterprise PCs Windows 8.1 has several tools that meet the needs for monitoring enterprise PCs such as: Performance Monitor: This visualization tool can be used to analyze system performance using logs and even real time data. Event Viewer: Used to look into error messages. It is able to examine hardware events, system logs, and application logs. System Center Operations Manager (SCOM): Ensures that performance remains predictable and offers infrastructure monitoring. Also provides public and private datacenter and cloud component monitoring. Apple s Profile Manager is included with OS X Server and offers a lightweight management system that can be used to monitor OS X devices on an enterprise network. Using the same type of configuration profiles as ios, it will analyze recent activity and keep track of tasks on OS X devices. Apple Remote Desktop also gathers software and hardware information on devices which assists with the monitoring process. In this category both Apple and Microsoft offer strong integrated solutions. Managing mobile devices with on-premise tools As mentioned in the previous sections, PC Lifecycle Management (PCLM) tools are used to ease the management of the PC infrastructure for enterprises and assist in cutting costs. For Mobile Device Management (MDM), there have traditionally been separate tools that offer the management of mobile devices. Over the last few years, PCLM and MDM products have started merging and offering many of the same features. Currently they still offer advantages in their perspective areas, but it gives the option to customers if they need to use additional software for MDM tools or if their PCLM tools are currently sufficient for their needs. BYOD (Bring Your Own Device) is a growing area for corporations, but it is not in the scope of this paper. Compared to corporate owned devices, BYOD management solutions do not offer the same level of security that is required by larger corporate enterprises. Even though employees may wish to use their own devices to access sensitive corporate information, it is not in the best interest of an enterprise-level organization to allow this. In a June 2013 survey performed by Dimensional Research, it was found that 63% of corporations polled do not manage corporate information on personal phones and that 79% of large companies reported mobile security incidents in the past year Source: Logic20/20, Inc. 2013, all rights reserved. Page 14 of 20
16 Corporate controlled devices offer a tighter level of control of employee mobile devices and makes for the most secure mobile management solution that enterprises can have. Management from the Cloud The scope of this paper will examine the following three cloud-based MDM solutions: Windows Intune AirWatch MobileIron Integrated management solutions Windows Intune 12 is Microsoft s powerful, integrated, cloud-based PCLM solution with additional MDM functionality. It provides reporting, tools, and upgrades for the latest version of Windows, Windows Phone, and with the release of Windows 8.1 it even offer increased ios and Android support. Intune was originally a PCLM tool, but with the release of Windows 8.1 has become what Microsoft calls a Unified Device Management tool which supports both PC and mobile device management. Windows Intune provides all the basic MDM features like wiping devices of data, OS settings management, and requiring passwords. Through integration with ConfigMgr, IT administrators can manage devices from a single pane of glass 13 which allows for faster and simpler deployments without the need for larger amounts of training that an unfamiliar third-party solution would require. In addition to these lower level features, Windows Intune also includes inventory management, a system overview feature that tracks the status and manages the alerts of devices on the network, and allows IT administrators to group devices according to a variety of characteristics such as location, department, and function. By setting groups like this, administrators can control specific settings and push applications or updates to individual groups that may require them. Windows Intune originally only allowed enterprises to use their Exchange Server s Admin Console to directly manage mobile devices like ios, but with its December 2012 release it introduced direct MDM and unified device management. The workspace in Systems Overview is also capable of delivering a Mobile Device Summary which can be used for tracking the distribution of mobile devices on the network. A collection of additional Windows Intune s MDM features are provided below: Company and Self Help Portal available to employees of companies using Intune LOB app provisioning and consumption is supported Devices can be allowed to connect to Exchange servers Remotely wipe data from devices which have been lost or stolen 12 Source: 13 Source: Logic20/20, Inc. 2013, all rights reserved. Page 15 of 20
