Automated Actions. Table of Contents

Size: px
Start display at page:

Download "Automated Actions. Table of Contents"

Transcription

1 Automated Actions With Automated Actions, you can configure ZDM to execute actions based on user or device properties, events, or the existence of applications on devices. For example, you can configure the following actions to occur automatically in these situations: Ensure that user who have jailbroken or rooted their ios or Android devices get notified that they have breached company policy and that their devices will be selectively wiped if they do not bring their devices into compliance. Enforce a geo-fencing policy whereby if a user's device leaves a defined geographical perimeter, their device will be blocked from accessing corporate , selectively wiped, and/or revoked. Alert your users when their mobile devices are roaming domestically or internationally and that they may be charged extra for their service. Selectively wipe a user's device when they leave the company (their Active Directory account becomes disabled) so that they can no longer access corporate data. Place a user's device into an 'Out Of Compliance' state if the user installs a blacklisted app and send the user a notification informing them they have broken company mobile app policy. Note: Before you can use Automated Actions to send automated notifications, make sure you have configured Notifications Servers for SMTP and SMS so your message will be sent. Table of Contents 1. Table of Contents 2. Automated Action in a Nutshell 2.1. Automated Actions Caveats Location Services-Based Automated Action Triggers Why Are Some Notifications Not Being Sent? 2.2. Trigger Types Trigger Type Examples 2.3. Types of Automated Actions 2.4. Automated Actions Example - Blacklisted App Notification 2.5. Configure Notification Template System Macros in Automated Actions

2 2.6. Create a Blacklist for Words with Friends Free 2.7. Create an Automated Action to Notify User When Blacklisted App Installed 2.8. Deploy Automated Actions to Device 2.9. Notification Upon Install of Blacklisted App on IOS Device 3. Troubleshooting Automated Actions 4. Show Automated Actions Executions 5. Compliance with Automated Actions 5.1. Automated Action Deployment Package Naming/Ordering Recommended Deployment Package Ordering Example Compliance Reset Automated Action - Named 'aaa-ooc-reset' Location Services Automated Action - Named 'aab-location-services-disabled' Blacklisted App Automated Action - Named 'aac-blacklisted-app' Jailbreak Automated Action - Named 'aad-jailbreak'' Deployment Package Ordering Compliance Reset Deployment Package: Named '0-aaa-OOC-RESET' Location Services Deployment Package: Named '0-aab-location-services-disabled' Blacklisted App Deployment Package: Named '0-aac-blacklisted-app' Compliance Deployment Packages in Proper Order Automated Action in a Nutshell This example illustrates a simple automated Action inside ZDM that is configured to set a user's device as Out Of Compliance if a specific app (Facebook) is installed on it that violates company mobile app policy.

3 Automated Actions Caveats Before you start using Automated Actions, consider the following: Important! If devices are shared between two users, and you want to re-enroll the device to the another user, make sure that you delete the device entry from the ZDM Devices tab before enrolling the second user. Automated Actions are only triggered when a device connects to ZDM. For example, a notification will not be sent to a device until the device attempts a connection back to the server, or an AS connection is attempted by the user (for example, if a device is being blocked by the SMG) Automated Actions can be deployed to anonymous devices if the package is set to be deployed to anonymous users. The Notify (SMTP/SMS) Automated Actions can not be performed on anonymous (unauthenticated) users. Automated Actions cannot be executed on devices that are unmanaged (have been revoked, selective wiped, or not-enrolled) with the exception of the Notification and Set as Out Of Compliance actions. The Out Of Compliance action will keep a device in that state until another action explicitly changes the state of the Out Of Compliance property. The SMG block notification cannot be executed on an un-enrolled device. If you are using Automated Actions to detect when ios device users have disabled their location servers, e.g., you want to send a notification or selectively wipe or revoke a device when a user disables their device's location services, you need to be sure that you enable the "Report if location services are disabled" option when configuring an ios Geo-tracking policy. If you want to create an action based upon a user whose Active Directory account has been disabled, then use the Event Trigger named 'AD Disabled User' to trigger the Action.

