Huawei AnyOffice MDM Technical White Paper

Size: px
Start display at page:

Download "Huawei AnyOffice MDM Technical White Paper"

Transcription

1 Huawei AnyOffice MDM Technical White Paper

2 Contents 1 Background Solution Overview Lifecycle-Based MDM Acquirement Deployment Secure Access to Intranet Resources Application Management Running Customizable Compliance Check and Response Policies Diversified Device Control Policies Asset Loss Management Self-Service Management for Users Retirement...19

3 4 Solution Highlights Better MDM Capabilities on Huawei Mobile Devices* Device Control Application Management Terminal Information Acquirement MDM Capability Modularization* Seamless Switchover Between Intranet and Extranet Mechanism Mechanism of ios MDM Mechanism of Android MDM MDM Data Server...26

4

5 1 Background In 2012, 20% of employees use their own mobile devices, such as the iphone, ipad, or Android devices, for work-related activities. Along with the trend of IT consumption, Bring Your Own Device (BYOD) becomes the new norm. Now, instead of a trendy concept, BYOD is changing the way people work with an unstoppable momentum. With their own devices, employees can exchange and trace sales opportunities more flexibly, promote enterprise information management, flatten the UIs, and enhance decisionmaking efficiency and responding speed. However, the openness of BYOD introduces various security and management risks. BYOD extends the border of office. Employees can work and play games on the same mobile devices. Personal and office applications are blurring the boundary in between. For most enterprises, prohibiting BYOD is infeasible. Young employees are born in a technology explosion era. Most of them are familiar with mobile information technologies and urge for BYOD support from enterprises. This need forces enterprises to adjust to the BYOD technologies. At the same time, BYOD brings various problems and risks as the one ninth of an iceberg below the sea. The open and intelligent mobile platform faces problems, including malicious code embedding, data leaks, mix of personal and enterprise applications, and multiplatform with different structures. These problems are the challenges for enterprise IT management. Against this background, MDM came into being. At present, all the mainstream mobile device operating systems support the MDM protocols to some extent. Huawei AnyOffice, a mobile office client, integrates the MDM function to centrally manage enterprise smart terminals. With this function, the IT personnel of enterprises can manage the smart terminals just like they use a domain controller to manage enterprise PCs. The AnyOffice supports the ios and Android operating systems. 1

6 2 Solution Overview Focusing on the requirements, features, and challenges of BYOD, Huawei AnyOffice mobile security solution not only ensures easy and secure access to the enterprise intranet for mobile workers, but also provides excellent user experience. Huawei, by virtue of its experience and expertise in telecommunication and network security, integrates the following components into the solution: AnyOffice mobile office client a mobile office client on a mobile smart terminal SVN2000-M/5000-M series unified SSL/IPSec VPN gateway USG2200/5100/5500 series gateway with both firewall and Unified Threat Management (UTM) functions AnyOffice Manager* unified policy management platform Mobile Enterprise Application Platform (MEAP) Figure 2-1 Huawei AnyOffice mobile security solution Terminal Access DMZ Intranet Office-based AnyOffice client Non-office-based SSL Enterprise Wi-Fi 3G/4G Mobile Security Access Gateway SVN Security management Assets management Unified policy Management platform* Application distribution IT services UI design Application integration Device interface Application compilation Application release and maintenance Development platform Business object Workflow Supporting platform Application interface LDAP AnyOffice client Public Wi-Fi Firewall/UTM Firewall/UTM MEAP OA and other servers Authentication and authorization Strong mobile authentication AnyOffice security platform Identity Privacy Compliance Access control Mobile NAC* Link security SSL or UDP tunnel encryption L3/L4 VPN Threat defense DDoS Network antivirus Network IDS/IPS Data protection Mobile sandbox Web, , and DLP Anti-theft Application security Application Control Management security Security management Application management Assets management IT services * indicates a feature to be supported by later versions of Huawei AnyOffice Mobile Security Solution. 2

7 MDM is an important component of Huawei AnyOffice mobile security solution. Different from other vendors, Huawei puts forward a lifecycle-based MDM solution, which provides complete MDM policies and methods during the acquirement, deployment, running, and retirement of mobile devices. This design ensures the proper and secure implementation and running of devices in each process. With the features of enterprise-owned devices and BYOD devices, the AnyOffice ensures not only device security but also user experience on using the mobile devices. Acquire Device Lifecycle Deploy Retire Run Acquirement Huawei AnyOffice mobile security solution complies with the ITIL Asset Management Standards, supports the discovery and registration of enterprise-owned devices and private devices, and provides the customized template of commitment of mobile device usage. Deployment Enterprises must ensure the security compliance of the mobile devices. Huawei AnyOffice mobile security solution supports the policy configuration and delivery on the host firewall, VPN, and Wi-Fi, and the enforcement of security policies. The core of mobile office is the secure allocation of mobile applications. Huawei AnyOffice mobile security solution integrates the Enterprise App Store and implements secure allocation, installation, and configuration of applications. Moreover, the company can use the AnyOffice to define policies for whitelisted and blacklisted applications, ensuring that the right person accesses the right application and data. 3

