SecureAuth homes in on BYOD management and mobile app access
|
|
- Bernice Lindsey
- 8 years ago
- Views:
Transcription
1 SecureAuth homes in on BYOD management and mobile app access Analyst: Steve Coplan 16 Apr, 2012 Securing access to enterprise applications from smartphones and mobile tablets has percolated to the top of the average CISO's to-do list. And, with the new class of tablets (whether Android or Apple ios devices), it's become apparent that managing the device is only part of the story. The challenge is as much bringing the devices under enterprise management as it is contending with the topology created by a set of vectors including SaaS application adoption and the shifting composition of the user population. As we outlined in a recent spotlight, with the advent of shared endpoints, shared Internet use and multiple cloud and hosting services, the enterprise is becoming more of an idea rather than a concrete entity a verb rather than a noun. For the moment, the response by enterprises to the BYOD wave has largely been tactical even as larger vendors make investments through acquisitions to eventually address the trend strategically. Enterprises have looked to enroll employee devices within existing management frameworks, contending with certificate management challenges, as well as providing a dedicated mobile access portal or app that isolates session with enterprise resources. Authentication in these scenarios is directed against an enterprise store, so that a set of internal credentials can be used for sessions initiated from a mobile device. A longtime player in the integrated authentication, federated identity and SSO market, SecureAuth like its peers views the disruption to traditional topologies as an opportunity to introduce a new access management model. SecureAuth is, however, one of the few vendors in the space that combines authentication mapping with native certificate management, allowing it to deal with both certificate management and securing access to what is sure to be the most prevalent use case for mobile tablets: Microsoft Exchange . Still small but growing at a rapid clip, mobile access management for cloud-based applications could set SecureAuth on a steeper trajectory. Copyright The 451 Group 1
2 The 451 Take We have seen the view that mobile is not simply an incremental management and security use case, but a fundamental shift in enterprise IT, swiftly take hold. The BYOD wave certainly strains the limits of mobile device management, and quickly shifts the focus to securing the user and the application. But as IT managers struggle to come to terms to with it, will they take a tactical path to incorporate mobile device access, wait for incumbents to assimilate their acquisitions or revisit their access management assumptions in tandem with SaaS adoption? SecureAuth needs to be able to play all these angles to make the most of the opportunity. Context SecureAuth IdP is deployed as an appliance that effectively acts as a front end for the enterprise directory and validates both user credentials and software tokens against a directory entry in an encrypted three-step process. Rather than use cookies or an embedded agent to serve as the mechanism for software-based authentication, SecureAuth uses managed code based on client-side SSL encryption, which also serves to limit the man-in-the-middle attacks on the end-user side, and limit phishing of user credentials from the server side. The enrollment is user-initiated, based on a one-time activation with no administrative privileges required for registration of the client. SecureAuth describes its architecture as a 'funnel' that takes in a range of authentication inputs whether it's a SAML assertion, an OAUTH token, a Kerberos ticket associated with a set of Active Directory credentials or a RADIUS login and then maps that authentication artifact to a set of application authorizations. While a not-insubstantial proportion of its business is generated with straightforward replacement of hardware tokens used for well-established use cases like remote access through SSL VPNs based on cost and administrative overhead, taking the next step toward SaaS access management is increasingly featuring as a driver for technology acquisition. Typically, organizations are looking to manage access to Saas applications as well as propagate identities and synchronize policies across third-party services based on internal logic. We have described this as an 'enterprise out' approach. The question that mobile raises is how to bring mobile devices that are not resident on the network, or directly associated with a specific user profile, into existing access management frameworks especially authoritative stores like Microsoft Active Directory. Technology Although mobile and mobile computing ultimately combine to undermine the assumptions that underlie existing security and management approaches (as we have outlined in a recent spotlight), this process will play out over time. Instead, enterprises are wrestling with ways to enable access from tablets and mobile devices while meeting security, access controls, visibility and compliance reporting requirements. For vendors providing authentication, federated identity and SSO, this presents an opportunity, but one that requires deeper hooks into the mobile environment to exploit. The fundamental issue that IT departments and security teams face with BYOD (bring your own device) is that they cannot stand in the way of mobile adoption both because of user preferences, and because there are obvious productivity gains for the organizations. However, mobile adoption generates two major issues: there is no direct control over the device by IT or security, and traditional enforcement of on-device data use and applications can't be readily extended to employee devices accessing corporate resources. One approach is, of course, to implement mobile device management which is certainly the direction that many Copyright The 451 Group 3
