Mobile Device Management for CFAES

Size: px
Start display at page:

Download "Mobile Device Management for CFAES"

Transcription

1 Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are beginning to arise. Mobile computing devices such as smartphones and tablets are increasing in power and memory, and, although they are not replacing personal computers on a full-time basis, they are often used as primary communication devices. Also, the number of vendors and platforms in the mobile computing device market continues to increase, adding complexity to support and management efforts. The purpose of mobile device management (MDM) is to assist CFAES faculty and staff with connecting mobile computing devices to CFAES and/or university applications and services for the performance of university business. Mobile computing devices can be wireless devices such as tablet computers, smartphones, and other devices with wi-fi or cellular connections. The overriding goals of MDM are to position CFAES to realize the benefits and efficiencies associated with mobile computing devices, to assist employees with IT security policy compliance, and to mitigate risks though the appropriate application of policies and procedures. Why was MaaS360 chosen as the MDM solution? In order to help ensure that their user s mobile computing devices comply with university IT security and data policies, the CFAES IT support organizations must have visibility into and an appropriate level of control over the mobile devices that are connecting to CFAES and/or university applications and services, whether these devices are employee owned or provided by the university. This visibility with an appropriate level of control must be accomplished without undue impact upon the usability and performance of the devices. The MaaS360 mobile device management service provides a comprehensive set of capabilities to configure devices for access to university systems and services and to ensure that these devices, and the university data stored on them, are secure. We selected MaaS360 because it is one of the most comprehensive, yet least intrusive, products available. It will not interfere with or slow the operation of a device, yet allows IT support staff to quickly determine the security status of the device, or to take action in the event that the device is compromised, lost, or stolen. These capabilities were the reason MaaS360 was chosen for mobile computing device management. Why is MaaS360 needed? All CFAES faculty and staff are required to comply with university and CFAES data and IT security policies when using mobile computing devices for university business. As a result, CFAES IT support organizations are being called upon to provide an appropriate level of support, and to ensure that IT security monitoring and reporting can be accomplished. As compliance with university and CFAES data and IT security policies is an individual requirement for all faculty and staff, users are turning to their local IT support organizations MDM for CFAES 03/30/2011 v1.1 Page 1

2 for help. Finally, CFAES is required to report to the Office of the CIO on the details of its compliance with the policies that apply to the use of mobile computing devices. MaaS360 allows the CFAES IT support staff to provision, secure, and manage today s expanding suite of mobile computing devices all from a single portal while minimizing risk to the college and university. The MaaS360 service enables the IT support staff to manage and maintain mobile computing devices in a manner similar to today s support of personal computers. How will compliance be determined? The university s IT security policy that applies to mobile computing device configuration and management is the one currently in effect for personal computers, the Client Computing Security Standard (CCSS). A separate policy specifically for mobile computing devices is under development but has not been released. The terms of the CCSS define the requirements for compliance. The CCSS can be found at Who determines if a device is in compliance? The university s data and IT security policies require the CFAES IT support staff to certify that all devices connecting to the university network or supporting infrastructure are in compliance. Who makes a device compliant if a device is determined to not be compliant? What are the specific steps that will be taken to make a device compliant? When a mobile device's software or configuration is identified as presenting an IT risk by being out of compliance with the CCSS or other applicable policies, CFAES IT support staff and the user will work together to determine how best to address the risk. CFAES IT support staff include college, departmental, and unit level personnel. The CCSS provides for various remedies to accomplish compliance, and it is the responsibility of the CFAES IT support staff to work with the user to find the most appropriate remedy. CFAES IT support will be governed by the understanding that the university is not a corporation and our IT risk management must be appropriate to our academic and research mission. How will MaaS360 be implemented in CFAES? In order to establish an effective support program for mobile computing devices, CFAES will separate devices into three distinct classes: (1) trusted standard devices that are owned and provided by CFAES (Platform service); (2) acceptable devices that are personally owned (Appliance service); (3) unsupported non-standard devices that are personally owned and MDM for CFAES 03/30/2011 v1.1 Page 2

