1 Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers extensive support for Apple ios, Google Android, and Windows Phone, and basic support for BlackBerry smartphones and tablets. Basic support means we can require use of a password or PIN to unlock, and perform a remote wipe (restore factory settings). We support specific devices within each platform release, so please ask your sales representative for the most up-to-date list of tested devices. Q: Why shouldn t I use Microsoft Exchange, Apple iphone Configuration Utility (ipcu), or other device management solutions? A: Enterprise-class support requires control across the entire lifecycle of the device, not just password/pin unlock and remote wipe, and is most efficient when device management integrates into other endpoint and security management processes. Our features allow you to scale support to the service levels and devices your users require and enforce the policies your business and regulators demand: Self-service device activation, including a user agreement process Group-based policy configuration (tied to Microsoft Active Directory or Lotus Domino LDAP) Automatic and personalized configuration of enterprise services, including VPN, , and Wi-Fi Enterprise App Store for recommended or required applications Strong authentication Encryption management Over-the-air push updates of security policies and configurations Compliance enforcement, visibility, and reporting Support across device platforms, directories, and platforms Exchange and other device-specific manage-ment tools offer subsets of these functions for specific applications and devices. We offer a comparable minimum feature set pin unlock and remote wipe for all supported platforms, plus more capabilities where feasible. Q: I already use Microsoft Exchange to manage my devices. Why should I switch to McAfee EMM? A: Microsoft Exchange, using ActiveSync, can exercise partial control over the device only after Exchange has been configured. Initial device configuration with Exchange is complicated, compared to the easy automated process with McAfee EMM. Further, Exchange can provide only full wipe, not selective wipe. McAfee EMM can selectively wipe parts of the device (for example Exchange synced , contacts, and calendars) in addition to the whole device (user data, configurations, and credentials). This is vital when an organization allows employee-owned devices on the network, where IT might want to wipe the corporate /data only and leave personal information or photos in place. In addition, McAfee EMM uses a client certificate on the device to support strong or two-factor authentication, enabling push without the performance overhead or complexity of a VPN. Finally, security administrators can use the same environment to report on compliance of laptops and mobile devices, without a dependency on servers and administrators. Q: What is the role of Microsoft ActiveSync? A: ActiveSync is a highly scalable protocol that provides limited policy management capabilities. McAfee EMM leverages Microsoft ActiveSync for and personal information management (PIM) sync, while complementing ActiveSync by providing scalable, efficient lifecycle manage-ment for mobile devices. McAfee EMM manages the whole lifecycle including: Self-service provisioning All policies and configurations
2 Selective and full device wipe Strong authentication Compliance enforcement, visibility, and reporting Mobile application enablement beyond and PIM Support across device platforms, directories, and platforms Q: Is support the same for all Android devices? A: The most complete support is available for Android devices running version 2.2 or later. These devices can be provisioned by down-loading the McAfee EMM App available at the Android Marketplace. McAfee EMM is installed on supported Android devices when they provision, providing support for compliance enforcement, remote lock/unlock, remote uninstall, passcodes, Wi-Fi, and for some Androids, remote wipe and VPN configurations. For example, the Motorola Droid Pro running v2.2 and higher includes the following capabilities: List installed apps Automatically configure Microsoft Exchange Passcode policy Wi-Fi VPN Compliance Remote wipe Uninstall (removes all configuration done by Agent except exchange configuration) Lock and unlock (reset password) Non-Motorola Android devices running v2.2 and above require the user to install and configure ActiveSync manually on the device AFTER provisioning McAfee EMM via the Marketplace. Devices running Android v2.1 and below can only be provisioned by manually configuring Exchange ActiveSync and are limited to policies for passcode, compliance, and remote wipe. Q: What s the difference between McAfee EMM and the Apple iphone Configuration Utility (ipcu)? A: The iphone supports a Microsoft ActiveSync client that actively enforces protocol policies. However, ActiveSync policies currently govern only a subset of the Apple iphone, ipad, and ipod Touch features. This includes enforcement of 12 policies for defining how device passwords are used. Apple provides the ipcu to help administrators create and personalize configuration profiles (for example, , VPN, and Wi-Fi settings) for individual user devices. However, the use of this tool makes