Evaluating Mobile Device Management Products
|
|
- Chad Rodgers
- 8 years ago
- Views:
Transcription
1 CHOOSING AND MANAGING MOBILE DEVICES Evaluating Mobile Device Products Choosing the best mobile device management product can be tricky. Success requires carefully evaluating product capabilities and matching them to mobile workforce needs. BY LISA PHIFER
2 Mobile device management products can help IT administrators get a grip on the plethora of smartphones and tablets that employees have introduced to enterprises. Mobile device management software can centrally automate many manual IT tasks, such as device enrollment (registering a device to be used for business). This management software delivers IT requests over the air to company-issued or employee-owned devices running everything from Apple ios to Google Android. Mobile device management (MDM) products are rapidly evolving to keep up with the stream of new devices emerging in the marketplace, updated mobile operating systems and increasingly complex business needs. With dozens of diverse products to choose from, finding the best MDM software to monitor and control your mobile workforce can be daunting. Let s examine the capabilities of contemporary MDM products and desirable features. Let s also consider how these tools can help meet workforce requirements, as well as limitations to avoid and alternative deployment models. Heterogeneous mobile device management products create a single unified console through which IT can administer different mobile devices and operating systems. But these products vary in breadth and depth. 2 EVALUATING MOBILE DEVICE MANAGEMENT PRODUCTS
3 It is now common for MDM products to support smartphones and tablets running Apple ios 4 or later, Google Android 2.3 or later, and Windows Phone 6 and 7. Support for BlackBerry OS and Windows Phone 8/RT is less common but growing, while Symbian and WebOS support is fading along with declining popularity. Start any MDM product evaluation by narrowing your candidate list to those capable of supporting mobile devices and operating systems of strategic importance to your workforce. Accept that MDM products may not support some older devices, while some new consumer devices may not yet be accommodated by MDM products. Seek acceptable but not 100% device coverage, focusing instead on the depth of capabilities available for your highest-priority devices. Ask about legacy management for older devices; many MDM products offer Accept that mobile device management products may not support some older devices. limited control over nearly anything using Exchange ActiveSync. Look at each product s track record for supporting newly released devices and OS versions; past performance can be an indicator of future expandability and anticipated time to market. Once you ve compiled a list of products that could manage most of your organization s roster of devices, drill down into the capabilities offered for each mobile OS. At first glance, MDM products tend to look alike. For example, every product on your list should offer device policy management. Any product lacking this basic MDM capability should be disqualified. This might seem obvious, but many offerings that excel at one thing, such as mobile expense management or secure enterprise , mistakenly make it onto MDM product lists. In fact, a lack of industry standardization is a fundamental challenge. MDM vendors use varied labels to describe similar capabilities and group capabilities, inhibiting apples-to-apples comparison. For the best results, develop an evaluation guide of MDM features that reflect your workforce requirements, using it to 3 EVALUATING MOBILE DEVICE MANAGEMENT PRODUCTS
4 inventory what each MDM product offers for each required mobile OS. TABLE 1 outlines basic capabilities that any MDM product should offer, along with common IT tasks and related features to look for. TABLE 1: Basic Mobile Device Features CAPABILITY DESCRIPTION TASKS FEATURES Inventory Establish and maintain a database of enrolled devices and their properties Device enrollment Asset tracking Decommissioning Self-enrollment Directory integration Acceptable-use policy Asset details Change history Remote wipe Backup/restore Device Policy Get/set device attributes and restrictions to assert and enforce IT-defined policies Define policies Provision devices Maintain policies Enforce policies Acceptance criteria Group/location policies Policy refresh Compliance checks Enforcement actions Security Protect and access the integrity of enrolled devices Configure controls Enforce controls PIN/password Inactivity timeout Check integrity Login failure Detect compromise Data encryption Device restrictions Secure Wi-Fi, VPN, Jailbreak detection Blacklist enforcement Monitoring and Reporting Deliver real-time and historical visibility in enrolled devices and their activities Real-time status Alert notifications Event logging Configurable dashboard Request check-in GPS mapping/tracking Device location Canned/custom reports Summary/detail views 4 EVALUATING MOBILE DEVICE MANAGEMENT PRODUCTS