3 that have a consumer orientation (Concierge service). By classifying devices in this manner, CFAES can achieve the goals of policy compliance, cost control, auditable security, and defined responsibilities with its support program. A model for mobile computing device support was developed to address the three classes. 1. Platform Service CFAES owns the device, is fully responsible for support, and provides full device support (operating system, applications, configuration, etc.). Management software will be loaded on the device. 2. Appliance Service Employee owns the device, CFAES and employee share responsibility for support. Management software will be loaded on the device. Support is limited to , calendaring, and select applications. 3. Concierge Service Employee owns the device and assumes primary responsibility for support with limited assistance from CFAES. Functionality of CFAES management software may be limited or unsupported by the device. Employee assumes personal responsibility for compliance with CFAES and university policies. Custom, hands-on IT support may be available for a fee. Under this model, management software will be installed on the mobile computing device in order to ensure that it is in compliance with the university s policies. The management software chosen for this purpose is MaaS360. Eligible mobile computing devices will be enrolled in the MaaS360 service by CFAES IT support staff via a management portal. The enrollment process requires that IT support staff have physical access to the device in order to install the MaaS360 client software. We believe that you will have a positive experience with MaaS360 and will recognize the many benefits of allowing your IT support resource to efficiently manage your mobile computing device, with your permission. Choosing No Support under the CFAES MDM Standard and Agreement An employee may choose No Support for their personally owned device under the CFAES MDM standard and agreement. No Support is defined to mean that CFAES will provide no assistance to the employee with regard to managing the device or connecting the device to CFAES and/or university applications and services. The employee acknowledges his or her personal responsibility for compliance with all CFAES and university policies. Employees who choose not to have their personally owned device supported under the agreement, and then connect that device to CFAES and/or university applications and services, assume personal responsibility for compliance with CFAES and university policies. Employees who connect unsupported devices acknowledge that CFAES IT support personnel are not responsible for assisting them in the event of an IT security incident involving the device or access to a CFAES or university application or service. What this means in practical terms is that if a non-supported device is involved in an IT MDM for CFAES 03/30/2011 v1.1 Page 3

4 security incident, the employee may be held personally responsible for any consequences that result from the incident. This includes receiving no support from CFAES before, during, or after the university s formal security incident response. The employee may be personally responsible for any legal or financial consequences that result from the incident. What will MaaS360 do? MaaS360 allows the CFAES IT support staff to provision, secure, and manage today s expanding suite of mobile computing devices all from a single portal while minimizing risk to the college and university. The MaaS360 service enables the IT support staff to manage and maintain mobile computing devices in a manner similar to today s support of personal computers. Specifically, MaaS360 provides five services: provision, manage, secure, monitor, and support. Provision MaaS360 enables the configuration and device enrollment process with automatic default policies for Exchange ActiveSync (the new university system), for iphone, ipad, BlackBerry, and Android devices, including the Kindle Fire. MaaS360 does not require the installation of an app on Apple ios devices for enrollment, and maintains a small footprint on other devices, thus avoiding performance and usability issues. MaaS360 discovers new users and devices, and allows the IT support staff to launch a simple end user selfservice Over-The-Air (OTA) enrollment process. Device enrollment takes just minutes. Manage MaaS360 provides a unified management console for all smartphones, tablets, and other mobile devices with centralized policy and control across multiple platforms. Through automated workflows, IT support staff can discover, enroll, manage and report on mobile devices. In addition, role-based MaaS360 portal rights allow for expanded or restricted access for authorized users as their needs require. Over-The-Air configuration management provides simple delivery and maintenance of device profiles, including Wi-Fi and VPN settings. Through device quarantine and approval, IT support staff can be automatically notified of any new devices on the network, and can approve and manage them, ensuring compliance with university policies. MaaS360 delivers cross-platform application management capabilities. MaaS360 allows CFAES to have its own app catalog, offered on the devices it supports, that presents users with approved or recommended public applications, in-house developed applications, and the ability to push updates of those applications as they are made available. In addition, CFAES can use MaaS360 SDKs for developing in-house apps for key functions such as authentication, updates, and usage reporting. These apps can be invaluable tools for building and managing specialized applications and services for program delivery. By MDM for CFAES 03/30/2011 v1.1 Page 4