4 Automated Actions and Notification Templates If you create custom Notification templates of the following type - Out of Compliance' and AD Disabled User these templates will not visible to select for Automated Notification. Location Services-Based Automated Action Triggers If you want to use the following device events - Location perimter breach and Location services disabled - to trigger an Automated Action, then be sure to do the following: 1. In the ios Location Services Policy dialog, make sure you check the option named 'Report if location services are disabled'. 2. Configure the Automated Action using a location service trigger, such as Location services disabled.

5 3. Connect to the device by sending a Location-based request, for example, Locate or Enable Tracking: Why Are Some Notifications Not Being Sent? Any ZDM-managed devices that are currently blocked by SMG, notifications will not be sent to those devices until those users initiate an Active Sync activity such as receiving an , or if the device syncs with Exchange Recurring Notifications will sometimes be a delayed due to the original event that causes the notification to be sent. For example, you might have a recurring notification being sent every one hour, but the notifications are not being received. Recurring notification will not be sent until configured trigger occurs again after Repeated Wait is expired. There is a default one hour wait period for Event-based triggers. Trigger Types Triggers are the states or events or properties that cause an automated action to occur. There are four categories Triggers, each of which contain multiple types: Device Property, User Property, Applications, Event. Trigger Type Examples Device Property Useful device properties you can use as triggers for automated actions:

6 Jailbroken or Rooted. If a user jailbreaks their devices, you can set an action to notify the user and if the user does not undo the jailbreak in a given amount of time, selectively wipe the device. Out Of Compliance: If a device is put into a state of being out of compliance, you can block that device from the SMG (and thus corporate ) and notify the user. Passcode compliant. If this trigger's condition is false, then you can set the device to Out Of Compliance or selectively wipe the device. Perimeter Breach: If the device leaves the geo-perimeter defined in an ios geo-fencing policy, this condition can set and used to notify the user, wipe the device, and so on. Many more: Look in the Automated Actions dialog to view all user properties. Useful user properties you can use as triggers for automated actions: User Property AD failed login attempts: If an Active Directory (AD) user attempts to log in more times that allowed, you can notify the user that they will have to wait a certain time period before they can try to log in again. Many more: Look in the Automated Actions dialog to view all user properties. Applications This trigger allows you to specify whether or not an app is installed on a device, by name, and then set an appropriate action such as notify or set the device as out of compliance. The following system events can be used as triggers in automated actions: Event SMG block: A user's device has been blocked by the Secure Mobile Gateway (SMG) and the device has lost access to corporate . Device unmanaged: The device has lost its ability to connect to and communicate with (and thus be managed by) the ZDM server. Device jailbroken: A user has broken the ios user agreement and warranty in order to install unauthorized software. Device not blacklist/whitelist app compliant: A user's device breaks an app blacklist or whitelist policy, you can choose an action to perform. Device revoked: The device has lost ability to connect to the ZDM server. Device international roaming: A user's device has started internationally roaming. Device domestic roaming: A user's device has started domestic roaming. Location perimter breach: A user's device has gone outside of Location services disabled: A user's device has had its location services disabled. AD-Disabled User If the user's Active Directory account has been disabled. E.g., when an employee leaves a company.

7 Types of Automated Actions The following list details the types of actions you can configure to occur automatically based on trigger type. Selective Wipe: Clears corporate data from the device while retaining personal information and selected settings. The MDM profiles and all packages pushed by Device Manager to the device are removed. The device can, however, be re-enrolled at a future time. Revoke: Revoking a device prohibits any further connection from the device. If the device attempts to connect to Device Manager, the MDM profile and all packages deployed to the device are removed. The device is barred from re-enrollment unless it is re-authorized by an administrator. Set as Out Of Compliance: The device will be given a property named Out of Compliance and will set it to True. When a device is Out Of Compliance (has this property set to true), then it appears as Out of Compliance on the Dashboard Alerts widget. Automated Actions Example - Blacklisted App Notification This example illustrates a basic example of using ZDM Automated Actions to set up an automatic notification to let a user know that they have installed a blacklisted app on their device. Most companies that manage user devices want to be sure that a work device only has the approved list of apps, and does not have any banned apps. For this example, you will perform the following tasks: Configure the notification template you want to send Create a Blacklist for a ios app named Word with Friends Free Create an Automated Action that sends a notification when a device violates a black list policy. Apply the Blacklist policy and deploy the Automated Actions to your device in a deployment package Install the Words with Friends for Free on your ios device Receive the Notification Configure Notification Template To make sure you send the right notification when your user's device has a blacklisted app installed, you will check the notification template for the message you will send ('Non Compliant Blacklist / Whitelist') is configured properly. Note: By default, all notification templates are configured to be sent to the ${user.mail} macro, which will use the address of the device owner that will receive the notification. If you want notificationn s to be sent to an admin user, for example, to notify an admin that a device has been jailbroken, you can enter the admin address in nthe To field. To configure your notification template:

