Mobile Device Management: A Survey

Size: px
Start display at page:

Download "Mobile Device Management: A Survey"

Transcription

1 Mobile Device Management: A Survey 1 July 2012

2 Table of Contents ABOUT PARABAL MOBILE DEVICE MANAGEMENT Common Features Sandboxed Remote Lock / Remote Wipe Enterprise Application Stores Security Management Administration / Self Service Portals Containers Limitations MDM VENDORS Ratings 6 Absolute Software Absolute Manage 7 Airwatch 7 Amtel MDM 7 AppBlade (RaizLabs) 8 BoxTone 8 Casper Suite (JAMF Software) 8 Excitor DME 9 FancyFon FancyFon Mobility Center 9 Fiberlink MaaS360 9 FileWave 10 Good For Enterprise 10 IBM Endpoint Manager 10 LANDesk Mobility Manager 11 McAfee Enterprise Mobility Management 11 Mformation 11 Mobile Active Defense 12 MobileIron 12 Notify Technology Notify MDM 12 Sophos Mobile Control 13 SOTI MobiControl 13 Sybase Afaria Sybase (An SAP Company) 1 Symantec Mobile Management 1 Tarmac Equinux Software 1 Tangoe MDM 15 Zenprise

3 About PaRaBaL PaRaBaL is a four-year-old company with the unique expertise to market and sell commercial enterprise software into the DoD/Intelligence Communities and Civilian Agencies. PaRaBaL s experience extends to: Understanding the needs of agencies and how to communicate with them; Proving the product concept against their mission needs; Researching and finding a budget and a contracting/purchasing mechanism using very complicated, byzantine contracting/purchasing practices that differ from agency to agency. PaRaBaL specializes in product marketing, sales, and successful pilots. PaRaBaL has a staff of 10 and is located a short distance from Fort Meade and Baltimore Washington International Airport. PaRaBaL s experience in mobile platforms began with a contract from an intelligence agency to teach ios security and exploitation course to the agency s employees. From this experience, PaRaBaL has expanded to researching Mobile Device Management (MDM) vendors to see which products best fit the Federal Market. The mobile device security and coding expertise that PaRaBaL has gained has led to the company s entrance into the commercial markets, serving enterprises with MDM and Mobile Application Store (MAS) selection strategies as well as installation, customization, and integration. PaRaBaL also offers secure enterprise apps for commercial companies and government agencies. MDM vendors come in many different flavors of products and services. PaRaBaL has produced this paper to help educate readers of the capabilities, advantages, and disadvantages of each vendor. Included in the synopsis are pros, cons and basic information regarding about the features and services offered. PaRaBaL is available to Enterprises to help select an MDM. Our methodology is to first understand the enterprise needs, weighed against security concerns, employee privacy, and BYOD issues, then select the best vendor to fit those needs. PaRaBaL can further customize MDMs to fit enterprise needs, and train the system administrators as well as the end users. PaRaBaL also has a full staff to build specialized applications for the enterprise that work with any MDM or MAS vending system. For more information, please do not hesitate to send us an at info@parabal.com, visit our web site at Or contact Nathan Steuer directly at or nsteuer@parabal.com. Mobile Device Management With the huge rise in success of mobile computing comes the need to configure, control, and maintain the mobile environment with business needs in mind. This is where Mobile Device Management comes into play. MDMs allow companies to tailor devices and infrastructure to suit their needs. Common features include sandboxed , an ability to disable the installation of applications for the phone, and the ability to lock and/or wipe the device. Other features include over-the-air (OTA) distribution of enterprise applications, distribution of data and configuration settings, and device information. Originally, device management was implemented by distributing company owned devices that were delivered to employees locked down with only the applications and functions the company deemed necessary. Employees frequently carried both company and personal devices. Recently, the rise in popularity of smartphones, and employees demands for the latest and greatest devices has brought about Bring Your Own Device (BYOD) policies. This method of device management comes with its own set of legal and privacy issues. BYOD devices have both company and personal applications and information, making configuration control a much more difficult task. 3

