THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers. December 13, 2012 Telephone Seminar/Audio Webcast

Size: px
Start display at page:

Download "THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers. December 13, 2012 Telephone Seminar/Audio Webcast"

Transcription

1 1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Android Apps for Lawyers Cosponsored with the ABA Law Practice Management Section December 13, 2012 Telephone Seminar/Audio Webcast Android Apps for Lawyers By Britt Lorish Affinity Consulting Group, LLC Roanoke, Virginia David G. Ries Thorp Reed & Armstrong, LLP Pittsburgh, Pennsylvania Daniel J. Siegel Law Offices of Daniel J. Siegel LLC Havertown, Pennsylvania

2 2 ANDROID APPS FOR LAWYERS December 2012 Adapted from course materials prepared Britt Lorish for ABA TECHSHOW Updated by Dave Ries and Dan Siegel. Introduction Google s Android operating system has quickly become the dominant system used to operate smartphones other than BlackBerrys, iphones and Windows phones, and its share of the tablet market is also increasing. In recent months we have seen the release of the Google Nexus tablet, the Galaxy SIII and HTC Droid DNA smartphones, and the Kindle HD. All of these devices run on Android and have received glowing reviews from critics and users. According to International Data Corporation, the Android operating system was included on three out of every four smartphones shipped during the third quarter of Out of the million smartphones made in that quarter, 136 million ran on Android. Not surprisingly, the number of apps that is, software programs that run on the Android operating system has also grown, to more than 700,000 as of October Android use among lawyers and their staffs continues to grow and will expand as the number of apps increases, particularly those that help attorneys to be more productive. The increased use of Android devices by the legal profession also means that attorneys are purchasing these devices and bringing them to IT and saying: Make this work for me with the firm s technology. Fortunately, that request is becoming more of a reality. What is a Droid? While there has been significant focus on the itoys (iphones and ipads), the Droid has also seen a tremendous growth over the past two years. Droid is short for Android, a term coined (and licensed) by George Lucas of Star Wars fame. The Droid is actually an operating system (OS) not a device. More importantly, it is based on an open source code, which means that multiple contributors have created this operating system under the Open Handset Alliance, under the direction of Google. Because of this movement, Droid has a very close integration with everything Google. There are several interesting comparisons between the Droid and the iphone: The Droid OS is open source code, while the iphone OS (ios) is proprietary. There are more than 40 manufacturers of smart phones that utilize the Droid OS; Apple manufacturers the iphone. There are roughly 800,000 apps available for the Droid; there are roughly 700,000 apps available for the iphone.

3 3 The Droid OS holds approximately 58% of the market; Apple about 33%; BlackBerry about 3%; and Windows Mobile the bulk of the rest. What is an App? An app is merely a computer program that works on one of these devices, and is analogous to the software/programs that run on your own computer. Where do I finds apps? For the Droid, there are several places, although two sources Google Play and the Amazon Appstore for Android dominate the market. Sometimes, you can buy an app from either source, although both have their positives and negatives. In most cases, you can simply purchase apps (even when apps are free, you still have to buy them) directly from your device. There are plenty of free apps, but most of the apps that charge a fee are minimal when compared to software costs for the PC applications. One prerequisite to buying apps from either store, and most websites, is that you need to have an account at the website. Most Android devices will require you to have a Google address just to use the device, and most users choose to use that address as the default for device-related purchases. Regardless of the site from which you obtain your apps, you should be careful to assure that none includes any viruses or malware. Security? Attorneys have an ethical and a legal duty to take competent and reasonable measures to safeguard confidential client information; in addition, they may be subject to other 2