17 Device access requirements and security policies can be used and managed for device compliance Update Manager (included with Intune) assists in scheduling and deploying both Microsoft and third-part software Update management and software deployment is another key strength that Windows Intune s Update Management. Though the functionality is limited for mobile devices, the Windows 8.1 functionality is feature rich. Included is the ability to schedule and deploy updates to both third-party and Microsoft software as well as tracking the licenses that have been purchased across device installations. Windows Intune also offers strong reporting features for Windows 8.1 for generating reports across areas such as installed software, endpoint protection, updates, and hardware. Data can also be brought into other tools for further report analysis. Apple does not provide a cloud based, in-house OS X management solution, which is a key Microsoft advantage in the PCLM space. For MDM, ios relies primarily on thirdparties which will be discussed in the following section 14. Third-party MDM solutions MobileIron and AirWatch are the leaders in cloud-based MDM solutions for ios software. AirWatch s MDM solution is primarily delivered though its cloud service, but can support on-premises requirements. MobileIron uses its Connected Cloud service for cloud based needs. Both of these third-party solutions offer a strong feature set for mobile device management with functionality such as: App Catalog: AirWatch s tool for managing and distributing apps Content Locker: AirWatch s tool for securing mobile access and distributing documents Multiple OS management Security features: remote device wipe, blocking apps, inventory management, secure publishing, password enforcement, encryption, etc. Windows Intune is capable of doing all that an enterprise will need for their mobile management needs without the added complexity of purchasing, implementing, and using third-party solutions. Windows Intune is also able to be used in combination with ConfigMgr so that you can have all of your administration done from a single location allowing for Microsoft s single pane of glass philosophy. Administrators only need to deal with the apps once and the configuration once, and administer it all from ConfigMgr s console. The tightly integrated approach offered by Windows Intune and 14 Source: Logic20/20, Inc. 2013, all rights reserved. Page 16 of 20
18 ConfigMgr is a strong advantage for Microsoft and for administrators that wish to operate their systems through a single, unified console. Managing apps development Application development environments are constantly improving to meet the evolving needs of users and developers. The following categories are vital considerations to note when examining these environments: ARM (Windows RT), x86 (Windows 8.1, OS X), and A4/A5/A6 (ios) processor compatibility Application security Development environment Quality of the Marketplace experience Key findings Windows 8.1 is designed to work across a variety of devices from x86 desktops and tablets to ARM devices. To facilitate this idea of cross-compatibility, Microsoft makes it easy for developers Windows 8 apps to work across these various hardware and Windows 8 OS variants. Apple s mobile and desktop platforms vary in both operating system (OS X/iOS) and hardware (x86 vs. A4/A5/A6). However development for these platforms is separate and up to the developers to design for different screen sizes, processor types, and operating systems. Windows 8.1 s cross-compatibility is a strong advantage for Microsoft. Cross-platform apps Microsoft s goal with Windows 8.1 and Windows RT was to allow developers to easily create cross-architecture applications that they are able to code once and have them work across both x86 and ARM processors, even across different screen sizes, hardware types, etc. Developers will still need to design apps with a tablet interface in mind (icons large enough to allow for touch among other considerations) if they wish for their apps to work well on tablets, and apps make exclusively for x86 hardware will also not work on ARM processors, but the ease and potential of cross-platform app development is still there for the developers to take advantage of. This is a strong advantage for Microsoft. The ios Software Development Kit (SDK) cannot be used on OS X. Apps that developers make for iphone are compatible with the ipad, but not vice versa. Because of Apple s proprietary mobile processors (A4/A5/A6), apps developed for ios or OS X are not compatible with each other since OS X is built for Intel hardware. Developers must Logic20/20, Inc. 2013, all rights reserved. Page 17 of 20
19 design with that goal in mind form the beginning, or do several different versions of their application. Creating secure apps Microsoft s Windows 8.1 uses AppContainer to minimize the vulnerability of systems 15. Cookies, cache, and other web-platform data is not shared between an App Container and the remainder of the system. Using an App Container blocks read and write access to most system files. The benefit of an App Container is that developers can make apps that interact in a secure manner. Apple s security features for apps include sandboxing and Keychain for its platforms 16. App sandboxing can segment the program from other parts of the system in case malicious user data attempts to damage the app. A Keychain is encrypted storage for confidential information such as passwords. Microsoft and Apple offer similar security feature sets for app development, but security has always been one of Microsoft s key strengths, one that ios has yet to match 17. Application development and marketplace environments Across ios, OS X, and Windows 8.1, all three platforms feature familiar/customary environments that their prospective developers will be comfortable with. No single environment has a clear advantage over the other. Windows 8.1 is continually evolving (more than ever with the introduction of the Modern design idea), but it continues to give developers and users a familiar set of tools, languages, and backend infrastructure. ios and OS X may be newer compared to Windows 8.1, but developers and users are also used to the development environment that Apple provides. Windows 8.1 offers a variety of ways to publish, install, and/or distribute apps including: Windows Store: Microsoft s app marketplace Windows Intune and ConfigMgr for a company portal that provides a catalogue of enterprise apps Sideloading: Install a Windows Store app without publishing it or downloading it from the store Zero Install 18 : Run and update Windows apps without installing them 15 Source: 16 Source: /TheiOSEnvironment/TheiOSEnvironment.html 17 Source: Windows 8 Competitive Comparison: Security 18 Source: Logic20/20, Inc. 2013, all rights reserved. Page 18 of 20
