Best Practices for Adding Macs to Microsoft Networks
|
|
- Claribel Harper
- 8 years ago
- Views:
Transcription
1 WHITE PAPER Best Practices for Adding Macs to Microsoft Networks
2 Best Practices for Adding Macs to Microsoft Networks Contents Abstract 3 Introduction 4 Requirements for Solving the Challenge 4 Two Approaches for Managing Macs 5 Mac-centric Solutions 5 Microsoft-centric Solutions 5 Centrify s Approach: Best of Both Worlds 6 Single Consolidated Identity 6 Group Policy Management 7 Enhanced Security 8 Cloud-based Identity Service 8 Integrated Mobile Security and Management 9 Smart Card Support 10 Summary 11 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Centrify Corporation. Centrify may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Centrify, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property Centrify Corporation. All rights reserved. Centrify, DirectAudit, DirectControl and DirectSecure are registered trademarks and DirectAuthorize and DirectManage are trademarks of Centrify Corporation in the United States and other countries. Other brand names used in this document are the trademarks or registered trademarks of their respective companies. The names of actual companies and products mentioned herein may be the trademarks of their respective owners CENTRIFY CORPORATION ALL RIGHTS RESERVED
3 WHITE PAPER Abstract Adding Macs to a Microsoft-based corporate network can be a challenge. Are Microsoft tools, Apple tools or third party tools the best solution? Are Mac-oriented management tools the best option or is it best to incorporate the Macs within existing management and security infrastructure? This paper will help answer those questions and explore how Centrify can quickly and easily provide the necessary tools to allow Macs to be managed in the same way PCs are managed today CENTRIFY CORPORATION ALL RIGHTS RESERVED
4 Best Practices for Adding Macs to Microsoft Networks Introduction For years, PCs have been workhorses for corporate desktop computing. Many organizations standardized their PCs on the Microsoft Windows platform. Often, they also managed their desktop computers and secured both users and data with Microsoft s backend server technologies. This homogenous approach worked well and IT organizations were able to build a robust and predictable computing infrastructure using off-the-shelf commercial technology. But things are changing. With the Apple iphone/ipad revolution that began in 2007, more and more end users are choosing alternatives to Windows desktops and laptops. Although the Apple Mac is not a new platform, its primary base in the past consisted of students, media professionals, digital artists and high-end consumers. But today, workers from all verticals want to use Macs and this is creating new challenges for IT organizations that have historically supported a Windows-only computing environment. How can IT address this growing demand from users while also maintaining appropriate control over access to data and corporate resources in a non-disruptive way? Requirements for Solving the Challenge Before exploring this challenge and possible solutions, it is worth creating a checklist of requirements for the incorporation of any new solution into an organization s network: 1. Leverage existing tools, processes and policies. Ideally, any new solution should work well with what is currently installed and not introduce disruption to existing methods for managing and securing systems. 2. No compromise on security. In this era of constant attacks on corporate networks, there is no justification for relaxing the security of networks or devices just so new platforms can be deployed for end users. In fact, any new solution should substantially enhance security and provide IT management with better visibility into who is using each system, what resources they are accessing and how those resources are being used. 3. Minimize the requirement for training IT staff. Training IT staff requires time and money and takes staff away from their core duties. Any new software should require minimal training for existing staff and not require substantial new skills. 4. Easy for IT to deploy and manage. Before committing to a new software solution, it is essential that the software can be easily deployed and managed both on internal systems as well as systems used by workers. Ideally, the solution should work without touching Domain Controllers and other critical production systems. 5. Easy to use for workers. If the solution is hard to use, slows down systems or requires substantial training or new skills for end users, you will have pushback if not outright revolt from end users. Ideally, users should not see any negative impact but instead should have a more productive work experience CENTRIFY CORPORATION ALL RIGHTS RESERVED