8 Running In this phase, MDM focuses on data and application security. Huawei AnyOffice supports password policies, jailbreak detection and isolation, and control over possible data leak channels, including the SIM card, SD card, camera, Bluetooth, Wi-Fi, USB, GPS, and recording. Mobile devices are prone to loss. The AnyOffice provides key data encryption, remote locking, and remote data wipe functions. On the management back end, the IT department can query and audit the models, operating systems, and versions of all mobile devices and export asset audit reports. Required IT workload is a key indicator of a mobile office solution. Huawei AnyOffice provides a self-service portal where employees can perform operations, including registration, password resetting, loss report, remote locking, and remote data wipe. This portal significantly reduces IT departments' workloads. The centralized management back end supports management functions more complex than the previous ones, including message pushing and fault location. Retirement Upon employee resignation or device loss, the IT department can uninstall the applications on the device, remotely wipe the remaining data, and finally annul the device to prevent data leaks. If a company-owned device is recycled, the recycled device can be re-registered, and the administrator can configure security policies and applications on this device. For details, see the next chapter. 4

9 3 Lifecycle-Based MDM 3.1 Acquirement Assets management is an important aspect in the implementation of MDM. Huawei AnyOffice mobile security solution provides the following methods to help enterprises to start asset registration using MDM. Provides customizable terminal user agreements. The MDM function of the AnyOffice can perform operations on mobile devices, including remote mobile device control (such as remote locking and remote data wipe), device function restriction (such as disabling the Bluetooth and USB), and terminal information query (such as querying terminal application software list, operating system, and the location of a terminal device). Therefore, enterprises must initiate a terminal user agreement to inform users of these facts before registering terminal devices, especially BYOD devices, to the AnyOffice and enabling the MDM function to avoid unnecessary legal affairs. Figure 3-1 Assets confidentiality agreement configuration 5

10 The AnyOffice provides a default terminal user agreement template. Figure 3-2 Assets confidentiality agreement template When a user logs in, the AnyOffice client checks whether the user's terminal device is registered. If no, the client displays a terminal user agreement for this user to read. The registration proceeds only after the user agrees the agreement, and then the MDM function can be enabled on this terminal device. Distinguishes enterprise assets from private assets. The AnyOffice can distinguish enterprise assets from private assets to help administrators define different MDM policies for different assets. Administrators can view the list of successfully registered assets on the AnyOffice management back end and push information to the specified terminal using the group messaging function (such as sending instant messages to employees on the move). 3.2 Deployment Secure Access to Intranet Resources When deploying mobile working, enterprises need to deliver the configurations of common enterprise applications, such as , VPN, and Wi-Fi, to the enterprise-owned devices and BYOD devices that need to access 6

11 intranet resources. Huawei AnyOffice mobile security solution provides a one-stop configuration delivery function for the administrators to centrally configure or import application configurations on the AnyOffice management back end and deliver the configurations to the registered devices. The entire process does not require the participation of terminal users, and the operations are quite easy for the administrators. Supports the setting of Exchange ActiveSync and IMAP/POP mail parameters on the ios terminals on the management page and delivering the settings to the mobile devices (excluding Android devices). Figure 3-3 ios parameter one-stop setting (a) Figure 3-4 ios parameter one-stop setting (b) 7

12 VPN Supports the setting of VPN parameters on the ios terminals on the management page and delivering the settings to the mobile devices (excluding Android devices). Figure 3-5 ios VPN one-stop setting Wi-Fi VPN is deployed for mobile devices to access enterprise intranet over the Internet, and Wi-Fi is deployed for mobile devices to access the intranet when mobile device users return to the intranet. Meanwhile, to ensure access security, enterprises usually perform strict certificate authentication on the Wi-Fi access users. The AnyOffice management back end supports the import of Wi-Fi configuration files to the management page and delivers the configuration files to mobile devices. Figure 3-6 Wi-Fi configuration file management 8