4 4 duties to protect this data, including statutes, regulations and contracts. Thus, the obligation to protect client data applies to the use of smartphones and other mobile devices, which can be lost or stolen, hacked, infected by malware, and have their communications intercepted all exposing confidential data. Consequently, you should (a) follow the device manufacturer s instructions for secure setup, (b) use security apps that have anti-virus and anti-malware protection, and (c) use apps that allow for remote wiping if your Droid if lost. A popular security app, Lookout Mobile Security, is discussed on page 16. We also recommend backing up your device; there are a number of apps that will allow for scheduled backups of your device online. Secure Set-Up Set Screen Lock. (with password or PIN or swipe pattern) Set Screen Timeout. Encrypt Phone / Tablet. (Honeycomb / Ice Cream Sandwich / Jellybean only) (Use 3 rd party app with earlier versions) Add find / lock / wipe app. Add security app. Some of Our Favorite Apps So what are our favorite apps? Well, we thought you would never ask! This whole program is about Android Apps for Attorneys. So, without further adieu, here is our list: Cloud Storage Products Dropbox, the most popular cloud storage app, integrates with numerous other apps and programs, including cloud-based case management and document management programs. Dropbox lets desktop and laptop users store information and automatically syncs files among computers. 3

5 5 For more general use, Amazon Cloud is an easy and inexpensive way to store data, including documents and photos, on Amazon s servers, so that you can access them anywhere. There has been considerable discussion about confidentiality and security in attorneys use of cloud services. Before using them for information relating to clients, be sure to understand the risks and take necessary measures for security. For recent examples of ethics opinions in this area, see Massachusetts Bar Association Ethics Opinion and Pennsylvania Bar Association Ethics Opinion Pogoplug, a private cloud, provides the ability to store large amounts of data while maintaining full control of your firm s data. 4

MobileConnect. Getting Started Guide

MobileConnect. Getting Started Guide MobileConnect Getting Started Guide 1 Table of Contents Compatible Device List! 3 Operating Systems, Applications, & Personal Computer Devices:! 3 Mobile Devices & Mobile Operating Systems:! 3 Setting

More information

Smart Ideas for Smartphone Security

Smart Ideas for Smartphone Security Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone

More information

Getting Familiar With Android

Getting Familiar With Android Getting Familiar With Android Who is behind the Android OS (Operating System)? 1 Google Search Google Maps Google Chrome Google Shopper Google Drive Google Calendar Google Translator Gmail Youtube Hangouts

More information

Mobile Operating Systems & Security

Mobile Operating Systems & Security Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens

More information

Taking Your Android. Tablets to the Max. Apress. Russell Holly

Taking Your Android. Tablets to the Max. Apress. Russell Holly Taking Your Android Tablets to the Max Russell Holly Apress Contents Contents at a Glance About the Author About the Technical Reviewer Introduction... Hi viii ix x Chapter 1: Why Android? Which Android?

More information

Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co

Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co Bring Your Own Device Bring Your Own Data? Thursday 10th April 2014 Dai Davis Solicitor and Chartered Engineer Partner, Percy Crow Davis & Co Tel: 07785 771 721 E-mail: mail@daidavis.com Overview BYOD

More information

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.

McAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always. McAfee Multi Access from ø Step-by-step guide to protecting your devices. Always. Contents 3 Welcome to McAfee Multi Access 5 Setting up your Windows PC Setting up McAfee Multi Access on your Windows PC

More information

Encryption Made Simple for Lawyers

Encryption Made Simple for Lawyers Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important

More information

Quick View. Folder Details

Quick View. Folder Details Quick View You MUST be logged in to access any information inside the IONU system. If you aren t logged in, you will not see the folders and the data and files cannot be accessed and decrypted. All files,

More information

MOBILE DEVICE MANAGEMENT (MDM)

MOBILE DEVICE MANAGEMENT (MDM) PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization

More information

Access All Your Files on All Your Devices

Access All Your Files on All Your Devices d Access All Your Files on All Your Devices The Best Performance, Features and Price for Private cloud storage for all platforms Windows, Mac, Linux, ios, Android, Blackberry & more Enterprise Private

More information

Bring Your Own Device Policy

Bring Your Own Device Policy Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be