5 WHITE PAPER 6. Supports mobile scenarios. The days of only working at an office desk are over. Workers need their devices to work equally well both inside and outside the corporate firewall. And IT needs to be able to manage devices both on-premises and when workers are traveling or working from home. 7. Cost effective. A new solution should not require large capital outlays, high recurring user fees or high costs for deployment. Any new solution should more than pay for itself in increased productivity and reduced IT management costs and should not require a major investment of time to setup and deploy the solution. Ultimately introducing Macs into predominantly Microsoft environments should not be disruptive, costly or involve compromises. The end goal should be to manage Macs with no more overhead than what is required today for managing Windows-based PCs. Two Approaches for Managing Macs There are at least two strategies to solving the challenge of adding Macs into a Microsoftoriented infrastructure. Mac-centric Solutions The first approach focuses on selecting a mature, full-featured Mac management solution that is proven in the enterprise. There are several products on the market that do a decent job of managing an Apple Mac or a Mac plus ios network of devices and users. The attraction of this approach is that the management solutions are tuned exactly to the capabilities of Mac OS X and ios. However, there are numerous potential pitfalls to this approach. The Apple-oriented solution may require substantial new IT skills or even new IT staff to deploy and manage the software. If the solution is not tied into existing Microsoft management software, then there will be duplicative actions required to ensure that policies, access rights, user roles and profiles are exactly matched with what exists in the Microsoft world. Ultimately this dual management console approach may lead to gaps in security and manageability and require extra investments to manage a separate infrastructure. In addition, some Apple-centric management solutions may fall short when it comes to managing other platforms such as Android or Linux. If a different management solution has to be installed for each new platform, the complexity, cost and unpredictability of management and security challenges have the potential to leave an organization exposed. Microsoft-centric Solutions The second approach leverages existing Microsoft infrastructure and adds software or plug-ins to allow Macs to join the Microsoft world and be managed in a way that is more consistent with current practices. The obvious benefits of this approach would be less disruption to existing management infrastructure and fewer requirements for new skills to deploy and manage the solution CENTRIFY CORPORATION ALL RIGHTS RESERVED
6 Best Practices for Adding Macs to Microsoft Networks But this approach can have pitfalls as well. Some solutions may not support all PC management concepts on the Mac resulting in gaps in security, policy enforcement or device management functionality. Some solutions may work well from the IT point of view but may be confusing to use for workers or cause degradation in performance if they are not optimized for the Mac platform. Some solutions may not be built for use both inside and outside the corporate firewall. Centrify s Approach: Best of Both Worlds Centrify has employed a blended approach when grappling with the challenge of managing non-microsoft platforms, such as Macs, Linux and UNIX, in a Microsoft-oriented infrastructure for over a decade. A blended approach means the solution seamlessly plugs into existing infrastructure with minimal disruption and has the same functionality as managed Windows clients. But the solution also needs to be exactly tuned to the capabilities of the non-windows platform so that the operating system performs well and feels natural to the user. In other words, a robust solution needs to be the best of both worlds. Centrify Identity Service, Mac Edition is the latest release of a solution that has been on the market for over eight years. With that service history across enterprises of all sizes and constant feedback from real customers, the software has evolved beyond just providing Active Directory-based authentication for Mac users and includes capabilities to address the current mixed Mac/PC environments and beyond. Let s review each of these key capability areas and see how they map to typical enterprise needs. Single Consolidated Identity One of the key features of Centrify s suite of offerings is based on the simple concept that a user should only have one corporate identity and one corporate password, regardless of which device he or she uses or where the device is used. With only one username and password, users are less likely to forget their passwords and will be more productive. With only one identity to manage, IT doesn t need to make multiple changes to staff records on different systems when users change roles, add devices or leave the company. Everything is managed from a single, central console. Figure 1 Macs joined to Active Directory, just like PCs Microsoft Active Directory (AD) does an excellent job of managing users and computers in a centralized way, but it was designed to work best with Microsoft client systems that is, Windows-based CENTRIFY CORPORATION ALL RIGHTS RESERVED