8 1. Inside ZDM, click the Options link. 2. Select Notification Templates and then select the template named Non Compliant Blacklist / Whitelist. 3. Click Edit. 4. In the Notifictions Template dialog, Settings tab, make sure you have the right channels of communication selected.

9 5. Next, in the SMTP tab, make sure you enter a name or address in the From field. This is not mandatory, but it is recommended. You can also modify the Subject line and message, but do not modify the system macros (${user.mail}; ${firstnotnull(device.tel_number,device.serialnumber)}, etc.), or the message may not get sent properly. 6. Click Update. The Template is ready for the Automated Action. System Macros in Automated Actions For information on using system macros, and a list of those that can be used in Automated Actions, see Macros in Notification Templates and Automated Actions. Create a Blacklist for Words with Friends Free Next you will create a blacklist for an app, so you can use the blacklisted app as a trigger for your automated action later. To create an app blacklist: 1. In ZDM, select the Policies tab, and then from the left side select ios -> Blacklist, and then click New App. 2. In the Add a new application dialog, enter the following information: App Name: Words with Friends for Free

10 App bundle ID: com.zynga.wordswithfriendsfree 3. Click Create. 4. Next, apply the blacklist to ZDM by clicking Apply app list. Create an Automated Action to Notify User When Blacklisted App Installed In this task, you will create an Automated Action that will send a notification to users when a blacklisted app is installed on their device. To create an Automated Action: 1. In the Policies tab, select Global -> Automated Actions, and then click New. 2. In the New automated action dialog, enter the following information: Name: Blacklist Notify Trigger Type: Applications Name: Installed Condition: Is Value: WordsWithFriendsFree

11 Action: Notify Template: Non Compliant Blacklist / Whitelist Delay: 10 Minutes Repeat Wait: 1 Hours. This option allows you to delay the sending of a Notify action (a notification message) in the event that there is a break in nteh communication between the device and the ZDM server. 3. Click Create. Deploy Automated Actions to Device In this last task, you will create a deployment package that contains Automated Actions and then push that deployment to your device. Once on your device, you install the Blacklisted app (Words with Friends for Free) to trigger both the notification that your device is out of compliance, and to trigger the SMG block on the server. Best Practice: We strongly recommend that you create separate deployment packages for your Automated Actions and deploy them separately from other packages. Additionally, make sure you configure Deploy to anonymous users in the Groups of users page of the package, to capture those users who may have removed their agents, or who have had their AD account disabled. To deploy the automated action: 1. In ZDM, select the Deployment tab, and then click New Package -> New ios Package.

12 2. In the Create New Package wizard, Package Name window, enter a name for the Blacklist package - Blacklist Apps or something similar - and then click Next. 3. In the Groups of users window, select a group you want to deploy this policy to and then click Next. 4. In the Resources to be deployed window, under Available Resources scroll to the Automated Actions section and select the two Automated Actions you previously created in the last step. Then, click the right arrow to add the resource to the deployment package. 5. Next, scroll down further in the Available Resources list, near the bottom and select the Software Inventory resource, so ZDM can take an inventory of the installed software on the device and compare it with the Blacklist. Click the right arrow to add the resource to the deployment package and then click Next.

13 6. In the Deployment schedule window, select the If not deployed Start Now option. Click Next. 7. In the Deployment rules page, click Next. 8. In the Package summary page, click Finish. 9. From the packages list, click Deploy. When the deployment has finished, select the deployment package, and click the Details button to see information about the success of the package deployment. When the package shows as deployed, then you can move on to the next and step and install the Blacklisted app on you ios device. Notification Upon Install of Blacklisted App on IOS Device When the users targeted in the deployment install the blacklisted app on their ios device, Words with Friends Free, they will receive a notification. Troubleshooting Automated Actions To check whether or not automated notification was sent to a user, you can try a few things: Check the Deployment of the package that contained your Automated Action to make sure is actually deployed. Check the ZDM Device Event Log and see what if any of the events specified in your automated actions have executed. Check the ZDM Sent Notications Log and see which notifications have been sent, which have failed, who received them, when they were sent, and more.