5 Note that supported tasks and features differ among products. This is where you will begin to appreciate each MDM product s fit for your workforce. For example, all MDM products support device enrollment. Historically, IT enrolled company-issued devices, individually or in bulk. Today, it s common to offer a selfenrollment portal that bring your own device (BYOD) users can visit to register their devices and (if approved) get them automatically provisioned with device policies. Or you may prefer an enrollment portal that integrates with Active Directory so that workers can log in with their usernames and passwords instead of requiring users to type in yet another new password. Rather than require IT to define the same management policies repeatedly for every user in a group, provision devices with group-based policies. It s also important to evaluate your required features for each mobile OS. For example, all MDM products can configure PIN and password policies to deter unauthorized use of lost or stolen devices. The mobile OS determines PIN or password length, strength, complexity and reuse; MDM products cannot mask this difference in device capabilities. What MDM products can do, however, is provide uniform tools to define and apply the same logical policy to devices running different OSes. They can also warn you when certain rules aren t supported on a given OS or version. Some MDM products can also automatically check devices and quarantine or de-enroll those that don t comply with policies. Carefully consider how criteria are set and enforced and what degree of control and automation an MDM product delivers. If a worker installs a blacklisted application, an MDM product might do anything from remotely wiping the device to simply notifying a user that the application is banned and should be removed. The right action could depend on the type of device and user. Look for MDM products that give IT a range of useful administrative actions, along with the power to apply them intelligently. As workforce mobility extends into enterprises, management needs are being refined and expanded. For a portion of your workforce, basic mobile device capabilities may be sufficient. But other workers may have more sophisticated 5 EVALUATING MOBILE DEVICE MANAGEMENT PRODUCTS
6 application needs, pose greater security risks or work with regulated data. And some devices may have different management needs, such as multi-user tablets or consumer-grade smartphones. Such use cases can often be addressed through more advanced mobile device management controls. The capabilities detailed in TABLE 2 may be bundled with a basic MDM product, sold as an MDM add-on module or even be available as a standalone product. Most of these capabilities are relatively new, and products may or may not include a range of features. TABLE 2: Advanced MDM Features CAPABILITY DESCRIPTION TASKS FEATURES Service Application Monitoring and controlling networks service use to manage resulting expenses Install, update, and remove public and enterprise mobile applications Define budgets Configure connections Monitor usage Enforce limits Create application library Set app policies Recommend apps Install/update apps Monitor app use Disable/remove Call minute/text limits 3G/4G data caps Roaming restrictions Usage analytics Expense reporting Enterprise app store License management Transparent updates Whitelist enforcement Application wrapping Document Download, update and remove corporate documents, using encrypted container Create document library Set doc policies Recommend docs Download/update Monitor use Disable/remove File synchronization/ backup SharePoint integration File sharing Offline access Security restrictions Container Administer mechanisms intended to separate corporate and personal data and applications Enable container Configure policy Monitor use Wipe container Encryption strength Data leak prevention Dual persona Selective wipe 6 EVALUATING MOBILE DEVICE MANAGEMENT PRODUCTS
7 For example, many MDM products have now expanded to offer some degree of mobile application management (MAM). However, a product many do nothing more than display a catalog of apps whitelisted (recommended or required) by IT, relying on users to complete installation. Another product might maintain a database of enterprise apps, transparently pushing apps and subsequent updates to devices based on IT-configured policies. A more advanced MDM product might actually wrap each enterprise app with features intended to prevent unauthorized A smaller but growing number of MDM products is expanding to offer mobile document management. use or unsafe data storage. If MAM is on your requirements list, carefully establish baseline features that must be present, and ask each MDM vendor to demonstrate whether and how those features are delivered. Similarly, a smaller but growing number of MDM products is expanding to offer mobile document management. This could include pushing an IT-configured collection of PDFs out to enrolled devices or creating an authenticated, encrypted container that stores an automatically synchronized set of business documents that users can update offline. Decide whether your workforce requires enterprise file share or cloud file-service integration and whether you want to impose copy/paste restrictions. Both document and application management features have emerged to better meet high-risk and BYOD needs. For high-risk users or users working with data subject to regulatory requirements, these capabilities can add an extra layer of IT control, security and monitoring. For BYOD programs, these capabilities are sometimes used with very minimal device policy management, giving users more freedom to use devices as they wish while carving out an environment that IT can separately secure and delete if necessary. A related trend is container management, where an entire section of a managed device is controlled by IT and used to safely house enterprise apps and data, while leaving a separate section available for unfettered personal use. Since these capabilities are so new, meaningful comparison among MDM prod- 7 EVALUATING MOBILE DEVICE MANAGEMENT PRODUCTS