7 WHITE PAPER PCs. Once a user logs in to an Active Directory-joined PC with his or her credentials, the user is granted access to resources such as file shares, printers and applications based on the user s role, which is centrally managed by IT. Users experience silent authentication to applications and do not need to re-enter their passwords each time they access resources across the corporate network. Users can even log in to other computers on the network with their AD credentials and have a consistent, personalized experience. With Centrify Identity Service, Mac Edition, the same experience and control are available to Macs, which can also join an Active Directory domain. Macs operate in the exact same way as PCs. Users log in with their Active Directory credentials and gain access to the same resources with silent authentication to corporate applications. It is important to note that Centrify goes beyond just basic AD authentication support. With Centrify, Macs work well in large multiforest scenarios with cross-domain trusts and users can even log in while disconnected from the corporate network. Macs become true peers to PCs on the corporate network with no compromises while users are able to work with their Macs in a totally familiar way. Group Policy Management While some solutions stop at support for logging in to a Mac using AD credentials, Centrify goes further with the additional full support of Group Policy on Macs. While AD authentication helps to certify who can use a device, Group Policy goes further by enforcing rules on how that device can be used. Do you want to ensure strong passwords are used? Use Group Policy. Do you want to set up a secure connection to an 802.1x network? Use Group Policy. Do you want to make sure the computer firewall is on and setup correctly? Use Group Policy. In fact, hundreds of device configuration and usage attributes can be centrally set and enforced by Group Policy. Policies can also be associated with individual users or groups of users. Do you want to only allow the finance group to access the corporate accounts file share but turn off access to everyone else? Enforce it with Group Policy. Figure 2 Centrify fully supports Group Policy on Macs As Windows IT administrators have found, Group Policy is indispensable for securing computers, networks, users, data and other resources in a corporate network. But again, Group Policy is designed for Windows networks and Windows PCs. Centrify overcomes that limitation by building Group Policy support into its Mac offering. Policies are enforced using a combination of Mac concepts including updating plist files and standard config files, enforcing MCX settings and creating profiles for local enforcement. Centrify also adds unique Mac policies such as the ability to enforce Apple s File Vault 2 full disk encryption for all Macs joined to the corporate network. With these tools, administrators can establish and enforce policies corporate-wide or for specific classes of users or for different types of devices or all of the above. And this can all be done from a single, central, familiar console for all devices and users CENTRIFY CORPORATION ALL RIGHTS RESERVED
8 Best Practices for Adding Macs to Microsoft Networks Enhanced Security Computer and network security has vaulted to the top of the immediate action required list for IT departments in every type of business and industry around the world. With constant attacks from hackers, data breaches and unauthorized access to corporate resources, security professionals have their hands full protecting not just computing assets, but corporate reputations and the ability for organizations to operate and do business. To help lock down networks and minimize exposure, many organizations have a strict policy on which types of devices can be used on the corporate network. Many companies have enforced a PC-only policy for corporate workstations so as to reduce the possibility of an unfamiliar rogue device introducing a security exposure to the company. And yet, many organizations want the flexibility to also use Macs side-by-side with PCs. Figure 3 PKI certificate management for Macs Again, Centrify includes enterprise-class security features in its Identity Service that not just makes Macs more secure, but they are secured in a way that is consistent with other approved devices on the network. For example, Centrify can manage PKI certificate auto-issuance and auto-renewal, VPN configuration, force the screen locking of idle machines and enforce restrictions against running applications on a Mac that are not approved. This is just a small sample of supported security features that are available to secure Macs in a predictable and consistent way. Cloud-based Identity Service While Active Directory and Group Policy work great inside the firewall, there is less control over users and devices that are mobile or in remote offices. For this reason Microsoft has created the cloud-based directory service, Azure Active Directory. Unfortunately, Azure AD requires complex software to sync with on-premises AD and it replicates sensitive AD data up into the cloud. With Azure AD, IT has to secure two repositories for user information and make sure both are in sync. Figure 4 Web-based management for Macs Centrify has created a different, more secure approach. Rather than replicate user data into an external directory, Centrify provides a gateway into the on-premises directory service but does so in a totally secure way. This leaves IT with only one directory to manage but allows users and devices WHP000057EN CENTRIFY CORPORATION ALL RIGHTS RESERVED