14 Show Automated Actions Executions You can view all of the automated actions that have been executed from inside of ZDM at any time. To show the list of executed Automated Actions: 1. In ZDM, select the Policies tab and then select Show Executions. Compliance with Automated Actions Automated actions allow you to change the status of a device from a state of compliance to a state of non-compliance based upon specific conditions. For example, you can set an Automated Action to change a device to a state of Out Of Compliance=True if the device has been jailbroken/rooted, if the user disabled location services on the device, if the user installs a blacklisted application, and so on. In a cases where a user's device is put into an Out Of Compliance state (the device property Out of Compliance is = True), and then the user fixes the device to that the device is in compliance, you will need to configure a policy (deploy a package) that resets the device into a compliant state. In other words, you need to change the device property of Out Of Compliance = False. For example, let's say you want to define the following three compliance policies in your organization using ZDM Automated Actions:

15 1. Location Services Policy: This policy states that if a user disables location services on their device, then the Automated Action should then set the device property Out of Compliance to True (OCC=True). 2. Blacklisted App Policy: This policy states that if a user installs a blacklisted app on their device, then the Automated Action should then set the device property Out of Compliance to True (OCC=True). 3. Jailbreak Policy: This policy states that if a user jailbreaks their device, then the Automated Action should then set the device property Out of Compliance to True (OCC=True). Automated Action Deployment Package Naming/Ordering Because the manner in which ZDM deploys packages to target devices, you need to name your Automate Action compliance policies in a very specific way, so that they get executed in the proper order. ZDM deploys packages according to their name, deploying those packages in an alphanumeric order. Thus, in order to ensure that your Compliance Reset Automated Action package gets deployed first and doesn't reset any of the other Automated Action packages that are designed to track compliance device compliance. In order to configure your Automated Actions to detect device compliance, you need to ensure you name your Automated Actions so that the policies are deployed in a specific order, namely, you want to be sure the global compliance reset polices is deployed first, and then your subsequent Automated Action compliance deployment packages policies are executed after. Recommended Deployment Package Ordering Example In the example above where you want to create three packages to track device compliance, the Geofence, Blacklist, and Jailbreak polices. The Automated Actions will track the devices and set them to Out of Compliance=False when the user violates the policy. And, you want to be able to reset these devices when the user brings the device back into compliance. To order your compliance policies correctly: 1. Compliance Reset Automated Action - Named 'aaa-ooc-reset' This Automated Action resets the device property Out of Compliance=False on the devices of users targeted by the policy. It is given the name 'aaa-ooc-reset' so it will be executed before the policies that can set a device out of compliance.

16 2. Location Services Automated Action - Named 'aab-location-services-disabled' This Automated Action sets a device property to Out of Compliance=True if user disables location services on their device. It is given the name 'aab-location-services-disabled' with a delay of three minutes so it will be executed after the compliance reset Automated Action that comes before it.

17 3. Blacklisted App Automated Action - Named 'aac-blacklisted-app' This Automated Action sets a device property to Out of Compliance=True if user installs a blacklisted app on their device. It is given the name 'aac-blacklisted-app' with a delay of four minutes so it will be executed after the compliance reset Automated Action that comes before it. 4. Jailbreak Automated Action - Named 'aad-jailbreak'' This Automated Action sets a device property to Out of Compliance=True if user jailbreaks their ios their device. It is given the name 'aad-jailbreak' with a delay of five minutes so it will be executed after the compliance reset Automated Action that comes before it.

18 Deployment Package Ordering Your last step to ensure that your compliance policies will execute in the proper order is to create Deployment Packages using the same names you used for the Automate Actions. You will need to create deployment packages with naming such that the compliance reset package gets deployed first, followed by the other Automated Actions that evaluate devices for compliance. For example, if you wanted to create the set of set of Automated Actions compliance policies described in this example for ios devices, from the Deployment tab in ZDM you would create new for each of the listed Automated Actions using the following naming convention: 1. Compliance Reset Deployment Package: Named '0-aaa-OOC-RESET' Create a deplolyment package containing the compliance reset Automated Action using this name to ensure that this package will be deployed before your other compliance deployment packages.