13 You can select one of the following as required to configure Wi-Fi configuration files on the management page: Do not replace Wi-Fi certificate configuration Use the Wi-Fi certificate of the Wi-Fi configuration file that the administrator imports and do not make any modification. Manually configure Wi-Fi certificate The administrator imports Wi-Fi certificates. When a user logs in, the gateway automatically combines the Wi-Fi certificate associated with the user to the Wi-Fi configuration file associated with this user and then delivers the configuration file to the user terminal. CFCA automatically issue a Wi-Fi certificate The gateway applies for a Wi-Fi certificate from the CFCA server, combines the certificate with the Wi-Fi configuration file associated with the corresponding user, and delivers the configuration file to the user terminal (So far, the gateway supports only the connection with the CFCA server of China Minsheng Bank) Application Management Enterprise App Store The administrator can upload various mobile application installation packages and icons of the Android or ios platform to the AnyOffice management back end. These applications can be enterprise applications for intranet use only or common tool software (all ios applications uploaded to the Enterprise App Store are In-House Apps). 9

14 Figure 3-7 Adding applications to the Enterprise App Store In addition, the administrator can select applications from the App Store as required, import them to the Enterprise App Store, and recommend them to employees. Figure 3-8 Adding applications in the AppStore to the Enterprise App Store The administrator can view the list of applications in the Enterprise App Store, including the application name, category, version, size, applicable operating system, update date, and description. In addition, the administrators can query the number of times each application is downloaded as well as the top 10 applications downloaded. Applications are authorized to enterprise users of different roles as resources. Therefore, the list of applications a terminal user can view in the application list of the Enterprise App Store varies with the permission granted to the terminal user. 10

15 3.3 Running Security is crucial for mobile working no matter whether employees use enterprise-owned devices or BYOD devices. With the AnyOffice solution deployed, the enterprise IT administrator can view the security compliance status of each terminal device, configure various security policies, and deliver these policies to the AnyOffice client. When a user logs in, the AnyOffice client can perform a security compliance check. If a violation is detected, the AnyOffice automatically performs the specified action based on the configured policy and notifies the administrator of the violation. The AnyOffice ensures device security using the following methods: Periodical compliance checks (such as application compliance checks, jailbreak checks, and password strength compliance checks). Compliance check on the user terminal when a user logs in to the AnyOffice. Real-time policy delivery (the administrator delivers the compliance check policies immediately after modifying them for the AnyOffice to execute the latest policies). Considering the differences of enterprise-owned devices and BYOD devices, the AnyOffice allows the administrator to configure different policies for them. For example, the administrator can configure strict security policies for the enterprise-owned devices and less strict policies for the BYOD devices Customizable Compliance Check and Response Policies The AnyOffice provides diversified and flexible terminal security compliance check policies and response policies. The enterprise administrator can select policies as required and deliver policies based on different terminals and roles. 11

16 Application compliance check Figure 3-9 Application compliance check policy Configure policies to whitelist and blacklist applications on the terminal as well as policies to handle violations. For example, the administrator can configure a policy to prevent the installation of game software Angry Birds on enterprise-owned devices. If this software has been installed on the device, the policy can be executed to prevent the user from logging in to the AnyOffice and prompt the user to uninstall it. Password strength compliance check The administrator can configure a policy to define the password length, validity period, history, and letters and digits. If a terminal does not comply with the requirement, the AnyOffice can send a notification to the user or prevent the terminal from accessing the intranet (supports only notification on ios devices). Jailbreak check Jailbroken devices usually have unstable systems and are prone to viruses. For security reasons, enterprises allow only non-jailbroken smart terminals for mobile working. 12

17 The administrator can configure policies to determine whether to perform jailbreak checks and the actions for jailbroken devices (including alert, prevent the login to the AnyOffice, and prevent intranet access using Wi-Fi). Roaming policy The administrator can configure a policy to detect whether a terminal is roaming. If yes, the back end sends a notification to the user or does not implement MDM control. For employees sensitive to roaming charging, this policy can help them save money. SIM card policy If the SIM card of a smart terminal is changed, the smart terminal might have been stolen. The administrator can configure policies to determine whether to check SIM card change and the actions for the devices whose SIM cards are changed (including alert, prevent the login to the AnyOffice, and prevent intranet access using Wi-Fi). Terminal encryption check Android 4.0 and later versions support full-disk encryption. Enterprises can require their employees to enable this function on the Android devices to enhance the security of local data. The administrator can configure policies to determine whether to check the Android terminal full-disk encryption function and the actions for the devices that do not have this function enabled (including alert, prevent the login to the AnyOffice, and prevent intranet access using Wi-Fi). Operating system version check The administrator can specify the earliest version of the ios and Android terminals for accessing the intranet. That is, the terminals earlier than the specified version are not allowed to access the intranet. 13