3 large organizations have already moved in. But even as mobile proliferation (especially of Apple ios and Google Android devices) has lifted the fortunes of MDM vendors, and drawn in larger IT vendors like HP, IBM and Symantec, the scope is still largely around the device itself, rather than the applications or the user profile. And even as many vendors look to create self-contained execution environments to run enterprise applications, there is still the need to authenticate mobile users against an authoritative enterprise user store and associate the device with a particular user. Some enterprises have gone down the path of creating a portal specifically for access to mobile applications, which serves the purpose of segmenting out a set of applications that can be accessed from mobile devices, but can err on the side of being overly prescriptive, and still creates the need to systematically manage access requests, authorizations as well as authentication. is of course the most widely used productivity application and expanding accessibility generates clear productivity gains. This makes access from mobile devices probably the most pressing issue for IT security and managers. And since Microsoft Exchange is the most prevalent platform, that means coming to terms with Exchange Active Sync. Exchange ActiveSync (EAS) is an XML-based protocol that has been extant for several years for synchronization from a messaging server to a mobile device. The issue that enterprises immediately encounter with ActiveSync is that the protocol makes use of a Microsoft Kerberos token for authentication, and synchronization hinges off a set of Microsoft AD Group Policies. This is clearly an integration challenge for Apple ios or Google Android devices. SecureAuth had already launched a set of capabilities for supporting SSO from Apple ios and Google Android mobile devices (building on existing mobile OS support), as well as automated enrollment and management of X.509 device-side certificates. Now the company has looked to extend those capabilities to bridge ios device-side certificates with Microsoft infrastructure through its 'funnel.' In this scenario, SecureAuth serves to broker the ios profiles, and the Microsoft Kerberos tokens that govern ActiveSync. The value proposition is that enterprises can maintain a user profile on the device, while users get the benefit of access from the mobile device of their choice. The use case is significant not just because it illustrates the strengths of SecureAuth's platform. It also allows the company to position itself as a substitute for mobile device management for smartphones and mobile tablets, as well as establish a strategic footprint as enterprises migrate from Exchange to GoogleApps. SecureAuth already has partnerships in place with GoogleApps specialist systems integrator Agusto Systems for implementing access management to the set of SaaS applications. With the ActiveSync capability in place, SecureAuth can also facilitate the migration from Exchange to GoogleApps, and maintain the user experience even as it expands coverage to BYOD devices. However, the market is a hotly contested one, and functionality is only one element in the equation. Competition SecureAuth's competitive landscape can be segmented into the new breed of authentication vendors (especially those integrating SSO and authentication), incumbent authentication vendors it is looking to replace hardware tokens for use cases like remote access, and players in the identity-in-the-cloud arena looking toward SaaS access management. To that list we would add companies making a move to subsume some mobile device management functionality where we have already seen incumbent players like IBM, Symantec and SAP make their moves. SecureAuth would not necessarily compete with out-of-bound authentication providers like PhoneFactor or SMS PASSCODE, and in fact would argue that its platform is designed to integrate with third-party authentication methods. However, the company would consider hardware tokens from EMC security division RSA to be a primary replacement target. Symantec has certainly made its strategic goals explicit in the mobile security realm with the recent acquisitions of Odyssey Software and Nukona. For Symantec, the strategic goal is to bring together device management (which was bolstered by the Odyssey acquisition), mobile anti-malware, application management (where Nukona fits in) and management of Web-based mobile apps. Also, where the opportunity is replacement of hardware tokens in the first instance, we would frame CA Technologies' CloudMinder and Symantec's VIP service as significant players (Symantec's O3 initiative and Copyright The 451 Group 4
4 parallel mobile acquisitions could point to the vendor becoming a significant presence in mobile access management). Both vendors have seen significant growth over the past 12 months. We would certainly position Intel-McAfee's Cloud SSO service that integrates on-demand one-time password authentication, federation and SSO to SaaS applications. Equally, we see Okta, and Ping Identity with its newly launched CloudDesktop portal capabilities, as significant competitors for SaaS access management. SecureAuth argues that it encounters Okta and its platform-native authentication options including a branded mobile endpoint soft token mostly in smaller accounts. Okta counters that it sees SecureAuth in prospects where the primary requirement is replacement of hardware tokens. Ping, on the other hand, has only recently made its presence felt in the market, but does have a strong brand and integrated mobile and OAuth services. In the area of mobile certificate management, we have already seen