it difficult to configure devices en masse since the burden of creating and storing a unique profile for each user lies with the administrator. McAfee EMM combines Apple configuration profiles and ActiveSync policy management into a single device management solution that uses group-based policy management: a device is associated with a user that is associated with a group. This approach allows for one-to-many policy management that simplifies large-scale deployment of Apple devices while also configuring each device to meet the unique needs of each user. The McAfee EMM solution provides a compre-hensive profile service, automating the creation and secure distribution of configuration profiles without sacrificing the ability to personalize iphones. This capability includes the dynamic creation of configuration profiles; group-based distribution and customization of configurations; and compliance enforcement to ensure the persistence of configurations once set on the device. Configuration profile policies can include: Administrative profile lock Maximum number of failure attempts before local wipe Require passcode Allow explicit content Require alphanumeric passcode Allow browser use
4 Q: When and how can I implement wipe operations? Are there any limitations? A: EMM supports two kinds of wipe: full and selective wipe. Full wipe takes the device back to factory settings for firmware and applications. It is ideal when the user loses a device. It works even if encryption is active. Selective wipe allows IT to manage enterprise data ( , contacts, and calendars) on the phone, but leaves intact the user s personal information and content (such as an itunes library and photos). You cannot uninstall applications. Selective wipe is not yet available for Android devices. Q: What happens if the SIM is removed before a device is wiped? A: Even if the SIM is removed, the device is protected with the PIN. If the password is entered too many times, the device can be set to auto-wipe. However, if you do not use encryption, the SD card itself might be read before the wipe is performed, allowing a thief access to sensitive information on the SD card. Getting Started Q: What is the setup process for the administrator? A: Our installer configures all prerequisite software for you, typically in less than half an hour, then McAfee EMM helps you configure, enforce, and manage native device security settings for the devices we support. Here are the steps: Pre-install helper checks the environment to ensure all necessary software and firewall ports are open. The helper also creates the MDM certificate request for Apple. Set up the roles-based console to use Active Directory (AD) or Domino LDAP credentials and leverage directory security groups PKI users set up Enrollment Agents and Certificate Authorities Create a group in the directory, populate that group, and associate that group with the role of system administrator. You can define policies for each user based on the type of device used and the security appropriate to each user s role. Create policies, assign policies to groups, and associate groups with policies Finally, define the types of connections and services users/groups can access, including VPN, Wi-Fi, messaging, and line of business applications Q: Is there anything special I need to do to make McAfee EMM work with Apple MDM? A: For Apple mobile devices, McAfee EMM installs MDM at provisioning, keeping the device connected to the McAfee EMM server at all times. To enable MDM in your enterprise environment, even for a proof of concept or hosted solution, you must join the Apple ios Developer Enterprise Program, which has a modest annual fee. Register your MDM application, and obtain an Apple MDM certificate at It takes approximately one week for Apple to process applications. Q: How do you provision users and applications? A: Once you are satisfied with your policies, users can provision their own devices over-the-air from a self-service interface. End-users can check to see if their service accounts exist and if one does not, request the creation of a new account. If the account is disabled, a user will not be able to provision a device to the environment. We support several app store options where users can download McAfee EMM and approved or required applications:»» McAfee Enterprise App Store: The McAfee EMM Enterprise App store appears in the Recommended App tab of the McAfee EMM Agent and can be managed or viewed using McAfee epolicy Orchestrator (McAfee epo ). McAfee EMM can create a list of recommended apps based on attributes such as user, roles, and sub-lists that can then be sent to individuals or groups. Alternatively, administrators can provide a customized database of web clips and applications sourced from public app stores such as the Apple App Store or the Android Marketplace. Administrators gain visibility into device application inventory, audit, policy management and users do not have to visit a public app store to locate a recommended app.»» itunes App Store: Download the McAfee EMM agent, enter credentials (Exchange, Domino, or Gmail user name and password), and agree to the corporate policy. IT services are provisioned automatically. The McAfee EMM solution pushes them using an encrypted profile.