18 Figure 3-10 Compliance check policy AnyOffice client uninstallation policy If the AnyOffice client is uninstalled, the applications installed from the AnyOffice Enterprise App Store are uninstalled as well (supported by the ios terminals). AnyOffice long-time offline check Employees using smart terminals for mobile working need to log in to the AnyOffice on workdays to send and receive and browse company websites. Therefore, if the AnyOffice is offline for a long time on a terminal, it is abnormal. The administrator can configure a policy to determine whether to enable this check, specify the period in which the AnyOffice is allowed to be offline, and send to inform the users that the period is about to expire. For example, AnyOffice long-time offline check is enabled, the period in which the AnyOffice is allowed to be offline is set to 30 days, and the days to send to inform the users that the period is about to expire is set to 5 days. If a terminal does not log in to the AnyOffice for 25 consecutive days, the user will receive notification in the later 5 days. If the terminal does not log 14

19 in to the AnyOffice in the last 5 days, the terminal will never be able to log in to the AnyOffice again unless the administrator unlocks the terminal. Service daemon If service daemon is enabled, periodical compliance checks are performed on the service processes run on the background, regardless of whether the AnyOffice is running, and corresponding actions are performed based on the check result and configured policy. In addition, the service processes can receive and execute the MDM commands, such as remote locking and remote data wipe, sent from the management back end. If service daemon is disabled, compliance checks are not performed on service processes after a terminal logs out of the AnyOffice, and the service processes neither receive nor execute the MDM commands sent from the management back end. Service daemon applies to enterprise-owned devices. Once enabled, the enterprise can learn about the terminal status and make proper responses upon status anomalies no matter whether the employees use the AnyOffice for working. Service daemon is not recommended for BYOD devices in that employees need use the personal devices freely during non-working hours. For example, after employees log out of the AnyOffice, they can use the cameras of the BYOD devices freely. AnyOffice SSID access point check Terminals that have AnyOffice SSID access point check enabled can log in to the AngOffice only after they connect to the specified SSID. For example, an enterprise requires its employees to log in to the AnyOffice and access intranet resources using one or more specific SSIDs, so that strict user identify authentication (such as 802.1X authentication) can be performed during the Wi-Fi connection before user terminals log in to the AnyOffice. When the employees return home, they can use other SSIDs to access the Internet (these SSIDs are not controlled by the enterprise, and the terminals may access the Internet without authentication). The terminals may be reachable to the SVN gateway, but are prevented from logging in to the AnyOffice or access intranet resources. In this case, the administrator needs to enable the AnyOffice SSID access point check policy and deliver the policy to employees' mobile devices. 15

20 3.3.2 Diversified Device Control Policies Device permitted Device function enabling/disabling policy ios Android Installing application programs Purchasing application programs Snapshot Automatic synchronization when roaming Multiplayer game Wi-Fi Portable WLAN access point Voice dialing Adding Game Center friends Permitting passbook when the device is locked USB debugging Camera Bluetooth scanning Siri itunes Store password required for all purchased items indicates that the function can be enabled/disabled on the device Opening functions on mobile devices brings convenience to users but also information leaks. If mobile devices are used for working, enterprise data leaks will compromise enterprise interests. For example, when an employee uses a mobile phone to connect to the intranet to receive and send or browse official documents on the intranet websites, the employee may snapshot the or document and send it to the Internet, or the employee may take photos of confidential information on the intranet and leak the information outside. As listed in the previous figure, the AnyOffice provides diversified device control policies. The administrator can enable or disable the listed functions as required to prevent data leaks during employees' mobile working. 16

21 Application program permitted Configure policies to determine whether to allow the use of YouTube, itunes Store, and Safari on the ios devices. icloud permitted Configure policies to determine whether to allow data backup to the icloud, file synchronization with the icloud, and photograph streams on the ios devices. Security and privacy permitted Configure policies to determine whether to allow the sending of ios device diagnosis information to Apple Inc., receiving distrusted TLS certificates, and forcible encryption during itune backup Asset Loss Management Compared with PCs, mobile devices are prone to loss and stealing. If a mobile device used for working is lost or stolen, the enterprise data on the mobile device may be leaked. Against this background, the AnyOffice solution provides the remote device control function, which includes: Remote locking Remote locking includes device hardware locking and AnyOffice software locking. When a mobile device is lost, the administrator can deliver a remote locking command on the management back end to remotely lock the device to prevent data leaks. Remote unlocking Remote unlocking includes unlocking a device and allowing device login. Unlocking a device means clearing the device locking password, and allowing device login means unlocking the devices that do not log in for a long time to log in again. 17