5 leveraging the MaaS360 mobile device management platform, CFAES can speed in-house development, reduce security risks to university infrastructure, and reduce costs, by avoiding the implementation of separate mobile application development platforms or gateways. Secure MaaS360 provides dynamic, end-to-end security and compliance management capabilities for enrolled devices. Enforcement of passcode policies and strong encryption keys can protect both university and personal data on mobile devices. CFAES IT support staff can configure device passcode policies to meet university IT security standards, and actively monitor devices to ensure compliance. Through real-time compliance management, MaaS360 can detect when a device attempts to opt out of security policies, when prohibited applications are installed, or if SIM changes have been initiated. Based on this information, IT support staff can take automated policy actions, such as sending a message to the user, blocking or data access, or wiping university data from the device. Through passcode and device management policies, IT support staff can protect university and personal data from theft, and restrict unapproved features and applications. Remote wipe actions can ensure that lost or stolen devices are not a data risk, and with selective wipe, can delete university data while leaving personal data intact. Monitor MaaS360 can deliver an interactive, graphical summary of mobile computing device operations and compliance, which is necessary for university IT security compliance reporting. MaaS360 provides integrated reporting and analytics with a high level view into the mobile device landscape, offering hardware and software inventory reports, plus configuration and vulnerability details. Support Supporting mobile workers requires a 24x7 operation that is always available. CFAES IT support staff require the ability to diagnose and resolve device, user, or application issues in real time from a centralized portal. MaaS360 provides robust help desk capabilities for support procedures such as locating a device with GPS, resetting a user s passcode, and sending a direct message to a device. MaaS360 also provides an end-user support portal that allows users to do basic self-management of their device, such as wiping or resetting the password on a lost device. How MaaS360 will be used CFAES MDM Standard and Agreement The implementation of MaaS360 will be governed by the CFAES Mobile Computing Device Standard and Agreement (Agreement). A copy of version 1.0 of the document can be found here: MDM for CFAES 03/30/2011 v1.1 Page 5

6 Employees agree to and accept that the mobile computing device may be erased or formatted upon registration into or transfer/termination from CFAES and/or university applications and services if needed. This is necessary in order for CFAES IT support staff to ensure that the device has not been compromised prior to being connected to CFAES and/or university applications and services, and to ensure that any university institutional data and CFAES management software is removed from the device when connection to these applications and services is no longer required. CFAES IT support staff will make an effort to avoid the removal of the employee s personally owned data and applications. The MaaS360 service will be used to provision, manage, secure, monitor, and support mobile computing devices used by faculty and staff for university business. When a mobile device is identified as presenting an IT risk, CFAES IT support staff and the user will work together to determine how best to address the risk. CFAES IT support staff will be governed by the understanding that the university is not a corporation and our IT risk management must be appropriate to our academic and research mission. CFAES IT support resources will not use MaaS360 to monitor anyone's specific use of a mobile computing device. The university's computing policies strictly prohibit the monitoring of faculty and staff computer or mobile device use except when such monitoring has been approved, in advance, by the university CIO. Anyone who violates this provision is subject to termination. Employees are encouraged to make frequent and complete backups of their mobile computing device on a regular basis. Although MaaS360 can be used to restore the configuration of a device, the service cannot replace lost data or applications. What MaaS360 won t do. Monitor your use of a mobile computing device The MaaS360 service provides the capability of monitoring how a mobile computing device is configured. The service does not collect or report any data related to a user s specific use of the device, other than to show what software is installed, what data is present, and how the device has been configured. Also, the university's computing policies strictly prohibit the monitoring of faculty and staff computer and mobile device use except when such monitoring has been approved, in advance, by the university CIO. Anyone who violates this provision is subject to termination. Make changes to your mobile device without your knowledge - The CFAES implementation of MaaS360 will be used to provision, manage, secure, monitor, and support mobile computing devices used by faculty and staff for university business. When a mobile device requires intervention, CFAES IT support staff will work with you to determine how best to address the issue. IT support staff will be governed by the understanding that the university is not a corporation and our IT management practices must be appropriate to our academic and research mission. How will MaaS360 help me? MDM for CFAES 03/30/2011 v1.1 Page 6