5 »» Android Marketplace: Download the McAfee EMM agent, enter credentials (Exchange, Domino, or Gmail user name and password), and agree to the corporate policy. IT services are provisioned automatically. Updates to security policies and configurations are pushed in real time to the device over-the-air, including selective and remote wipe if the device is lost or stolen Q: What happens when a user wants to activate a different device? A: Just provision the new one, and they can keep both. Or, if only the new device is to be used, IT can use the management console to explicitly retire or wipe the old device using an administrative password. For Android devices a one time password can be used for an added layer of security and to enforce the use of a single device per user. Q: Can I control who can provision devices? A: You can pre-populate (whitelist) selected users that are allowed to provision, and therefore connect to the corporate network, or you can allow all users. Applications and Personal Content Q: Can I blacklist or whitelist applications? A: You cannot blacklist or whitelist applications entirely. On Apple devices, you can ban (blacklist) certain native applications such as YouTube, Safari, and itunes explicitly. You can also restrict the installation of applications that are not recommended in your enterprise app store. Q: How can I provide access to in-house developed applications? A: To distribute your own application, you can: Place it in EMM s enterprise app store where it appears as a tab on the McAfee EMM device agent Upload it to the Apple App Store or Android Marketplace Physically tether the device and download the application directly to each device, then configure it with the platform utility, such as the iphone Configuration Utility (ipcu) Q: Does McAfee EMM have access to personal or other personal information on the device? A: Although we can delete personal data with a selective or total remote wipe, we do not back up or restore that data. We cannot download personal information from the device to the enterprise server. Q: What capabilities can be personalized? A: McAfee EMM can personalize the configuration of the device to enable user access to IT services. Automated activation includes these services: Configuration Profile Resource Management Wi-Fi (SSID, hidden network, security type, password) VPN (configuration name, connection type, server, user account, authentication type, shared secret, proxy setup) Exchange (account name, host, use secure sockets layer (SSL), domain, address, password, authentication credentials) Apple profile configurations can also be imported to configure other services for the iphone including lightweight directory access protocol (LDAP), CalDAV, subscribed calendars and non-exchange , and credentials (PKCS1, PKCS12). Also, certain applications can be recommended by device type or role. Q: Users are concerned that adding McAfee EMM to their smartphones will destroy their productivity and be a hassle. How do I reassure them? A: McAfee EMM secures the user s device without being intrusive: it is transparent to the user. Users are required to enter a PIN or password to access the devices, but McAfee EMM uses the native , contacts, and calendar applica-tions on all supported devices to provide the best user experience. Users can answer calls without entering a PIN, and the McAfee EMM software does not affect device battery life or application performance.
6 Compliance Q: What assistance do you offer to help us ensure and maintain device compliance? A: The McAfee EMM console provides centralized reporting, policy management, and role-based access control for administrative and help desk personnel. You can manage policies and devices and get reports through any Silverlightenabled web browser, as well as access dashboards and reports through McAfee epo. You might: Monitor who is trying to connect Use automatic policy enforcement to ensure that only authorized devices from authorized users can connect to enterprise applications and services Require that devices are registered, secured, and up to date with respect to policies, configurations, and operating system versions before allowing a connection Refuse a connection to jailbroken (hard reset) or compromised devices Ensure that when you update a policy (usually per user or group), the policy is applied to the device when the device checks in Monitor compliance status within a McAfee epo dashboard and report details such as policy violations, application inventory, compliance tracking, and lost devices Q: What happens when a noncompliant device tries to connect? A: You can monitor which devices are attempting to access the enterprise, mark any noncompliant (or unapproved) devices, and use these details to work with the user to get, use, or maintain an appropriate device. You can also block non-compliant devices from entering the network. Q: Are there any compliance-related dashboards or reports? A: McAfee epo integration allows centralized dashboards to aggregate mobile device status with other McAfee-secured endpoint status. Administrators can see compliance status and drill directly down to see why devices are not compliant. Report details can roll up with other McAfee epo results to create unified, custom reports across devices, endpoints, and network systems. We provide some audit reports to get you started, including device status, non-compliant device list, and an audit log that notes changes in the console, pending actions, and device health. You can also see device details, such as user, , phone number, device state, device ID, make and model, operating system, assigned security policies, and Active Directory or LDAP membership. A complete system audit log tracks all activity by all users of the McAfee EMM solution, and all reports can be exported to Microsoft Excel. Secure Connection, Authentication, and Communication Q: How does your product secure communications from the IT network to the mobile device? A: Each device is issued a unique digital certificate to strongly authenticate it to the enterprise network. McAfee EMM servers use encrypted Secure Sockets Layer (SSL/HTTPS) connections to ensure all data transmitted between mobile devices and servers is encrypted. iphones that do not have native encryption (prior to the iphone 3GS) can be blocked from accessing your network. For Android devices we offer an extra layer of authentication with the use of a one time password. The admin can choose to require this password for first time provisioning. Q: How does a user authenticate and connect? A: We offer several options for user authentication: Standards-based certificates McAfee EMM integrates with the Microsoft Certificate Authority so every device being provisioned has a unique device certificate to enable strong authentication VPN on demand SSL VPN Q: What sort of strong authentication can I require? A: We rely on certificates on each device for access and for use with encryption. In addition, to sync , you can require strong authentication username and password plus the device certificate. McAfee EMM supports PKI and strong authentication options using provisioning tokens and Enrollment Agents, as well as two-factor authentication such as RSA SecurID.