22 Remote data wipe If a lost device cannot be retrieved, the administrator can deliver remote data wipe command on the AnyOffice management back end to the device to promptly erase the data on the device. In addition, this function provides the following control options: Clear enterprise data and configuration data on the AnyOffice Restore factory default Erase data in the SD card The administrator can deliver different clear operations as required. For example, for a lost enterprise-owned device, the administrator can deliver the restore factory default and erase data in the SD card commands to ensure that all data on the device is erased. For the BYOD device of a resigned employee, the administrator can deliver the clear enterprise data and configuration data on the AnyOffice command to erase only the enterprise data on the device Self-Service Management for Users In the AnyOffice solution, the administrator can use the MDM data server back end to manage enterprise assets, including the enterprise-owned devices and employees' BYOD devices. However, the BYOD devices are not the assets of the enterprise. Therefore, employees hope to implement MDM on their own. The AnyOffice provides a self-service management page for employees to manage their own mobile devices. This not only decreases the workload of the administrator to some extent but also enables employees to use their BYOD devices freely. Employees can perform the following operations on the management page: Download AnyOffice Agent 18

23 GPS positioning Internal asset information viewing Self-deregistration of smart terminals Data wipe for stolen mobile devices Lock/Unlock of mobile phones Figure 3-11 Self-service page 3.4 Retirement The administrator can deregister or delete assets on the AnyOffice management back end. When an employee resigns, the enterprise recycles the enterprise-owned device, unbinds the asset and user name, and deregisters the asset. This recycled device can be assigned to another employee. Assets deleting is used to clear the data on the back end. For example, some old assets are no longer used. The administrator can delete the data of these assets to stop maintaining these assets. When an asset is deregistered or deleted, all enterprise data that the user leaves on the AnyOffice is cleared, including the , browser data, downloaded enterprise apps, configuration files, and pictures. 19

24 4 Solution Highlights The lifecycle-based MDM solution of Huawei provides complete MDM policies and methods during the acquirement, deployment, running, and retirement of mobile devices. This solution ensures the proper and secure implementation and running of devices in each process. With the features of enterprise-owned devices and BYOD devices, the AnyOffice ensures not only device security but also user experience on using the mobile terminals. In addition, the MDM of Huawei AnyOffice solution has the following highlights: 4.1 Better MDM Capabilities on Huawei Mobile Devices* For Huawei mobile devices, the AnyOffice solution not only uses the universal interface of the Android system to implement MDM but also employs the interfaces of the devices to provide more powerful and diversified MDM capabilities Device Control Huawei devices provide the following capabilities in terms of device control: Enable/Disable USB network sharing Enable/Disable USB MTP Enable/Disable USB PTP Enable/Disable user data synchronization Set/Reset screen-lock password Reboot the device Enable/Disable portable WLAN access point 20

25 4.1.2 Application Management Huawei devices provide the following capabilities in terms of application management: Clear temporary application data (such as data) Stop a process, such the blacklist application process. Silent application installation and uninstallation On non-jailbroken Android devices, the system prompts users to confirm whether to install or uninstall applications for security reasons. However, in some cases, requiring users to confirm the installation of each application adversely affects user experience. For example, when the AnyOffice is uninstalled, all applications installed from the AnyOffice Enterprise App Store are uninstalled automatically. If users have to confirm each application, it would be troublesome. Therefore, silent installation and uninstallation is the better choice Terminal Information Acquirement Besides device control and application management, Huawei devices also provide diversified terminal information acquirement interfaces for the MDM back end to display versatile terminal information, including free memory space, Bluetooth MAC address, Bluetooth matching devices, Bluetooth status, SD card status, IP address, SIM card carrier, and ICC ID. 4.2 MDM Capability Modularization* The SDK is an important component of Huawei AnyOffice mobile security solution. Instead of being an independent component, it is a software package, whose source code is not revealed. However, this component provides API for the upper-layer applications which are developed based on this component. As shown in the following figure, the SDK delivers the following functions: Connects to operating systems, including ios and Android through the abstract layer of Huawei DOPRA platform. 21

26 Shields lower-layer differences between operating systems. Provides uniform encryption/decryption interfaces for upper layers. Is compatible with the secure communication interfaces of the standard SOCKET. Enables the AnyOffice to integrate self-developed and third-party applications, such as the AnyOffice client software, virtual desktop, and third-party application espace Mobile and to encrypt and decrypt local files and data in transit. As mentioned above, enterprises can install the AnyOffice and deploy an SVN or MDM data server to manage mobile devices. Similarly, they can integrate the SDK when developing mobile applications and use the MDM API provided by the SDK to integrate the MDM function to application service flows. For example, MDM compliance checks (such as jailbreak checks and screen-lock password checks) can be integrated into the login to mobile applications. If the checks are failed, the terminal is prevented from accessing the enterprise services (terminals that fail the compliance checks may cause security risks when accessing the intranet). The MDM of other vendors requires the installation of dedicated MDM application software. However, Huawei AnyOffice solution provides the MDM modularization function for enterprises to integrate MDM flexibly into the mobile working solutions of enterprises. For example, some enterprises require the MDM function for deploying mobile working, but they do not want the AnyOffice UI. In this case, the modularization can meet their requirements. Figure 4-1 Framework of the SDK component Application layer Compatible with standard SOCKET / HTTP secure communication interface Security SDK SDK initialization Clean SDK running environment File encryption and decryption File operations Data encryption and decryption Create a VPN encrypted tunnel Protocol encapsulation Data encryption and decryption Network communication Session management Close VPN Encryption tunnel Compatible with systems adaptation interface of different OSs OS layer Hardware layer 22