7 Keep your device safe and secure MaaS360 s service allows you to comply easily with university data and IT security policies and regulations, protecting both your personal data and university data from loss or exposure. Improve your personal productivity and satisfaction Mass360 provides mobile device management services that allow you to select the device that best meet your needs, without burdensome management overhead. IT support staff can enroll and provision your selection of device quickly, providing reliable, secure, and easy access to university , data, and applications. Enable IT support to react to security threats and breaches MaaS360 can assist IT support staff with the quarantine and recovery of mobile computing devices that have been lost, stolen, or compromised. This is a requirement of the university s IT security standards. By addressing these situations in a prompt manner, downtime is reduced, and IT support staff can put your mobile device back into service quickly with a higher degree of quality. MDM for CFAES 03/30/2011 v1.1 Page 7

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

MDM Mobile Device Management

MDM Mobile Device Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

M a as3 6 0 fo r M o bile D evice s

M a as3 6 0 fo r M o bile D evice s by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

McAfee Enterprise Mobility Management

McAfee Enterprise Mobility Management Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers

More information

BYOD Policy Implementation Guide. BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment

BYOD Policy Implementation Guide. BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

MOBILE DEVICE MANAGEMENT (MDM)

MOBILE DEVICE MANAGEMENT (MDM) PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Workplace-as-a-Service BYOD Management

Workplace-as-a-Service BYOD Management For companies with people in them Workplace-as-a-Service BYOD Management Solution Overview The BYOD Management solution provides customers with IT tools and services to deploy a Workplace-as-a-Service

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Mobile Device Management Buyers Guide

Mobile Device Management Buyers Guide Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

The User is Evolving. July 12, 2011

The User is Evolving. July 12, 2011 McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0

More information

Managing iphones, ipads, and Androids with Exchange ActiveSync. Presented by Val Hetrick

Managing iphones, ipads, and Androids with Exchange ActiveSync. Presented by Val Hetrick Managing iphones, ipads, and Androids with Exchange ActiveSync Presented by Val Hetrick 1 What Will I Learn Today? How Exchange can be used as a basic management tool for Mobile Devices The features and

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

Mobile Device Management and Security Glossary

Mobile Device Management and Security Glossary Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes

More information

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

iphone in Business Mobile Device Management

iphone in Business Mobile Device Management 19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

SysAid MDM User Guide for ios

SysAid MDM User Guide for ios SysAid MDM User Guide for ios Table of Contents Introduction Enrolling Your ios Mobile Device in SysAid MDM Unenrolling Your ios Mobile Device from SysAid MDM Have Any Questions? Introduction SysAid Mobile

More information

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Addressing NIST and DOD Requirements for Mobile Device Management

Addressing NIST and DOD Requirements for Mobile Device Management Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW

More information

Back to the Future: Securing your Unwired Enterprise

Back to the Future: Securing your Unwired Enterprise Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

Five Steps to Android Readiness

Five Steps to Android Readiness Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and

More information

M O B I L E C O L L A B O R A T I O N S O L U T I O N S

M O B I L E C O L L A B O R A T I O N S O L U T I O N S BUREAU OF ENTERPRISE SYSTEMS AND TECHNOLOGY ENTERPRISE SERVICE DESCRIPTION FOR UNIFIED COMMUNICATIONS M O B I L E C O L L A B O R A T I O N S O L U T I O N S January 2015 V2.00 D E P A R T M E N T O F