20 Since the introduction of the iphone, Apple has offered a popular and hearty App Store for ios and Mac App Store for OS X in which users can purchase and download apps from their itunes software. Even though Enterprise app stores can be setup for ipads, Apple still has not allowed for the ability to create an enterprise app store with the Mac App Store. They do offer a volume purchase program that enterprises can distribute apps with using third-party MDM solution, which adds additional steps and complexity for application purchasing and distribution. This is not the case when it comes to Windows 8.1 because Microsoft offers the ability for an enterprise app portal with Intune and ConfigMgr. This is a strong advantage over Apple when comparing Windows 8.1 with OS X or ios. Conclusions Due to the increased popularity of mobile devices in corporate environments, powerful and secure device management has become more important than ever. Apple and Microsoft both offer solutions for their perspective computer systems, but because Windows 8.1 is already deeply entrenched with the vast majority of these businesses, the integrated solutions offered by Microsoft are both powerful and offer administrators and users a familiar environment to work with and a single pane of glass approach that allows for management from a single console. For managing PCs, Apple primarily relies on its own basic featured in-house solutions such as Profile Manager and NetInstall for basic deployment, configuration, management of systems, and software provisioning but it must rely on third-party solutions for many advanced features. Windows 8.1 offers a variety of services both free (such as MDT and SCM) and meant to compete with third-parties such as ConfigMgr while offering an integrated experience for administrators. Mobile device management is another area that Apple primarily relies on third-parties to come up with solutions. Using a variety of third-party software can cause complexity for IT administrators which can lead to more difficulty than they may be worth. Microsoft offers Windows Intune which is able to work with other programs such as ConfigMgr to offer a unified device management solution. The cloud management field has a variety of third-parties that are all attempting to be the go-to solution for enterprises. Microsoft s advantage will always come from the additional complexity that goes along with finding, purchasing, and learning to use a new third-party tool. IT administrators are already accustom to using Windows products and the ability to manage complex systems from a single pane of glass with Microsoft s solutions is a strong advantage. App development environments for Microsoft and Apple both offer comfortable tools for developers to work with. Microsoft s advantage comes in Windows 8.1 s ability to run apps between different device types such as desktops and tablets without additional Logic20/20, Inc. 2013, all rights reserved. Page 19 of 20
21 coding work on the part of the developer. Apple developers must code specifically for different processors and hardware types. Both Microsoft and Apple offer strong marketplaces for applications, but Apple s OS X app store lacks a strong enterprise focus which puts them behind in that key area. Presented By: Logic20/20 Writer: Benjamin Howorth Contributors: Marius Marcu, Anders Westby, Emily Winans, Bill Tsang, Michael Niehaus, Martin Booth, Michael Wallent Date: Fall 2013 This paper includes research gathered as of October 1, 2013 regarding Windows 8.1, ios 7, and OS X Logic20/20, Inc. acknowledges the support of Microsoft Corporation, which made possible some of the research presented in this white paper. Publicly available sources were also used as research and are cited in the paper. This white paper is for informational purposes only. The information contained in this document is deemed reliable at the time of writing, but is not guaranteed. Logic20/20, Inc. MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Without limiting any rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express prior written permission of Logic20/20, Inc. Logic20/20 and the Logic20/20 logo are trademark(s) of Logic20/20, Inc. All other trademarks are trademarks of their respective owners Logic20/20, Inc. All rights reserved. Logic20/20, Inc. 2013, all rights reserved. Page 20 of 20
Windows 8.1 Devices Deliver. Simplified management through a single pane of glass
d Windows 8.1 Devices Deliver Simplified management through a single pane of glass Contents Executive Summary... 2 Introduction... 3 Overview... 3 Scenarios... 5 Managing PCs and Mobile Devices... 5 Management
More informationNew Features: What s new in Windows Intune?