9 WHITE PAPER to be integrated into AD both inside and outside the firewall. Centrify goes further by providing web-based management tools for both IT and users to automate tasks such as adding new devices, locating devices, doing device inventory management, changing passwords and enforcing a remote lock or remote wipe on a Mac that has been lost or stolen. In addition, Centrify provides a cloud-based directory service, separate from AD, for cases where IT wants to manage off-premises devices but doesn t want to integrate these devices into the AD infrastructure. With all these options, IT can choose the best way to manage devices both inside and outside the corporate firewall using a wide variety of techniques. Integrated Mobile Security and Management While this paper is focused on Macs, virtually every Mac user also owns an iphone and/or an ipad, or possibly an Android mobile device. Workers want to be able to use these devices while away from the office to access corporate , work on documents, run corporate apps and access corporate files and other resources. Centrify is not alone is recognizing the opportunity to help organizations support mobile devices in a secure and predicable way. There is a whole industry of mobile device management (MDM) vendors with a wide variety of solutions for securing and managing mobile devices in the workplace. But even in this crowded MDM market, Centrify stands out in the way it tightly integrates mobile devices into existing IT infrastructures. Most vendors require special servers to be set up to manage mobile devices using software and services that are very different and incompatible with the services used to manage on-premises devices. In contrast to this approach, Centrify integrates mobile devices into Active Directory in the same way that it does for Macs. And again, Centrify provides a cloud-based service that is tightly coupled with onpremises AD systems so that AD-based identity management and policies can be enforced on ios and Android mobile devices in a way that is consistent with other managed devices. Centrify also goes further by leveraging its identity service to provide single sign-on to thousands of corporate apps as well as auto app deployment and configuration on authenticated devices. Mobile devices can also be setup for multi-factor authentication to add an extra layer of security when users access sensitive corporate resources, apps and data. Since most workers have more than one device, Centrify has adopted a licensing program where each user can install the Centrify solution on up to five Macs or mobile devices. Figure 5 Mobile devices can be managed and secured using Active Directory as well. Active Directory CENTRIFY CORPORATION ALL RIGHTS RESERVED
10 Best Practices for Adding Macs to Microsoft Networks Smart Card Support Government, military, financial services and customers in other security-oriented industries often rely on smart card authentication as an extra form of security for gaining access to corporate networks. In some cases, Federal agencies and other organizations must meet Homeland Security Presidential Directive 12 (HSPD-12), NIST guidance and other security mandates for smart card authentication. Active Directory and Windows-based PCs have supported smart card authentication for years. But many organizations want to extend smart card use to other platforms such as Apple Mac and Linux. Figure 6 AD-based smart card authentication for Macs Centrify not only supports AD-based smart card authentication on Mac and Red Hat and CentOS Linux for the most commonly used CAC, CACNG, PIV and PIV-I smart cards, but it has also certified its solution with numerous agencies. For example, Centrify s support for the Department of Defense s Common Access Card (CAC) standard is certified by the Joint Interoperability Test Command (JITC) and has additionally earned the Certificate of Networthiness (CoN) from the U.S. Army Network Enterprise Technology Command (NETCOM). Centrify has further obtained FIPS Level 1 validation for the Centrify Crypto Module providing the core cryptography and the entire solution is also Common Criteria certified at EAL CENTRIFY CORPORATION ALL RIGHTS RESERVED
11 WHITE PAPER Summary Integrating new platforms into existing infrastructure can be a complex, risky, disruptive and expensive undertaking. But the trend towards using modern mobile devices and computing technologies is undeniable and the push to use these modern platforms in workplace scenarios is only going to increase over time. And yet, organizations need to proceed cautiously before adopting these new platforms to maintain uncompromised security and control over sensitive applications and data used on corporate networks. Plus, managing devices is only half the challenge. IT needs to ensure that workers who use these devices are properly authenticated and are granted access to only the applications, data and resources they need to do their jobs. Finally, any new platform added to an organization should not result in the need to deploy a whole new management and security infrastructure to support the new platform. Using existing tools, processes, policies, staff and IT skills is the best path for ensuring long-term success for the adoption of new platforms. With its best-in-class Active Directory support for Mac and mobile platforms, its decade of experience supporting over 5,000 enterprise