27 4.3 Seamless Switchover Between Intranet and Extranet Mobile workers may access the intranet from the Internet or intranet using Wi-Fi. Therefore, the mobile working solution must meet the requirements not only on accessing the intranet from both the inside and outside the intranet but also the switchover between the intranet and extranet. For mobile devices to access the intranet from the extranet, the in-built VPN capability enables the AnyOffice client to automatically establish an L4VPN tunnel with the SVN after the users pass the login authentication and MDM compliance checks, so that the users can access intranet service resources, such as and web resources. For mobile devices to access the intranet from inside the intranet, the AnyOffice provides a one-stop Wi-Fi configuration delivery function to automatically deliver the Wi-Fi configuration file and Wi-Fi certificate to the clients after the users pass the login authentication and MDM compliance checks, so that the 802.1X client on the terminals can connect to the enterprise Wi-Fi network based on the configuration. In addition, the AnyOffice provides the environment awareness function, which detects extranet and intranet switchovers and performs specified actions based on the policies delivered by the SVN. For the extranet-intranet switchover, the AnyOffice client automatically terminates the VPN connection and accesses the intranet servers directly to reduce data transmission costs (the AnyOffice client can also continue to use the VPN connection to access intranet resources based on the policy action even if the terminal resides on the intranet). If the terminal switches from the intranet to the extranet, a VPN connection is automatically set up to ensure service continuity. The switchovers are all performed automatically by the AnyOffice client and require no manual intervention (for example, users do not need to reenter the user name and password to log in to the AnyOffice client). The switchovers are seamless, which ensures the quality of user experience. 23

28 5 Mechanism 5.1 Mechanism of ios MDM For an ios device, the MDM function is implemented by the ios device, Apple Push Notification service (APNs), and the MDM data server. The APNs is a service provided by Apple (Apple deploys a service on the Internet in load balancing mode. The destination IP address is subnet /8, and the domain name is gateway.push.apple.com), and the MDM data server is provided by each MDM vendor. In the AnyOffice solution, the SVN functions as the MDM data server. Figure 5-1 Mechanism of MDM on ios devices Firewall Apple Push Notification Service Third-Party MDM Server 1. When a user starts the AnyOffice client for the first time, the AnyOffice management back end delivers the MDM configuration file to the user terminal after the user completes the registration and logs in to the client.the MDM configuration file includes the information about the MDM data server (such as the domain name of the MDM data server) and MDM client certificate. When the user terminal receives the MDM configuration file, a dialog box will be displayed on the terminal screen to notify the user of the impact of installing the MDM configuration file on the terminal and requires the user to confirm whether to install it. 24

29 2. After the user agrees to install the configuration file, the MDM configuration file will be installed on the ios device. 3. The terminal establishes a TLS connection to the APNs and obtains the Device Token of the MDM from the APNs. Then the terminal forwards the UDID and Device Token to the MDM data server for recording, so that subsequent push messages can be forwarded to the correct terminal (UDID uniquely identifies an ios device, and Device Token uniquely identifies an application on the terminal. Here, the Device Token identifies the MDM application). 4. When the MDM data server needs to communicate with an iphone or ipad, the MDM data server sends a notification message (contains the Device Token) to the ios device through APNs. The detailed procedures are as follows: The MDM data server initiates a connection to the APNs and shows its certificate to the APNs to prove its legitimacy (The MDM data server certificate must be applied from the Apple Push Certificates Portal in advance and installed on the MDM data server). After the connection is set up, the MDM data server sends a notification message to the APNs and requires the APNs to wake up the specified ios device. Then APNs forward the message to the device (The APNs only wakes up the device and does not send the detailed MDM command to the device). 5. After receiving the message, the device connects to the MDM data server directly using HTTPS. Then the device obtains the MDM command from the MDM data server and executes the command (such as device locking, data wipe, and reporting application list). In this process, the interactions between the APNs and MDM data server are implemented by the MDM agent of the ios system, not the MDM client software installed on the ios device by the MDM vendor. That is, even without any third-party MDM software, MDM can be performed on the ios devices as long as the MDM configuration file is installed on the ios devices and the MDM data server is deployed. After the MDM function is enabled on the ios device, the MDM agent and APNs maintain a persistent connection, so that the APNs can find the ios device and push messages to it at any time. 25