New Features: What s new in Windows Intune? Contents Release Overview... 2 Unified Enterprise Management Solution... 2 User-based Licensing... 5 Extending Client Support... 5 Understanding Mobile Device
More informationInfrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune
Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune Enrollment and Management of Mobile Devices with Microsoft System Center Configuration
More informationBusiness Value of Microsoft System Center 2012 Configuration Manager
Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationMobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
More informationApps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.
Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying
More informationGetting Started Guide: Getting the most out of your Windows Intune cloud
Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationThe Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationWindows 8 Devices Deliver: Enhanced networking enables anywhere, anytime work styles. Review infographic
Windows 8 Devices Deliver: Enhanced networking enables anywhere, anytime work styles Review infographic Contents Executive Summary... 2 Introduction... 3 Overview... 3 Scenarios... 6 Connecting on the
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationMicrosoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
More informationHow To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black
Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationHow To Support Bring Your Own Device (Byod)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
More informationAlexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility
More informationSecure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
More informationNetwork Access Protection (NAP)
Executive Summary Management and consistent availability of servers and endpoints in a business means higher productivity. Period. When employees no longer have to be concerned with the availability of
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationFive Steps to Android Readiness
Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions cwhelan@lighthousecs.com @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved
More informationDevice Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationSecuring Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
More informationStatement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationManaging Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led
Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Course Description Get expert instruction and hands-on practice configuring and managing clients
More informationWindows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationDatacenter Management and Virtualization. Microsoft Corporation
Datacenter Management and Virtualization Microsoft Corporation June 2010 The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationSupporting Workforce Mobility: Best Practices in Enterprise Mobility Management
Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
More informationWindows Server 2012 R2 The Essentials Experience
Windows Server 2012 R2 The Essentials Experience Published: October 7, 2013 Contents 1 Meeting business needs 1 The small business challenge 2 Windows Server 2012 R2 Essentials 2 A cloud-enabled server
More information10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
More informationRemote Infrastructure Management Emergence of the Cloud-based Helpdesk
Remote Infrastructure Management Emergence of the Cloud-based Helpdesk A leadership perspectives white paper Recommended next steps for business and industry executives Issue 11 in a series Executive Summary
More informationHow To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
More informationOperationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationMicrosoft 70-696 Exam
Volume: 86 Questions Topic 1: Proseware, Inc. 8 Topic 2: Litware, Inc. 14 Topic 3: Contoso, Ltd. 7 Topic 4: Fabrikam, Inc. 13 Topic 5: Mix Questions 44 Topic 1, Proseware, Inc. Case Study Overview General
More informationNew Choices in Windows * Device Management
White Paper 4th Generation Intel Core Processors and Intel Atom Processors Intel and Windows 8.1* Mobility New Choices in Windows * Device Management Considerations in Deciding How to Manage Windows Devices
More informationEnterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
More informationGrowing your business through small business opportunities. frank.spuls@didactive.com v-fspuls@microsoft.com
Growing your business through small business opportunities frank.spuls@didactive.com v-fspuls@microsoft.com Agenda 2 The customer Customers marketplace The changing workplace 5' Trend: remote workers The
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationDeploying iphone and ipad Apple Configurator
Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions
More informationMicrosoft Enterprise Client Management Report. Windows Intune* and System Center Configuration Manager*
Executive Summary The bring your own device (BOD) workplace presents a number of challenges to IT management. Mobile devices come in a wider variety of devices and operating systems in the mobile realm