8 ucts can be extremely difficult. Instead, focus on specifying exactly what you need from containerization and how well any candidate meets those needs. The mobile device management features described here can often be deployed in several ways (see FIGURE 1). The traditional deployment model involves installing MDM software in-house, on a dedicated server operated by IT and located in a corporate data center or a hosting facility. Many large corporations continue to prefer this deployment model to simplify integration with other enterprise services such as directories, mail servers and file servers. Recently, the rise of cloud computing has prompted growth of alternative models. Specifically, enterprises may now consider deploying MDM software on FIGURE 1: MDM Deployment Models Corporate IT can deliver mobile device management by deploying software in-house, deploying software in a cloud or purchasing SaaS management. 8 EVALUATING MOBILE DEVICE MANAGEMENT PRODUCTS
9 private or public cloud servers, taking advantage of network redundancy, high availability and infinite scalability. Most MDM products can be deployed in this fashion, without requiring any special features. But a third deployment model Software as a Service (SaaS) is quickly becoming popular, especially among small and midsize businesses. In this case, MDM vendors install their own software on their own multi-tenant servers, selling MDM capabilities as public cloud services. Many companies find this pay-as-you-go alternative extremely attractive, especially to lightly manage a large number of devices under BYOD. Even if over the long run your organization prefers to manage its own MDM server, SaaS can be a powerful tool for SaaS can be a powerful tool for MDM evaluation. MDM evaluation. Once you have whittled down your candidate list to a select set of MDM products to consider, conduct a live pilot with real-world mobile devices and users. If a product under consideration is available in SaaS form, a pilot can often be launched in a matter of hours. Take advantage of all such opportunities to test capabilities and features, finetune MDM policies, and get feedback from business units and participating employees on IT-defined requirements and how well any product really meets them. This part of your evaluation can also assess critical product attributes such as usability, scalability, reliability, and support. Ultimately, comparing capabilities and features on paper gets you only so far taking an MDM product out for a test drive is essential before making a final decision. n 9 EVALUATING MOBILE DEVICE MANAGEMENT PRODUCTS
10 ABOUT THE AUTHOR LISA PHIFER owns Core Competence Inc., a consulting firm specializing in business use of emerging Internet technologies. For nearly 30 years, she has been involved in the design, implementation and evaluation of networking, security and management products. Choosing and Managing Mobile Devices is a SearchConsumerization.com e-publication. Margie Semilof Editorial Director Lauren Horwitz Executive Editor Phil Sweeney Managing Editor Christine Cignoli Senior Features Editor Eugene Demaitre Associate Managing Editor Laura Aberle Associate Features Editor Linda Koury Director of Online Design Neva Maniscalco Graphic Designer Rebecca Kitchens Publisher rkitchens@techtarget.com TechTarget 275 Grove Street, Newton, MA TechTarget Inc. No part of this publication may be transmitted or reproduced in any form or by any means without written permission from the publisher. TechTarget reprints are available through The YGS Group. About TechTarget: TechTarget publishes media for information technology professionals. More than 100 focused websites enable quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job. Our live and virtual events give you direct access to independent expert commentary and advice. At IT Knowledge Exchange, our social community, you can get advice and share solutions with peers and experts. 10 EVALUATING MOBILE DEVICE MANAGEMENT PRODUCTS
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More information1 of 14 13-09-13 20:44
Free Download Download the latest issue of CW Europe - September 2013 Is your house in order? Download Email Address By submitting you agree to receive email from TechTarget and its partners. If you reside
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationGETS AIRWATCH MDM HANDBOOK
GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS
More informationIBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationSecure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationBell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationEnterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationTCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationHow To Secure Your Mobile Device
BREAKING THE MOBILE MOLD Mark Vondemkamp VP Security Product Management Bring-Your-Own-Device Using personal devices for business Why implement BYOD? Increase employee satisfaction, productivity Reduce
More informationAirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
More informationTotal Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
More informationMDM Mobile Device Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationCOMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE
COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE Mobile Device Management, User Guide Copyright 2013, CommuniTake Technologies Ltd., Yokneam, Israel. All rights reserved. For a hard-copy
More informationSeparation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices
Separation of Corporate and Personal: Best Practices for Securing Data on Employee-owned Devices Val Hetrick, Director, Customer Success Neil Florio, VP Marketing 1 Agenda BYOD Trends End User Perception
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationBen Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
More informationperspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationCodeproof Mobile Security & SaaS MDM Platform
Codeproof Mobile Security & SaaS MDM Platform info@codeproof.com https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationMobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
More informationMDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationMAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationCompany Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationAPPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
More informationHow To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationWhich is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO
Which is the Right EMM: Enterprise Mobility Management Craig Cohen - President & CEO Adam Karneboge - CTO Mobile is strategic for business Mobile provides a beeer experience Mobile changes the way people
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationBENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
More informationSYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
More informationENTERPRISE MOBILITY USE CASES AND SOLUTIONS
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability
More informationSophos Mobile Control Administrator guide. Product version: 3
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
More informationTotal Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com
Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationA Guide to MAM and Planning for BYOD Security in the Enterprise
A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationManaging Mobility in the BYOD Era:
Managing Mobility in the BYOD Era: New technology requires new thinking Clint Adams Director of Mobile Technology Services cadams@fiberlink.com BYOD is Accelerating 350 million employee-owned devices in
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationAVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationIT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationCompliance Rule Sets in MaaS360
Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in
More informationSophos Mobile Control User guide for Apple ios. Product version: 4
Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set
More informationKaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
More informationSecurely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
More informationMobileIron Cloud Pricing Packaging
MobileIron Cloud Pricing Packaging MobileIron Cloud delivers our Enterprise Mobility Management () Solution through a purpose-built cloud platform. It provides users with seamless access to the business
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationMDM and beyond: Rethinking mobile security in a BYOD world
MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices
More informationEOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
More informationBest practices for mobile data protection
E-Guide Best practices for mobile data protection This expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace
More informationHealthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationM a as3 6 0 fo r M o bile D evice s
by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile
More informationMaaS360 Mobile Device Management (MDM) Administrators Guide
MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationCorporate-level device management for BlackBerry, ios and Android
B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and
More informationCA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
More information10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
More informationSophos Mobile Control Technical Guide. Product version: 3
Sophos Mobile Control Technical Guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Integration...5 3 Architecture...7 4 Workflow...12 5 Directory Access...14
More informationENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization
More informationThe Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
More informationBuilding a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
More informationManaging and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationEnterprise Mobility Management
Enterprise Mobility Management Security Without Compromising User Experience SESSION ID: SPO2-R03 Brian Robison Principal Technology Evangelist, XenMobile Citrix Systems, Inc. Providing the freedom to
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More informationAragon Research RESEARCH NOTE. Workplace Service. Mobile Security in a BYOD World
Aragon Research Author: Mike Anderson Mobile Security in a BYOD World Summary: Employee-owned devices at work put significant strain on security and manageability. Government agencies need policy and mobile
More informationMobile Application Management
Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER July 2012 Meeting the BYOD challenge with next-generation application and device management Overview... 3 The Challenge... 4 MAM Functions...
More informationBYOD Policy Implementation Guide. February 2016 March 2016
BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...
More informationSophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
More information