7 Q: Do you support use of Wi-Fi? A: Yes. Wi-Fi is one of the resources you can control on a device using policies. McAfee EMM can provision the Wi-Fi settings so that the SSID and the passphrases do not need to be given to the users. McAfee epolicy Orchestrator Integration Q: How much integration exists with McAfee epo? A: McAfee EMM software can be installed as an extension of McAfee epo. You can view reports and create a McAfee EMM dashboard from within McAfee epolicy Orchestrator. McAfee EMM launches directly from McAfee epo with a single sign on, displaying data within the McAfee epo dashboard using charts, tables, and other graphics. Integration of McAfee EMM Agent data within McAfee epo dash-boards unifies visibility across McAfee-secured endpoints and mobile devices. Enterprises gain efficiencies in operations and reporting and make mobile device management part of the day-to-day operational workflow within a familiar management environment. Within McAfee epo, you can view device compliance status and drill down seamlessly to see details on noncompliant devices, and also integrate mobile device information in other McAfee epo reports. Initially, compliance management and reporting allows you to audit and report policy violations, device and application inventory, compliance tracking, and lost devices. You can report device hardware, operating system, compromised phone status, and policy and configuration status. Q: What are your future McAfee epo integration plans? A: Integration plans include more extensive policy and management functions. Q: What are some key features of the platform? A: See table below for key McAfee EMM platform features. Q: Where can I learn more about McAfee EMM? A: You can learn more about McAfee EMM on our website (http://www.mcafee.com/us/products/enterprise-mobilitymanagement.aspx) or by calling Areas of Functionality Features iphone Android WinPho7 BlackBerry configuration Enterprise activation and end-user VPN, Wi-Fi settings personalization Certificate distribution with McAfee EMM CA Policies decoupled from servers Unified policy management OTA policy and profile distribution Group based policy management Compliance management Centralized administration Infrastructure Policy compliance Profile compliance Hardware-based device compliance OS level-based device compliance (v2.2 and higher) Comprehensive visibility Help desk Self-service portal for end-users App recommendation and distribution Exchange, Lotus, and Gmail support proxy (Does not support Gmail)
8 2821 Mission College Boulevard Santa Clara, CA McAfee, the McAfee logo, McAfee EMM, McAfee epolicy Orchestrator, and McAfee epo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2011 McAfee, Inc faq_emm_1211_fnl_ETMG
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
Technology Blueprint Enforce Security on Smartphones + Tablets Protect the business while allowing personally-owned devices to access the network LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
Product Datasheet IBELEM, SA ITS Group - 5, boulevard des Bouvets 92741 Nanterre Cedex - FRANCE Tel: +33(0)188.8.131.52.75 Fax: +33(0)184.108.40.206.08 - www.ibelem.com - email@example.com PMDP is simple to set
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
McAfee Enterprise Mobility Management Providing mobile application enablement and HIPAA security compliance Table of Contents HIPAA and ephi 3 Overview of 3 HIPAA Compliance for Remote Access 4 Table 1.
Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated
Introduction to AirWatch and Configurator Overview AirWatch integrates seamlessly with Apple Configurator to enable IT administrators to effectively deploy and manage Apple ios devices. Deploying a large
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Introduction to the Windows Phone 8 Guide Overview Windows Phone 8 is Microsoft's operating system designed for smartphones and shares the Modern UI with other Windows 8 devices. Windows Phone 8 offers
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
Mobile Device Management (MDM) Policies Best Practices Guide www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia
The Centrify Vision: Unified Access Management Control, Secure and Audit Access To Your On-Premise and Cloud-based Infrastructure On-premise Centrify the Enterprise Cloud Personal Devices Mobile Devices
Mobile Device Manager Windows User Guide (Windows Phone 8/RT) Document Revision Date: Oct. 22, 2014 Mobile Device Manager Windows Phone 8 User Guide i Contents Windows Phone 8 Features Matrix... 1 Overview...
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Absolute Manage MDM John Wu Systems Engineer firstname.lastname@example.org Saving Time and Money Comprehensive IT Automation Patch Management Software Distribution Software License Management Power Management Asset
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Enterprise Mobility Management User Guide Version R9 English June 24, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions
Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: email@example.com Information in this document is subject to change without notice. Companies names
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Sophos Mobile Control User guide for Apple ios Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control
roduct Service Description 1 Mobile Device Management Mobile Device Management (MDM) is the process of monitoring, configuring, and securing mobile devices over-the-air (OTA). Hardware and software technologies
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: firstname.lastname@example.org Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,