customers and its forward-thinking solution that leverages existing Microsoft-based infrastructures while also supporting mobile scenarios via cloud-based services, Centrify is in the best position to support any sized organization that wants to add Macs and mobile devices in the enterprise. For more information on Centrify s solutions for Apple Mac, visit: Centrify provides unified identity management across data center, cloud and mobile environments that result in single sign-on (SSO) for users and a simplified identity infrastructure for IT. Centrify s unified identity management software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and enterprise mobility management. SANTA CLARA, CALIFORNIA +1 (669) EMEA +44 (0) ASIA PACIFIC BRAZIL LATIN AMERICA sales@centrify.com WEB WHP001531EN CENTRIFY CORPORATION. ALL RIGHTS RESERVED (669)
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationOffice 365 Single Sign-On: High Availability Without High Complexity
WHITE PAPER Office 365 Single Sign-On: High Availability Without High Complexity WWW.CENTRIFY.COM Office 365 Single Sign-On: High Availability without High Complexity Contents Abstract 3 Introduction 4
More informationAn Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationActive Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
More informationGoogle Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
More informationSamsung KNOX: An Overview for Business Customers
CENTRIFY WHITE PAPER. SEPTEMBER 2013 Samsung KNOX: An Overview for Business Customers Abstract Samsung, the mobile device market leader, has introduced Samsung KNOX for its Android-based mobile platforms
More informationWindows Least Privilege Management and Beyond
CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has
More informationCentrify OS X Basic Jump Start
CENTRIFY DATASHEET Centrify OS X Basic Jump Start The Centrify OS X Jump Start gives organizations the training and hands-on experience to rapidly deploy Centrify's solution for Identity, Policy and Device
More informationWhat s New in Centrify Privilege Service Centrify Identity Platform 15.4
CENTRIFY PRIVILEGE SERVICE WHAT S NEW What s New in Centrify Privilege Service Centrify Identity Platform 15.4 Centrify Privilege Service Centrify Privilege Service is a cloud-based password and access
More informationA Practical Path to Unified Identity Across Data Center, Cloud and Mobile
C E N T R I F Y W H I T E P A P E R A Practical Path to Unified Identity Across Data Center, Cloud and Mobile Abstract The major trends challenging IT organizations today are the increasing heterogeneity
More informationCentrify Server Suite Management Tools
SERVER SUITE TECHNICAL BRIEF Centrify Server Suite Management Tools Centrify Server Suite includes - at no extra charge - a powerful set of management tools in all editions: Centrify Identity Risk Assessor
More informationDirect Control for Mobile & Supporting Mac OS X in Windows Environments
Direct Control for Mobile & Supporting Mac OS X in Windows Environments Leveraging Existing IT Staff Knowledge, Processes and Infrastructure to Support Mac OS X Systems and Their Users Ed Frola Senior
More informationManaging UNIX Generic and Service Accounts with Active Directory
APPLICATION NOTE Managing UNIX Generic and Service Accounts with Active Directory Published: June 2007 Abstract Generic accounts are commonly used to enable UNIX administrative staff to log on to a computer
More informationCentrify Identity and Access Management for Cloudera
Centrify Identity and Access Management for Cloudera Integration Guide Abstract Centrify Server Suite is an enterprise-class solution that secures Cloudera Enterprise Data Hub leveraging an organization
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationImproving Mobile Device Security and Management with Active Directory
CENTRIFY WHITE PAPER, FEBUARY 2012 Improving Mobile Device Security and Management with Active Directory An overview of mobile device market trends, challenges and approaches to securing and managing smart
More informationTop Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution
WHITE PAPER Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution WWW.CENTRIFY.COM Top Six Things to Consider with an Identity as a Service (IDaaS) Solution Contents Executive Summary
More informationCentrify-Enabled Samba
CENTRIFY CORP. Centrify-Enabled Samba DECEMBER 2009 The easy-to-manage enterprise solution for Active Directory-enabled Samba file sharing ABSTRACT Samba is one of the most popular open source technologies
More informationCentrify DirectAudit Jump Start Service
CENTRIFY DATASHEET Centrify DirectAudit Jump Start Service What is the Centrify DirectAudit Jump Start Service? The Centrify DirectAudit Jump Start Basic Service is designed to give customers a quick start
More informationSingle Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory
W H I T E P A P E R C E N T R I F Y C O R P. M A Y 2008 Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory The Active Directory-Based Single Sign-On Solution
More informationManage Your Mac with Active Directory Group Policies
Manage Your Mac with Active Directory Group Policies How to secure Mac OS X systems with your Active Directory infrastructure WWW.CENTRIFY.COM Manage your Mac with Active Directory Group Policies Contents