More information

Safe-Guarding Client Information Basic Data Security Training for Lawyers

Safe-Guarding Client Information Basic Data Security Training for Lawyers Safe-Guarding Client Information Basic Data Security Training for Lawyers Sponsored by the Law Practice Management Committee of The New York State Bar Association John R. McCarron Jr, Esq. Partner, Montes

More information

IONU PRO Product Overview

IONU PRO Product Overview Quick View ü You MUST be logged in to access any information inside the IONU system. If you aren t logged in, you will not see the folders and the data and files cannot be accessed and decrypted. ü All

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

Organizing Electronic Documents and Records in Cloud-Based Systems (5-4) K.J. McCorry

Organizing Electronic Documents and Records in Cloud-Based Systems (5-4) K.J. McCorry Organizing Electronic Documents and Records in Systems (5-4) K.J. McCorry Organizing Electronic Documents and Records in Systems Presented by: K.J. McCorry Officiency, Inc. www.officiency.com 1 Your Content

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

How to Successfully Roll Out an Android BYOD Program

How to Successfully Roll Out an Android BYOD Program How to Successfully Roll Out an Android BYOD Program Nathan Steuer, Director of Mobility Solutions Ann Marie Cullen, Advisory Services Manager Global Computing Platform Market Share! 1Billion! Android

More information

Mobiliti. Certified Device List MR5 Release. Last Updated November 21, 2014 - ASP Version

Mobiliti. Certified Device List MR5 Release. Last Updated November 21, 2014 - ASP Version Certified Device List MR5 Release Last Updated November 21, 2014 - ASP Version 2011-2014, Inc. or its affiliates. All rights reserved. This work is confidential and its use is strictly limited. Use is

More information

CSC E Mail. Mobile Device Configuration Settings and Setup Instructions

CSC E Mail. Mobile Device Configuration Settings and Setup Instructions CSC E Mail Mobile Device Configuration Settings and Setup Instructions Contents Overview... 3 Android (Droid, Google Android, etc.)... 4 Exchange Settings... 4... 4 RIM Blackberry... 5... 5 Apple iphone

More information

Codeproof Mobile Security & SaaS MDM Platform

Codeproof Mobile Security & SaaS MDM Platform Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,

More information

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist

CNJG Annual Meeting Pre-Meeting Workshop. Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist CNJG Annual Meeting Pre-Meeting Workshop Presentors: David Binder, Dir., IT Don Debias, Help Desk Mgr. John Bednar, Sr. Help Desk Specialist Agenda Overview of current state of technology Hardware Software

More information

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. We put this document together to help you understand

More information

TELUS Business Connect Meeting User Guide. Video Conference. Web Share.

TELUS Business Connect Meeting User Guide. Video Conference. Web Share. TELUS Business Connect Meeting User Guide Video Conference. Web Share. Table of Contents 3 System requirements 4 Download & Install 6 Meet: Host a Meeting 8 Join a Meeting as participant 9 Invite participants

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

IONU BETA USER MANUAL IONU Security, Inc.

IONU BETA USER MANUAL IONU Security, Inc. 2014 IONU BETA USER MANUAL IONU Security, Inc. Contents IONU Solution Intro... 3 Account Installation Process... 4 Account Creation - Windows... 5 Inviting Others... 6 IONU Secure File System... 7 Storage

More information

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite. White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table

More information

Smartwatch Security Research

Smartwatch Security Research Smartwatch Security Research Overview This report commissioned by Trend Micro in partnership with First Base Technologies reveals the security flaws of six popular smartwatches. The research involved stress

More information

Cloud Computing for Education Workshop

Cloud Computing for Education Workshop Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability

More information

Best practices for introducing tablets in your enterprise

Best practices for introducing tablets in your enterprise E-Guide Best practices for introducing tablets in your enterprise Everyone is buzzing about tablets right now, but how can you tell if this technology makes sense for your organization? This expert e-guide

More information

Washwood Heath Academy Use by staff of private communication devices policy

Washwood Heath Academy Use by staff of private communication devices policy As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of