19 2. Location Services Deployment Package: Named '0-aab-location-services-disabled' Create a deployment package for the location services Automated Action with this naming to ensure that it will be deployed after the compliance reset deployment package. 3. Blacklisted App Deployment Package: Named '0-aac-blacklisted-app' Create a deployment package for the blacklisted app Automated Action with this naming to ensure that it will be deployed after the compliance reset deployment package. 4. Jailbreak Deployment Package: Named '0-aac-jailbreak' Create a deployment package for the ios jaclbreak Automated Action with this naming to ensure that it will be deployed after the compliance reset deployment package.

20 When you deploy packages, you can be sure that the compliance packages are deployed first, and in the proper order. Compliance Deployment Packages in Proper Order 2012 Zenprise, Inc. All rights reserved. Updated: Fri, 15 Mar :20:26 GMT Powered by 20

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

SysAid MDM User Guide for Android

SysAid MDM User Guide for Android SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Getting Started - MDM Setup

Getting Started - MDM Setup Mobile App Getting Started - MDM Setup Thank you for acquiring the Talon Mobile app. The Talon Mobile app allows you to request sensitive justice information. To use the Talon Mobile app, your agency s

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Cloud Services MDM. Overview & Setup Admin Guide

Cloud Services MDM. Overview & Setup Admin Guide Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE Mobile Device Management, User Guide Copyright 2013, CommuniTake Technologies Ltd., Yokneam, Israel. All rights reserved. For a hard-copy

More information

SysAid MDM User Guide for ios

SysAid MDM User Guide for ios SysAid MDM User Guide for ios Table of Contents Introduction Enrolling Your ios Mobile Device in SysAid MDM Unenrolling Your ios Mobile Device from SysAid MDM Have Any Questions? Introduction SysAid Mobile

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

Telstra Mobile Device Management (T MDM) Getting Started Guide

Telstra Mobile Device Management (T MDM) Getting Started Guide Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device

More information

Cloud Services MDM. Email Management Admin Guide

Cloud Services MDM. Email Management Admin Guide Cloud Services MDM Email Management Admin Guide 10/27/2014 CONTENTS Email Management... 2 Email Compliance Policies... 3 Email Policies... 4 Attachment Security Policies... 8 Attachment Security Policies

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Manage Mobile Devices

Manage Mobile Devices Manage Mobile Devices After your mobile device users enroll with the GlobalProtect Mobile Security Manager, you can monitor the devices and ensure that they are maintained to your standards for protecting

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

Sophos Mobile Control Administrator guide

Sophos Mobile Control Administrator guide Sophos Mobile Control Administrator guide Product version: 2.5 Document date: July 2012 Contents 1 Glossary... 3 2 About Sophos Mobile Control... 4 3 Prerequisites... 6 4 Login... 7 5 Overview... 8 6 Common

More information

Device Enrollment Guide

Device Enrollment Guide TechReady Are you ready to implement IT solutions? Device Enrollment Guide Mobile Device Management with Enterprise Mobility Suite Created for: TechReady 7 iunie 2016 Version 0.3 Created by: Adrian Stoian

More information

Managing policies. Chapter 7

Managing policies. Chapter 7 Chapter 7 Managing policies You use the Policies tab in Admin Portal to create policy sets for roles. A policy set lets you configure the following categories of policies: Mobile Device Policies Use to

More information

NetIQ Advanced Authentication Framework - Smartphone Applications

NetIQ Advanced Authentication Framework - Smartphone Applications NetIQ Advanced Authentication Framework - Smartphone Applications User Guide Version 3.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Install Smartphone

More information

Migrating Trend Micro Mobile Security for Enterprise (TMMS) 8.0 to TMMS 9.0 Patch 1

Migrating Trend Micro Mobile Security for Enterprise (TMMS) 8.0 to TMMS 9.0 Patch 1 Migrating Trend Micro Mobile Security for Enterprise (TMMS) 8.0 to TMMS 9.0 Patch 1 Migrating TMMS 8.0 to version 9.0 Patch 1 involves the following steps: 1. Pre-migration 2. Backing up the database and

More information

Cloud Services MDM. Telecom Management Admin Guide

Cloud Services MDM. Telecom Management Admin Guide Cloud Services MDM Telecom Management Admin Guide 10/24/2014 CONTENTS Telecom Management... 2 Enabling Telecom Setting... 2 Creating and Managing Telecom Plans... 3 Dynamic Assignment... 4 Dashboard Usage...