More informationCentrify Identity Service and Mac - Online Training
C E N T R I F Y D A T A S H E E T M A R C H 2015 Centrify Identity Service and Mac - Online Training Overview This course is designed for administrators of the Centrify User Suite and mobile devices. At
More informationThe Centrify Vision: Unified Access Management
The Centrify Vision: Unified Access Management Control, Secure and Audit Access To Your On-Premise and Cloud-based Infrastructure On-premise Centrify the Enterprise Cloud Personal Devices Mobile Devices
More informationStop Password Sprawl with SaaS Single Sign-On via Active Directory
CENTRIFY WHITE PAPER Stop Password Sprawl with SaaS Single Sign-On via Active Directory Abstract Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional
More informationCentrify Mobile Authentication Services for Samsung KNOX
Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationSpeeding Office 365 Implementation Using Identity-as-a-Service
August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com
More informationMajor Retailer Achieves Compliance With the PCI Data Security Standard
Leading Online Retailer INDUSTRY Online retail clothing sales COMPANY PROFILE This world-class apparel business operates multiple enterprises under multiple brands. BUSINESS SITUATION Had difficulty meeting
More informationOverview of Microsoft Enterprise Mobility Suite (EMS) Cloud University
Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1
More informationidentity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationActive Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper
Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
More informationUsing Apple Remote Desktop to Deploy Centrify DirectControl
APPLICATION NOTE Using Apple Remote Desktop to Deploy Centrify DirectControl Published: June 2007 Abstract Apple Remote Desktop is commonly used by administrators to perform various administrative management
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationVirtualization Case Study
INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access
More informationCentrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
More informationHow To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationCentrify Express72 Jump Start Upgrade Service
CENTRIFY DATASHEET JUNE 2015 Centrify Express72 Jump Start Upgrade Service Summary This Jump Start package streamlines the migration from Centrify Express Edition for UNIX and Linux to Centrify Server
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationMacintosh Printer Management using Centrify DirectControl Group Policies
WHITE PAPER CENTRIFY CORP. MARCH 2010 Macintosh Printer Management using Centrify DirectControl Group Policies ABSTRACT This white paper examines various approaches to managing printer configuration files
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationCentralized Mac Home Directories with ExtremeZ-IP
APPLICATION NOTE Centralized Mac Home Directories with ExtremeZ-IP Published: July 2009 Abstract Organizations wanting to integrate Mac OS X systems into their Windows-based enterprise network will most
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationActive Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
More informationAddressing the United States CIO Office s Cybersecurity Sprint Directives
RFP Response Addressing the United States CIO Office s Cybersecurity Sprint Directives How BeyondTrust Helps Government Agencies Address Privileged Account Management and Improve Security July 2015 Addressing
More informationActive Directory Compatibility with ExtremeZ-IP
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices White Paper Group Logic White Paper October 2010 About This Document The purpose of this technical paper is to discuss how ExtremeZ-IP
More informationAutomating Cloud Security with Centrify Express and RightScale
QUICK START GUIDE. MAY 2011 Automating Cloud Security with Centrify Express and RightScale How to secure cloud systems by joining them to your Active Directory infrastructure Abstract This Quick Start
More informationWhat s New in Centrify Server Suite 2015
C E N T R I F Y S E R V E R S U I T E 2 0 1 5 W H A T S N E W What s New in Centrify Server Suite 2015 Centrify Server Suite Standard Edition Hadoop support Big Data adoption by industry is around 25%
More informationHow To Use Directcontrol With Netapp Filers And Directcontrol Together
Application Note Using DirectControl with Network Appliance Filers Published: June 2006 Abstract This Application Note describes the integration between Network Appliance servers and Centrify DirectControl
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationEverything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace
Everything You Need to Know About Effective Mobile Device Management mastering the mobile workplace Table of Contents Introduction... 3 1. What exactly is Mobility Management Anyway?... 4 Impenetrable
More informationSecuring VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite
WHITE PAPER CENTRIFY CORP. MARCH 2009 Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite Securing and auditing administrative access to the Virtual Infrastructure
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationWho Moved My Secure Perimeter?