More information

Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology

Guidelines. London School of Economics & Political Science. Remote Access and Mobile Working Guidelines. Information Management and Technology London School of Economics & Political Science Information Management and Technology Guidelines Remote Access and Mobile Working Guidelines Jethro Perkins Information Security Manager Summary This document

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

Android support for Microsoft Exchange in pure Google devices

Android support for Microsoft Exchange in pure Google devices Android support for Microsoft Exchange in pure Google devices Note: The information presented here is intended for Microsoft Exchange administrators who are planning and implementing support for any of

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

Perception and knowledge of IT threats: the consumer s point of view

Perception and knowledge of IT threats: the consumer s point of view Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

SA Series SSL VPN Virtual Appliances

SA Series SSL VPN Virtual Appliances SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by

More information

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü

More information

Android 4.0.4 Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies

Android 4.0.4 Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies Android 4.0.4 Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies Overview Requirements Supported Information Services Supported Security Policies Require password Require

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Mobility at Northwestern

Mobility at Northwestern NUIT Tech Talk Mobility at Northwestern February 16, 2010 Matt Gruhn Distributed Support Specialist Today s Agenda Popular Mobile Devices iphone/ipod Touch BlackBerry Android Devices Tablets, Netbooks,

More information

The Need for BYOD Mobile Device Security Awareness and Training

The Need for BYOD Mobile Device Security Awareness and Training The Need for Awareness and Training Completed Research Paper Mark A. Harris University of South Carolina maharris@hrsm.sc.edu Karen Patten University of South Carolina pattenk@hrsm.sc.edu Elizabeth Regan

More information

Mobile Security Standard

Mobile Security Standard Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: itsecurity@contacts.bham.ac.uk Mobile Security Standard

More information

Exchange ActiveSync (EAS)

Exchange ActiveSync (EAS) Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,

More information

Neat Cloud Service + Mobile App

Neat Cloud Service + Mobile App Getting Started with Neat Cloud Service + Mobile App Neat transforms paper and electronic documents into organized digital files that are easy to find, use, and share. Neat Cloud Service and Mobile App

More information

Backing up your digital image collection provides it with essential protection.

Backing up your digital image collection provides it with essential protection. Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.

More information

IceBreak FileShare. Quick Guide. File sharing with workflow management

IceBreak FileShare. Quick Guide. File sharing with workflow management IceBreak FileShare Quick Guide File sharing with workflow management on IBM i 2 IceBreak FileShare Content IceBreak FileShare... 3 Features... 4 Requirements... 6 Limitations... 6 Test sites... 6 Install

More information

Cell Phone Operating Systems

Cell Phone Operating Systems Cell Phone Operating Systems The first smartphone was the IBM Simon and was designed in 1992. The phone themselves have changed. The most important changes are in the Operating System (OS) Operating Systems

More information

Ecommerce Quarterly EQ2 2012. a publication from

Ecommerce Quarterly EQ2 2012. a publication from Ecommerce Quarterly EQ2 2012 a publication from Contents About the EQ 3 Battle of the Giants: Apple vs. Google 5 Social Media Cheapskates 9 Who s Really Winning the Browser War? 12 Benchmark Reports 14

More information

MobileLink User Guide

MobileLink User Guide MobileLink User Guide April 2013 Table of Contents Section MobileLink Overview Section 1 MobileLink Features Section 2 Enterprise Search Directory Section 2.1 Call History Section 2.2 Service Management

More information

Mobile Device Security

Mobile Device Security Mobile Device Security Through no fault of your own, your company has become 2-3x more exposed to data breaches and loss. How? Through mobile devices. The same tools that are enhancing the way your employees

More information

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices Daniel V. Hoffman, CISSP, CEH, CHFI Chief Technology Officer Page 1 Global Threat Center Exploit Research and Development