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Administration Guide BES12. Version 12.3

Administration Guide BES12. Version 12.3 Administration Guide BES12 Version 12.3 Published: 2015-10-30 SWD-20151028105551254 Contents Introduction... 11 About this guide...12 How to use this guide... 13 Steps to administer BES12... 13 Examples

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab

EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native

More information

Mobile Device Manager. Windows User Guide (Windows Phone 8/RT)

Mobile Device Manager. Windows User Guide (Windows Phone 8/RT) Mobile Device Manager Windows User Guide (Windows Phone 8/RT) Document Revision Date: Oct. 22, 2014 Mobile Device Manager Windows Phone 8 User Guide i Contents Windows Phone 8 Features Matrix... 1 Overview...

More information

MAM - Mobile Application Management

MAM - Mobile Application Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Sophos Cloud Help Document date: January 2016

Sophos Cloud Help Document date: January 2016 Sophos Cloud Help Document date: January 2016 Contents 1 About Sophos Cloud Help...4 2 Activate Your License...5 3 The Sophos Cloud User Interface...6 4 Dashboard...7 4.1 Action Center...7 4.2 Email Alerts...14

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on... Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM This guide provides information on...... APNs Requirements Tips on Enrolling in the ios Developer Enterprise Program...

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time. SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on... Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM This guide provides information on...... APNs Requirements Tips on Enrolling in the ios Developer Enterprise Program...

More information

Absolute Manage MDM. John Wu Systems Engineer jcwu@absolute.com

Absolute Manage MDM. John Wu Systems Engineer jcwu@absolute.com Absolute Manage MDM John Wu Systems Engineer jcwu@absolute.com Saving Time and Money Comprehensive IT Automation Patch Management Software Distribution Software License Management Power Management Asset

More information

Mobile Device Management Fleet manager s guide. Philippe CAJET Admin Guide MDM R1.6_2013 August 1 st _V 1

Mobile Device Management Fleet manager s guide. Philippe CAJET Admin Guide MDM R1.6_2013 August 1 st _V 1 Mobile Device Management Fleet manager s guide Philippe CAJET Admin Guide MDM R1.6_2013 August 1 st _V 1 2 Summary Pages Pages Mobile Device Management Fleet manager s guide 1 SUMMARY 2 SUMMARY 3 0. connection

More information

GETS AIRWATCH MDM HANDBOOK

GETS AIRWATCH MDM HANDBOOK GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS

More information

Configuring an ios App Store application

Configuring an ios App Store application Chapter 138 Configuring an ios App Store application You can deploy a free ios mobile application or deploy ios mobile applications purchased in bulk through the Apple Volume Purchase Plan. (You cannot

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

TLC 3 Student Mobile Device Configuration Specifications

TLC 3 Student Mobile Device Configuration Specifications All students are REQUIRED to configure and maintain their mobile devices as outlined in this document. Non-compliance is a violation of District policy and may result in disciplinary action and/or revocation

More information

Sophos Mobile Control User guide for Apple ios

Sophos Mobile Control User guide for Apple ios Sophos Mobile Control User guide for Apple ios Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

System Configuration and Deployment Guide

System Configuration and Deployment Guide System Configuration and Deployment Guide This guide provides information on...... Configuring an Organization using the Organization Wizard... Setting a default Policy Suite using the Organization Wizard...

More information

Using Devices. Chapter 3

Using Devices. Chapter 3 Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform

More information

Cloud Services MDM. Control Panel Provisioning Guide

Cloud Services MDM. Control Panel Provisioning Guide Cloud Services MDM Control Panel Provisioning Guide 10/24/2014 CONTENTS Overview... 2 Accessing MDM in the Control Panel... 3 Create the MDM Instance in the Control Panel... 3 Adding a New MDM User...