30 5.2 Mechanism of Android MDM In the AnyOffice solution, the MDM function on the Android devices is implemented by the Android device and the MDM data server. Different from ios devices, Android devices must install the client software of the MDM vendor to implement the MDM function. The AnyOffice client software implements the MDM client function and interacts with the MDM data server (in the current AnyOffice solution, the SVN functions as the MDM data server). The AnyOffice client for Android devices establishes an encrypted L4VPN tunnel with the MDM data server each time and sends keepalive packets over the tunnel to maintain the connection. If the MDM data server needs to interact with an Android devices, the MDM data server must send a notification message to the AnyOffice client over the L4VPN tunnel first. Then the AnyOffice client initiates an HTTPS connection with the MDM data server to obtain and execute the MDM commands (such as device locking, data wipe, and reporting application list) and then reports the execution result to the MDM data server. 5.3 MDM Data Server The MDM data server is a background server to store information related with the AnyOffice client. The information includes: Information about enterprise application programs (such as application icon and size) Assets information Information about installed application programs on the mobile device Mobile application installation package The database accessories include the PC server, server guide CD-ROM, server hard disk (1.2 TB), operating system software (Windows Server 2008 installation CD-ROM), database software (SQL Server 2008 installation CD- ROM), and software installation CD-ROM (the server must run the MDM data server software of the SVN). The operating system and database software must be installed before delivery, but the MDM data server software program must be installed by users. 26

31 As shown in the following figure, the MDM data server contains a tomcat server, file server, and database software. They can be installed on the same or different PC server. Figure 5-2 Interaction between the device/nms, SVN, and MDM data server Network Management IOS Terminal Android Terminal AnyOffice Gataway Other MDM Module Apache+tomcat load balancing & tomcat clustering Apache DB Server DB Server DB Server MDM Data Server Apk Files Plist Files Ipa Files File Server Icons Icons DB In daily service interactions, the MDM data server interacts with the AnyOffice client, SVN, and the sweb of the SVN. The AnyOffice client and the sweb do not directly interact with the MDM data server. They use the SVN to forward access requests and replies. The SVN and MDM data server perform bidirectional certificate authentication with each other before setting up a connection. After the authentication succeeds, an HTTPS connection is established for follow-up data exchange. Use application query as an example. A user opens the app store on the AnyOffice client and clicks the icon of a certain application to view its details. The AnyOffice client sends the query request to the SVN. The SVN transparently forwards the request to the MDM data server. Then the MDM data server analyzes the request and returns the result to the SVN. The SVN transparently forwards the result to the AnyOffice client. Then the AnyOffice client displays the result to the user. * Later versions of Huawei AnyOffice security solution will support the function marked with "*". 27

32 Copyright 2014 Huawei Technologies Co., Ltd. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are the property of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The product, service, or feature that you purchase should be restricted by the Huawei commercial contract and the clauses in the contract. All or a part of products, services, or features described in this document may not be purchased or used. Every effort has been made in the preparation of this document to ensure the accuracy of the contents, but the statements, information, and recommendations in this document do not constitute a warranty of any kind, expressed or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure the accuracy of the contents, but the statements, information, and recommendations in this document do not constitute a warranty of any kind, expressed or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen People's Republic of China Website: support@huawei.com

HUAWEI TECHNOLOGIES CO., LTD. Huawei AnyOffice Mobile Security Solution

HUAWEI TECHNOLOGIES CO., LTD. Huawei AnyOffice Mobile Security Solution HUAWEI TECHNOLOGIES CO., LTD. 1 2 1 Overview In 2012, 20% of global employees brought their own mobile devices to work, such as the iphone, ipad, or Android based devices. Along with huge IT consumption,

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time. SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

iphone in Business Mobile Device Management

iphone in Business Mobile Device Management 19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei BYOD Security Solution

HUAWEI TECHNOLOGIES CO., LTD. Huawei BYOD Security Solution HUAWEI TECHNOLOGIES CO., LTD. Huawei BYOD Security Solution Huawei BYOD Security Solution 1 Overview In 2012, about 20% of enterprise employees bring their own iphones, ipads, or Android phones into offices

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Kaspersky Security for Mobile Administrator's Guide

Kaspersky Security for Mobile Administrator's Guide Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

BEYOND LIMITATIONS CONNECTING POSSIBILITIES

BEYOND LIMITATIONS CONNECTING POSSIBILITIES BEYOND LIMITATIONS CONNECTING POSSIBILITIES Huawei Enterprise BYOD Solution CONNECTING BUSINESS OPPORTUNITIES IN Trend 470 million 1.2 billion 35% In 2011, intelligent mobile terminals surpassed PCs in