More information

1:1 ipad Program Device Setup Guide

1:1 ipad Program Device Setup Guide 1:1 ipad Program Device Setup Guide BYOD ipad Setup Guide Backup Your ipad Setting up icloud Backup Backing up your child s ipad is important. If your ipad is malfunctioning or missing schoolwork can be

More information

Cloud Managed Printing

Cloud Managed Printing Cloud Managed Printing Driverless Printing ezeep for desktop is a virtual print driver for Mac and Windows. It enables users to print to any printer right from their desktop applications without the need

More information

Supported Operating Systems and Browsers Phone Channel

Supported Operating Systems and Browsers Phone Channel Supported Operating Systems and Browsers Phone Channel Supported Operating Systems The following statements outline the scope of Mobiliti s general device and operating system support. Only devices explicitly

More information

Discovering Computers

Discovering Computers Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

BADA platform, 16 Bookworm, tablet user, 28 29 Bootloader, 4 Browser, Google account creation from, 41, 42 Bugdroid, 4

BADA platform, 16 Bookworm, tablet user, 28 29 Bootloader, 4 Browser, Google account creation from, 41, 42 Bugdroid, 4 Index A Accounts & Sync, 122 Additional ports, in tablet, 34 Adobe Photoshop Express app, 96, 97 ADW Launcher, 160, 164 Honeycomb, resetting defaults in, 165 Honeycomb, selection screen in, 161 ADW Launcher

More information

Joseph Guarino Owner/CEO/Sr. Consultant Evolutionary IT CISSP, LPIC, MCSE 2000, MCSE 2003, PMP www.evolutionaryit.com

Joseph Guarino Owner/CEO/Sr. Consultant Evolutionary IT CISSP, LPIC, MCSE 2000, MCSE 2003, PMP www.evolutionaryit.com Cloud Computing A Plain English Introduction to the Cloud Joseph Guarino Owner/CEO/Sr. Consultant Evolutionary IT CISSP, LPIC, MCSE 2000, MCSE 2003, PMP www.evolutionaryit.com Objectives Explore what the

More information

Novell Filr. Mobile Client

Novell Filr. Mobile Client Novell Filr Mobile Client 0 Table of Contents Quick Start 3 Supported Mobile Devices 3 Supported Languages 4 File Viewing Support 4 FILES THAT CANNOT BE VIEWED IN THE FILR APP 4 FILES THAT GIVE A WARNING

More information

Evolving in the global digital scenario. Politecnico di Torino

Evolving in the global digital scenario. Politecnico di Torino Evolving in the global digital scenario Claudio G. Demartini Claudio G. Demartini Politecnico di Torino Trends: Time Machine Before Now http://www.baekdal.com/analysis/market-of-information 29/10/2013

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

SmarterMail 9.x and Microsoft Exchange: An End User Comparison

SmarterMail 9.x and Microsoft Exchange: An End User Comparison SmarterMail 9.x and Microsoft Exchange: An End User Comparison Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2012 SmarterTools Inc.

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Security for the Road Warrior

Security for the Road Warrior Security for the Road Warrior Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Version 1.1 We are all mobile We all travel from home to campus or from

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

GoToMyPC reviewer s guide

GoToMyPC reviewer s guide GoToMyPC reviewer s guide Citrix GoToMyPC reviewer s guide Thank you for evaluating Citrix GoToMyPC. This guide will introduce you to the current GoToMyPC functionality and help you effectively evaluate

More information

Google Drive @ Holy Family University

Google Drive @ Holy Family University Google Drive @ Holy Family University A Hard Drive in the Cloud. Access & share anything everywhere Google Docs has been retired and replaced by Drive. And if you are familiar with Google Docs, Google

More information

Creating A Data-Safe Employee Mobile Device Policy

Creating A Data-Safe Employee Mobile Device Policy Creating A Data-Safe Employee Mobile Device Policy Building a Defensive Strategy To Protect Sensitive Data By Daniel B. Garrie, Esq. March 2014 Mobile digital devices are not exempt from the rapid increase

More information

About Us. About Joey & Craig. Two technology enthusiasts...