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

Getting Started Guide: Getting the most out of your Windows Intune cloud

Getting Started Guide: Getting the most out of your Windows Intune cloud Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9 About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but

More information

Seqrite Mobile Device Management

Seqrite Mobile Device Management Enterprise Security Solutions by Quick Heal Seqrite Infinite Devices. One Unified Solution. A simple yet powerful solution, Seqrite is a unified platform for managing and monitoring multiple mobile devices

More information

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see Deploy Inbox Rules below. Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein

More information

Worx Mobile Apps. Known Issues in Worx Mobile Apps Version 10.3

Worx Mobile Apps. Known Issues in Worx Mobile Apps Version 10.3 Worx Mobile Apps Known Issues in Worx Mobile Apps Version 10.3 Worx Home 10.3.5 While installing or subscribing Worx mobile apps from Worx Home, users might see the message "Parse error." Although the

More information

Introduction to BYOD. Overview. In This Guide

Introduction to BYOD. Overview. In This Guide Disclaimer While AirWatch strives to provide some level of direction for customers in terms of initially implementing a Bring Your Own Device (BYOD) program, it is up to your organization s legal, human

More information

IC L05: Email Security.cloud Configuring DLP on to your email flow & Applying security to your Office 365 or Google Apps email deployment Hands-On Lab

IC L05: Email Security.cloud Configuring DLP on to your email flow & Applying security to your Office 365 or Google Apps email deployment Hands-On Lab IC L05: Email Security.cloud Configuring DLP on to your email flow & Applying security to your Office 365 or Google Apps email deployment Hands-On Lab Description This session is for existing customers

More information

License Management and Support Guide

License Management and Support Guide License Management and Support Guide Salesforce, Winter 16 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Integrating Cisco Identity Services Engine with GO!Enterprise MDM

Integrating Cisco Identity Services Engine with GO!Enterprise MDM Integrating Cisco Identity Services Engine with GO!Enterprise MDM GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Deployment Models 4 Getting GO!Enterprise MDM Ready for ISE 5 Grant

More information

Introduction to Mobile Email Management (MEM)

Introduction to Mobile Email Management (MEM) Introduction to Mobile Email Management (MEM) Overview To the users of most organizations, one of the most valued benefits of a managed device is the ability to access corporate mail on the go. Having

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

This guide provides information on...

This guide provides information on... Managing Users and User Resources This guide provides information on...... The User/Device Grid... The User/Device Profile... Categorizing Users into Local Groups... Managing Applications... Managing Corporate

More information

Business Banking Customer Login Experience for Enhanced Login Security

Business Banking Customer Login Experience for Enhanced Login Security Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th

More information

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014 Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Using McAfee Quarantine Manager

Using McAfee Quarantine Manager Using McAfee Quarantine Manager McAfee Quarantine Manager provides a central point for users to analyze and act upon emails that have been quarantined because they have been identified as potential Spam.

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Self-Service Password Manager

Self-Service Password Manager WWW.ROSE-HULMAN.EDU/EIT OFFICE OF ENTERPRISE INFORMATION TECHNOLOGY Self-Service Password Manager Rose-Hulman Institute of Technology has implemented a self-service password manager that provides an easy-to-use

More information

Cloud Services MDM. Application Management Admin Guide

Cloud Services MDM. Application Management Admin Guide Cloud Services MDM Application Management Admin Guide 10/24/2014 CONTENTS Application Management... 2 Using the Applications Page... 2 Enabling the Book Catalog... 9 Application Wrapping Android Apps...

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

DOMAIN CENTRAL HOSTING EMAIL

DOMAIN CENTRAL HOSTING EMAIL Welcome to our hosting services, we have created the following documents to help you get up and running as quickly as possible. If at any stage you encounter difficulties, you are welcome to send a help

More information

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...

More information

APNS Certificate generating and installation

APNS Certificate generating and installation APNS Certificate generating and installation Quick Guide for generating and installing an Apple APNS Certificate Version: x.x MobiDM Quick Guide for APNS Certificate Page 1 Index 1. APPLE APNS CERTIFICATE...

More information

MDM User Guide June 2012

MDM User Guide June 2012 June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App

More information

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant How to guides: AppManager v7.04 Initial Setup for a trial By NetIQ Prepared by Haf Saba Senior Technical Consultant Asia Pacific 1 Executive Summary This document will walk you through an initial setup

More information

Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data?

Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data? Do you want to mobilize your entire work process efficiently? Do you want to protect your most valuable asset data? Are you aware of the possible consequences of the misuse of your mobile devices? IT S

More information