WHITE PAPER Who Moved My Secure Perimeter? Six risks and opportunities to strengthen security using Identity-as-a-Service WWW.CENTRIFY.COM Who Moved My Secure Perimeter? Contents Introduction 3 Risk #1:
More informationHow To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationHow to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationFrequently asked questions
Frequently asked questions For more information, visit Usher.com info@ Toll Free (US ONLY): 888.656.4464 Direct Dial: 703.848.8710 1 What is Usher? Usher is a mobile identity platform designed to provide
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationWhat s New in Centrify Server Suite 2014
CENTRIFY SERVER SUITE 2014 WHAT S NEW What s New in Centrify Server Suite 2014 The new Centrify Server Suite 2014 introduces major new features that simplify risk management and make regulatory compliance
More informationApps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.
Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying
More informationIdentity & Access Management in the Cloud: Fewer passwords, more productivity
WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationWhat s New in Centrify Server Suite 2013 Update 2
CENTRIFY SERVER SUITE 2013.2 DATA SHEET What s New in Centrify Server Suite 2013 Update 2 The new Centrify Server Suite 2013 Update 2 (2013.2) builds on the core enhancements Centrify introduced in Server
More informationA Security Overview of the Centrify Cloud
A Security Overview of the Centrify Cloud How your end users usernames and passwords are kept secure within the Centrify Cloud Information in this document, including URL and other Internet Web site references,
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationCentrify Server Suite, Standard Edition Design Service
Centrify Server Suite, Standard Edition Design Service What is the Centrify Server Suite, Standard Edition Design Service? This package creates a design document consistent with Centrify s best practices
More informationSamsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
More informationUsing Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationNew Choices in Windows * Device Management
White Paper 4th Generation Intel Core Processors and Intel Atom Processors Intel and Windows 8.1* Mobility New Choices in Windows * Device Management Considerations in Deciding How to Manage Windows Devices
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationCloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationEnforcing Enterprise-out Security for Cloud Servers
WHITE PAPER Enforcing Enterprise-out Security for Cloud Servers By David McNeely Publication Date: March 2011 Cloud-based computing models offer the promise of a highly scalable compute infrastructure
More informationMcAfee Enterprise Mobility Management
McAfee Enterprise Mobility Management Providing mobile application enablement and HIPAA security compliance Table of Contents HIPAA and ephi 3 Overview of 3 HIPAA Compliance for Remote Access 4 Table 1.
More informationBecoming PCI DSS Compliant
WHITE PAPER Becoming PCI DSS Compliant 10 Key Security Requirements WWW.CENTRIFY.COM Becoming PCI DSS Compliant - 10 Key Security Requirements Contents Abstract 3 PCI Requirements Applicability Summary
More informationPipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com
Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationPipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring
More informationLikewise Security Benefits
Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers
More informationWindows Security and Directory Services for UNIX using Centrify DirectControl
SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationThe Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationUsing Centrify s DirectControl with Mac OS X
WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Using Centrify s DirectControl with Mac OS X Centralized, Active Directory-based authentication, access control and policy enforcement for Mac OS X systems in Windows
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationCoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
More informationThe Challenges of Managing Multiple Cloud Identities and Enterprise Identity by BlackBerry
MANAGING CLOUD APPS IN THE ENTERPRISE How to Overcome the Complexity Whitepaper 2 The Trouble with Managing Multiple Cloud Identities Over the last decade, cloud-based apps have become fundamental to how
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More information