About Us. About Joey & Craig. Two technology enthusiasts... About Joey & Craig Two technology enthusiasts... 2 About Us We share the same birthday, and we both have been blessed with 3 awesome children, and wives who put up with our crap. We have known each other

More information

Operating Systems/Supported Browser Chart _

Operating Systems/Supported Browser Chart _ Operating Systems/Supported Browser Chart _ Operating Systems Certified/Supported Operating Systems Windows 7 Windows 8 Not Supported Windows XP Mac OS 10.6 Windows 8.1 WindowsVista Mac OS 10.7 Mac OS

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works

Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered

More information

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting

More information

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov

Introduction to Dropbox. Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox Jim Miller, LCITO Office 785.296.5566 Mobile 913.484.8013 Email jim.miller@las.ks.gov Introduction to Dropbox What is it? Why use it? Mitigating the risks of using Dropbox? Dropbox

More information

Division of Information Technology Lehman College CUNY

Division of Information Technology Lehman College CUNY Division of Information Technology Lehman College CUNY Using Lehman s Secure Outgoing (SMTP) Server Updated April 16, 2013 Are you able to receive your Lehman email on your smart phone, laptop or tablet

More information

Mobile Devices Using Without Losing

Mobile Devices Using Without Losing Mobile Devices Using Without Losing Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Tech Briefing 30March 2012 We all have mobile devices iphones,

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Evolving in the global digital scenario. Politecnico di Torino

Evolving in the global digital scenario. Politecnico di Torino Evolving in the global digital scenario Claudio G. Demartini Claudio G. Demartini Politecnico di Torino ECDL Foundation Philadelphia Dublin Brussels Cairo Dubai Singapore Over 13 Million ECDL Candidates

More information

The Genealogy Cloud: Which Online Storage Program is Right For You Page 1 2012, copyright High-Definition Genealogy. All rights reserved.

The Genealogy Cloud: Which Online Storage Program is Right For You Page 1 2012, copyright High-Definition Genealogy. All rights reserved. The Genealogy Cloud: Which Online Storage Program is Right For You Thomas MacEntee, of High-Definition Genealogy http://hidefgen.com hidefgen@gmail.com Clouds in Genealogy? What is the Genealogy Cloud?

More information

EasiShare Whitepaper - Empowering Your Mobile Workforce

EasiShare Whitepaper - Empowering Your Mobile Workforce Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

The Future of Mobile Device Management

The Future of Mobile Device Management The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table

More information

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal

More information

AUT OneDrive for Business. Instructions for Using OneDrive on Windows Platform

AUT OneDrive for Business. Instructions for Using OneDrive on Windows Platform AUT OneDrive for Business Instructions for Using OneDrive on Windows Platform Contents 1 What s OneDrive for Business?... 3 2 Storing Files... 5 1.1 Saving and Opening files from your Office applications...

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

EXTENDING ORACLE WEBCENTER TO MOBILE DEVICES: BANNER ENGINEERING SUCCEEDS WITH MOBILE SALES ENABLEMENT

EXTENDING ORACLE WEBCENTER TO MOBILE DEVICES: BANNER ENGINEERING SUCCEEDS WITH MOBILE SALES ENABLEMENT EXTENDING ORACLE WEBCENTER TO MOBILE DEVICES: BANNER ENGINEERING SUCCEEDS WITH MOBILE SALES ENABLEMENT Kellie Christensen, Banner Engineering ABSTRACT This white paper details Banner Engineering successful

More information

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps September 9 11, 2013 Anaheim, California SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps Susan Beyer NTT DATA, Inc. Agenda What is the whole buzz about Mobility? How to expand your BPC footprint

More information

The. C s. of Mobile Device. Management

The. C s. of Mobile Device. Management The AB C s of Mobile Device Management Hundreds of models, multiple carriers, OSs from Gingerbread to Jelly Bean Android fragmentation is scary for IT, but it s far from a problem with Mobile Device Management

More information