Centrify weigh in with its DirectControl for Mobile. DirectControl for Mobile is designed to authenticate, control and manage smartphones and tablets (principally Apple ios, Google Android) through a set of Microsoft Active Directory extensions. Joining the devices to internal policies through authentication to Microsoft AD allows organizations through AD Group Policy and AD Users and Computers policies to centrally define which devices are assigned to a user, the properties of each device, which corporate applications can run on mobile devices, and how those devices can access corporate networks and resources, and remotely lock and wipe mobile devices. The distinction here is the point of departure. Centrify is still primarily a management company, rather than an identity management player. But as Centrify moves into SaaS access management, more direct competition could ensue. We also see mobile device management vendors coming at the market requirement in conjunction with partners for credential management, specifically Echoworx in order to associate a device with a digital certificate, and manage certificates within their framework. However, SecureAuth has long been able to demonstrate how its platform overcomes the limitations of PKI infrastructure. Microsoft security software specialist Certified Security Solutions has also launched a product to enroll ios devices and centrally manage device-side certificates. SWOT Analysis Strengths Weaknesses SecureAuth has a specific value proposition for a mobile application use case that is large and prevalent and one that builds on its platform's strengths. The company is still fighting a perception problem as an authentication specialist. Opportunities Threats Mobile is both a tactical sales opportunity and a strategic play. Still, the transformation of an identity from within the four walls of an enterprise to a portable, logical entity encapsulated in a trust model presents a broad and horizontal opportunity. Even as SecureAuth sees its revenue expand, the window of opportunity is being compressed by new market entrants incumbents and insurgents alike. Copyright The 451 Group 5
5 Reproduced by permission of The 451 Group; This report was originally published within 451 Research s Market Insight Service. For additional information on 451 Research or to apply for trial access, go to: Copyright The 451 Group 6
I D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T E n f o r c i n g I dentity a nd Access Management i n C l o u d a n d Mobile Envi r o n m e n t s November 2012 Adapted from Worldwide Identity and Access Management
More informationMIS Impact Report Duo Security looks to shake up authentication market with mobile and service focus Analyst: Steve Coplan 5 Dec, 2011 Duo Security named for the two-factor authentication technology for
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationAn Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationHow to Get to Single Sign-On
How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
More informationAuthentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business
Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationIdentity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
More informationSECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationMoving Beyond User Names & Passwords
OKTA WHITE PAPER Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationHow to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationDirect Control for Mobile & Supporting Mac OS X in Windows Environments
Direct Control for Mobile & Supporting Mac OS X in Windows Environments Leveraging Existing IT Staff Knowledge, Processes and Infrastructure to Support Mac OS X Systems and Their Users Ed Frola Senior
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationAgenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details
Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work
More informationMobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
More informationThe Centrify Vision: Unified Access Management
The Centrify Vision: Unified Access Management Control, Secure and Audit Access To Your On-Premise and Cloud-based Infrastructure On-premise Centrify the Enterprise Cloud Personal Devices Mobile Devices
More informationSecuring Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationConnecting Users with Identity as a Service
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
More informationMobile Security and Management Opportunities for Telcos and Service Providers
Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile
More informationSpeeding Office 365 Implementation Using Identity-as-a-Service
August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com
More informationTrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
More informationBen Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
More informationMoving Beyond User Names & Passwords Okta Inc. info@okta.com 1-888-722-7871
Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 Moving Beyond
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationTRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE
White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and
More informationDell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
More informationFederated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationSymantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
More informationOkta Mobility Management
Okta Mobility Management A User Centric Approach to Integrated Identity and Mobility Management Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 info@okta.com I 1-888-722-7871 Contents
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationHow To Manage A Plethora Of Identities In A Cloud System (Saas)
TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities
More informationPULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationThe Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices
The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices Essay Authors Ted Shorter, CTO, Certified Security Solutions, Inc. Wayne Harris, PKI Practice Lead, Certified Security
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationGuide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
More informationWhite Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
More informationA Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationMobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition
Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the
More informationWhite Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
More informationMobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationEnterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
More informationNubo Software's UX over IP brings network efficiency to virtual mobile infrastructure
Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Analyst: Chris Hazelton 24 Aug, 2015 The fact that mobile computing is now displacing a share of 'traditional computing'
More informationThree Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
OKTA WHITE PAPER Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-3waysad-113012 Table
More informationnexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
More informationCloud User and Access Management
KuppingerCole Report LEADERSHIP COMPASS Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud
More informationWorkday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
More informationFlyer 1. Meet evolving enterprise mobility challenges with Samsung KNOX
Flyer 1 Meet evolving enterprise mobility challenges with Samsung KNOX Solve today s dynamic enterprise mobility demands with the right solution platform Enterprise Mobility Trends The growth of enterprise
More informationInfrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune
Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune Enrollment and Management of Mobile Devices with Microsoft System Center Configuration
More informationAddressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Addressing the BYOD Challenge with Okta Mobility Management Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Executive Summary The Impact of BYOD BYOD can be a very polarizing
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationPick Your Identity Bridge
Pick Your Identity Bridge Options for connecting users and resources across the hybrid cloud Executive Overview Enterprises are increasing their use of software as a service (SaaS) for two principal reasons:
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationThe top five enterprise mobility management vendors: product focus and financials
The top five enterprise mobility management vendors: product focus and financials Analyst: Chris Hazelton 21 Apr, 2015 Enterprise mobility management (EMM) is becoming a big business, but who are the biggest
More informationExecutive s Guide to Cloud Access Security Brokers
Executive s Guide to Cloud Access Security Brokers Contents Executive s Guide to Cloud Access Security Brokers Contributor: Amy Newman 2 2 Why You Need a Cloud Access Security Broker 5 You Can t Achieve
More informationIBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
More informationApps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.
Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying
More informationMicrosoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
More informationEnable Your Applications for CAC and PIV Smart Cards
Enable Your Applications for CAC and PIV Smart Cards Executive Summary Since HSPD-2 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationCentrify Mobile Authentication Services for Samsung KNOX
Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under
More informationMobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationexpanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
More informationWhite paper Contents
Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Management Challenges of Software
More informationStop Password Sprawl with SaaS Single Sign-On via Active Directory
CENTRIFY WHITE PAPER Stop Password Sprawl with SaaS Single Sign-On via Active Directory Abstract Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional
More informationAuthentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS
Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime
More informationWHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory
WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationSamsung KNOX: An Overview for Business Customers
CENTRIFY WHITE PAPER. SEPTEMBER 2013 Samsung KNOX: An Overview for Business Customers Abstract Samsung, the mobile device market leader, has introduced Samsung KNOX for its Android-based mobile platforms
More informationSmart Devices @ Givaudan. From BYOD experience to new mobile opportunities
Smart Devices @ Givaudan From BYOD experience to new mobile opportunities 2 Givaudan What s going on? Consumerization of IT Personal device proliferation Personal cloud services proliferation Millenials
More informationIntegrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
More informationSecure Access Control for Mobile, Cloud, and Web Apps
Secure Access Control for Mobile, Cloud, and Web Apps SecureAuth IdP is a revolutionary platform that provides flexible and secure access control through strong authentication, single sign-on, and user
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationTwo-Factor Authentication
WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance
More informationThe Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
More informationRFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
More information