More information

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are

More information

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security

TechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring

More information

SysAid MDM User Guide for Android

SysAid MDM User Guide for Android SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction

More information

The Oracle Mobile Security Suite: Secure Adoption of BYOD

The Oracle Mobile Security Suite: Secure Adoption of BYOD An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

BENEFITS OF MOBILE DEVICE MANAGEMENT

BENEFITS OF MOBILE DEVICE MANAGEMENT BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices

Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception

More information

AirWatch for Android Devices

AirWatch for Android Devices Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides

More information

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense

Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense SAP White Paper SAP Partner Organization Mobile Device Management Managing Mobile Devices in a Device-Agnostic World Finding and Enforcing a Policy That Makes Business Sense Table of Content 4 Mobile Device

More information

Securing Healthcare Data on Mobile Devices

Securing Healthcare Data on Mobile Devices Securing Healthcare Data on Mobile Devices Michelle Cook, Healthcare Mobility Specialist Keith Glynn, CISSP, Sr. Technical Solutions Engineer October 31, 2013 Poll Question #1 Has your organization deployed

More information

Mobile Device Management

Mobile Device Management Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,

More information

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360.

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360. MaaS360.com > White Paper Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility www.maas360.com 1 Copyright 2014 Fiberlink Communications Corporation.

More information

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

AirWatch for Windows 8

AirWatch for Windows 8 Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement

More information

Ben Hall Technical Pre-Sales Manager

Ben Hall Technical Pre-Sales Manager Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality

More information

Good for Enterprise Good Dynamics

Good for Enterprise Good Dynamics Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

Dell World Software User Forum 2013

Dell World Software User Forum 2013 Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Unified Windows Device Management in the Enterprise

Unified Windows Device Management in the Enterprise Unified Windows Device Management in the Enterprise Chuck Brown Product Management Jimmy Tsang Product Marketing Lenovo ThinkPad 8 Giveaway Tweet @MaaS360 with event hashtag #MaaS360Win Winner will be

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

The Bring Your Own Device Era:

The Bring Your Own Device Era: The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era

More information

Thanks for joining We ll start at 10am

Thanks for joining We ll start at 10am Thanks for joining We ll start at 10am Mobile Device Management Learn the basics to build your MDM Strategy Mobile Device Management Learn the basics to build your MDM Strategy Poll Question #1 3 of 39

More information

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World

Aragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile

More information

Enterprise- Grade MDM

Enterprise- Grade MDM Enterprise- Grade MDM This brief describes a foundational strategic feature of the Citrix enterprise mobility offering, enterprise-grade MDM. 2 While the transition of mobile phones into computers has

More information

CentraStage & Apple Configurator

CentraStage & Apple Configurator CentraStage & Apple Configurator The benefits of integrating Apple Configurator into your CentraStage MDM solution January 2014 Mobile Device Management Page 1 Introduction Apple Configurator makes it

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

AirWatch for ios Devices

AirWatch for ios Devices Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

BYOD Policy Implementation Guide. February 2016 March 2016

BYOD Policy Implementation Guide. February 2016 March 2016 BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...

More information

Managing Mobility. 10 top tips for Enterprise Mobility Management

Managing Mobility. 10 top tips for Enterprise Mobility Management Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind

More information

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen

Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen Enterprise Mobile App Management Essentials Presented by Ryan Hope and John Nielsen 1 Mobile App Trends Global mobile app downloads to exceed 30B by 1016 US and Europe account for over 70% of the market

More information

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology Policy Checklist Name of Policy: Purpose of Policy: Directorate responsible for Policy Name & Title of Author: Does this meet criteria of a Policy? Trade Union consultation? Equality Screened by: Date

More information

1 Mobile Device Management

1 Mobile Device Management roduct Service Description 1 Mobile Device Management Mobile Device Management (MDM) is the process of monitoring, configuring, and securing mobile devices over-the-air (OTA). Hardware and software technologies

More information