More informationCourse Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led
Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing
More informationactivecho Driving Secure Enterprise File Sharing and Syncing
activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get
More informationHow VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER
How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER Table of Contents. Introduction... 3 Intended Audience.... 3 What Is VMware Mirage?... 3 What
More informationHow Microsoft IT manages mobile device management
IT Insights A service of Microsoft IT Showcase How Microsoft IT manages mobile device management July 2015 Bring Your Own Device (BYOD) is no longer just a trend. It is arguably the dominant culture in
More informationMobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
More informationHoster Improves Remote Access, Increases Revenues with Virtualized Desktop Solution
Customer Solution Case Study Hoster Improves Remote Access, Increases Revenues with Virtualized Desktop Solution Overview Country or Region: United States Industry: Hosting Customer Profile ngenx delivers
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
More informationHow To Secure Your Mobile Devices
SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points
More informationManaging Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense
SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device
More informationGETS AIRWATCH MDM HANDBOOK
GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS
More informationKey Requirements of Enterprise Mobility Management Solutions
Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:
More informationHow to Turn the Promise of the Cloud into an Operational Reality
TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing
More informationAndrej Zdravkovic Regional Vice President, Platform Solutions Intellinet
Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.
More informationBest-of-Breed Enterprise Mac Management
White Paper Best-of-Breed Enterprise Mac Management Choose the right tool for the job A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationIntroducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management
Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.
More informationHow To Get A Client Side Virtualization Solution For Your Financial Services Business
SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,
More informationEnterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
More informationOffice 365 Windows Intune Administration Guide
Chapter 7 Office 365 Windows Intune Administration Guide Office 365 is a suite of technologies delivered as a Software as a Service (SaaS) offering. Office 365 reduces the IT costs for businesses of any
More informationTCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationDirect Control for Mobile & Supporting Mac OS X in Windows Environments
Direct Control for Mobile & Supporting Mac OS X in Windows Environments Leveraging Existing IT Staff Knowledge, Processes and Infrastructure to Support Mac OS X Systems and Their Users Ed Frola Senior
More information20696B: Administering System Center Configuration Manager and Intune
20696B: Administering System Center Configuration Manager and Intune Course Details Course Code: Duration: Notes: 20696B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationUnified Device Management Allows Centralized Governance of Corporate Network Devices
Unified Device Management Allows Centralized Governance of Corporate Network Devices Published July 2013 The recent bring your own device trend that allows employees to use devices they own for business
More informationEasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
More information11 Best Practices for Mobile Device Management (MDM)
MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationSecurely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
More informationGlobal Technology Service Provider Deploys Operating System and Expands
Windows 7 Customer Solution Case Study Global Technology Service Provider Deploys Operating System and Expands Overview Country or Region: Germany Industry: Professional services Customer Profile Based
More informationMDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
More informationMobile Device Inventory the first step in enterprise mobile management
Mobile Device Inventory the first step in enterprise mobile management EXECUTIVE SUMMARY As phones and tablets overtake PCs as the most-often used means of connecting to company data and apps, organizations
More informationVMware End User Computing Horizon Suite
VMware End User Computing Horizon Suite Luc Gallet lgallet@vmware.com 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work
More informationWhy Digital Certificates Are Essential for Managing Mobile Devices
WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper
More informationWindows 8 Pro: For Small Business. Speaker Name, Title
Windows 8 Pro: For Small Business Speaker Name, Title The growing needs of small businesses Balance work and life Work smarter Stay connected and mobile Stay in control Improved security Increase competitive
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More information