More information

ios Enterprise Deployment Overview

ios Enterprise Deployment Overview ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE Mobile Device Management, User Guide Copyright 2013, CommuniTake Technologies Ltd., Yokneam, Israel. All rights reserved. For a hard-copy

More information

Sophos Mobile Control Technical Guide. Product version: 3

Sophos Mobile Control Technical Guide. Product version: 3 Sophos Mobile Control Technical Guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Integration...5 3 Architecture...7 4 Workflow...12 5 Directory Access...14

More information

ManageEngine Desktop Central. Mobile Device Management User Guide

ManageEngine Desktop Central. Mobile Device Management User Guide ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11 Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia

More information

Sophos Mobile Control Technical Guide. Product version: 3.5

Sophos Mobile Control Technical Guide. Product version: 3.5 Sophos Mobile Control Technical Guide Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 Integration...5 3 Architecture...7 4 Workflow...13 5 Directory Access...16

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

System Configuration and Deployment Guide

System Configuration and Deployment Guide System Configuration and Deployment Guide This guide provides information on...... Configuring an Organization using the Organization Wizard... Setting a default Policy Suite using the Organization Wizard...

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

McAfee Enterprise Mobility Management

McAfee Enterprise Mobility Management Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers

More information

Windows Phone 8.1 Mobile Device Management Overview

Windows Phone 8.1 Mobile Device Management Overview Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Zenprise Device Manager 6.1.5

Zenprise Device Manager 6.1.5 Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014 Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts

More information

Introduction to the Windows Phone 8 Guide

Introduction to the Windows Phone 8 Guide Introduction to the Windows Phone 8 Guide Overview Windows Phone 8 is Microsoft's operating system designed for smartphones and shares the Modern UI with other Windows 8 devices. Windows Phone 8 offers

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Addressing NIST and DOD Requirements for Mobile Device Management

Addressing NIST and DOD Requirements for Mobile Device Management Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW

More information

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security 10 for Mobile Implementation Guide Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Version 1.3. Kaspersky Lab www.kaspersky.com FOR INTERNAL USE ONLY

Version 1.3. Kaspersky Lab www.kaspersky.com FOR INTERNAL USE ONLY Version 1.3 Kaspersky Lab www.kaspersky.com Table of Contents Chapter 1. Kaspersky MDM for Exchange ActiveSync... 2 1.1 Access to Corporate Resources... 2 1.2 Exchange ActiveSync Profiles... 2 1.3 Managing

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

HUAWEI 9000 HD Video Endpoint V100R011. Security Maintenance. Issue 02. Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI 9000 HD Video Endpoint V100R011. Security Maintenance. Issue 02. Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD. V100R011 Issue 02 Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent

More information

Corporate-level device management for BlackBerry, ios and Android

Corporate-level device management for BlackBerry, ios and Android B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and

More information

Default Policy Settings ZENworks Mobile Management 2.7.x

Default Policy Settings ZENworks Mobile Management 2.7.x www.novell.com/documentation Default Policy Settings ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

User Guide. Version R92. English

User Guide. Version R92. English Enterprise Mobility Management User Guide Version R92 English October 23, 2015 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Use of tablet devices in NHS environments: Good Practice Guideline

Use of tablet devices in NHS environments: Good Practice Guideline Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood

More information

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Mobile Device Manager. Windows User Guide (Windows Phone 8/RT)

Mobile Device Manager. Windows User Guide (Windows Phone 8/RT) Mobile Device Manager Windows User Guide (Windows Phone 8/RT) Document Revision Date: Oct. 22, 2014 Mobile Device Manager Windows Phone 8 User Guide i Contents Windows Phone 8 Features Matrix... 1 Overview...

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

Endpoint Security VPN for Mac

Endpoint Security VPN for Mac Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

PMDP is simple to set up, start using, and maintain

PMDP is simple to set up, start using, and maintain Product Datasheet IBELEM, SA ITS Group - 5, boulevard des Bouvets 92741 Nanterre Cedex - FRANCE Tel: +33(0)1.55.17.45.75 Fax: +33(0)1.73.72.34.08 - www.ibelem.com - info@ibelem.com PMDP is simple to set

More information

iphone in Business How-To Setup Guide for Users

iphone in Business How-To Setup Guide for Users iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Sophos Mobile Control Technical Guide. Product version: 3.6

Sophos Mobile Control Technical Guide. Product version: 3.6 Sophos Mobile Control Technical Guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...3 2 Integration...5 3 Architecture...7 4 Workflow...13 5 Directory Access...16

More information

Mobile Configuration Profiles for ios Devices Technical Note

Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

User Guide. Version R9. English

User Guide. Version R9. English Enterprise Mobility Management User Guide Version R9 English June 24, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information