4 Vendors have varying approaches to device management, from application approaches where an application houses all the business aspects of the device, to entire device management where devices are controlled and locked down based on certain parameters. Some parameters monitored by MDMs include time of day, geographic location of the phone, status of installed applications, status of installed provisions and settings, and the ability to determine if the device is jail-broken. Common Features Sandboxed Most MDM vendors offer some version of an client that is separate and secured from the rest of the device. Usually this is also encrypted which prevents sensitive information or files from being leaked. Often included are statistics regarding the client, including data being sent/received as well as the frequency of data being fetched. With sandboxed , messages can also be prohibited or deleted if certain parameters are not met. Remote Lock / Remote Wipe The remote lock/remote wipe feature provides flexibility for a company to manage a compromised or possibly compromised device. Depending on the situation, the company has the ability to completely remove all data from the device, or to simply set a new lock code. Some vendors also offer a selective wipe, where a company can wipe specific data from the phone. These features can also be enacted if an employee decides to break compliance parameters such as changing app or ios versions, downloading blacklisted apps, or attempting to jail-break the device. Enterprise Application Stores Many vendors also provide the ability to deliver enterprise applications through an Enterprise Application Store (EAS), which are separate from commercial app stores. Vendors may limit access to applications by blocking the commercial app stores from being used. With an EAS, businesses can instantly port over custom applications to the phone over a secure or over the air platform. Application versioning is another feature the EAS allows for, ensuring that all users have appropriate versions of corporate applications. Security Management Vendors often sport several types of password options. Options include setting a password for a specified time limit, ability to remotely clear a password on a device, and enforcement of specifications on the sophistication of a passcode for the device or application. Other restrictions that MDMs can implement include the prohibition of screen capturing and video conferencing. Administration / Self Service Portals In order for vendors to manage devices, there needs to be a central area where commands and data can be sent. There are two types of portals available to companies, an Administration Portal, and a Self-Service Portal. The administrative portal has the ability to see various statistics regarding the status of the devices. From there, the administrator can take various actions. Users can use a self-service portal through an application used on a regular computer, a mobile application, or a secure interface. Containers MDM configurations can vary from standard control (Airwatch, Casper), to containers (Excitor, Good). Containers allow data to be stored on a secure location on the device where it is separated from other programs or browsers. Containers allow for limited access to sensitive files, with access limited based on time or user. Once the access has expired the file can either be deleted or access can be revoked. During viewing, some containers have the ability to prevent the user from using the camera, take screenshots, print, or restrict modification of the file.

5 Limitations Vendors provide many possibilities, but not all vendors can provide all solutions to every problem. The biggest problem we see is that no vendor has the ability to control the baseline on Apple s ios. As a result, vendors use workarounds with their products, which can leave the choice down to the end user on what to do with the device. A user could change their Apple ID and use their own app store preferences. A user could also have the ability to update any portion of application of ios and they please. Perhaps the most important bit being that a user can unenroll from the service at any time or can erase the service through itunes. From an Android standpoint, what all vendors are having trouble with is supporting a consistent experience. As mobile phone manufacturers continue to produce more and varying devices, MDM vendors are struggling with Android Fragmentation. Android devices themselves can have varying security features, as there are numerous hardware and software versions out there. For example, any device running below Android 3.0 will not support hardware device encryption. And a majority of devices supporting hardware device encryption are tablets. As a workaround, some vendors have offered to work with Android to open up more possibilities if the MDM vendor can modify the kernel on the Android, but that may open up other issues. MDM Vendors When PaRaBaL began its research into MDM vendors, it came up with a total of 85 vendors that offer some sort of MDM capabilities. PaRaBaL s research into the vendors has focused the list to 2. While there may be may other various vendors that offer MDM-like services, we believe the vendors below were some of the most focused MDM and MAS companies. Each vendor offers primarily the same functions, with the difference being in the execution, including differences in philosophy, the consumer experience, and mobile platforms. PaRaBaL hopes to continue to develop details for the companies as this industry continues to grow. The information has been gathered from a variety of sources. PaRaBaL s primary source of information has been from talking directly to the MDM vendors. Other information was collected from vendor websites and/or marketing material. Any other sources will be cited appropriately. The vendors were researched and evaluated based on the following criteria: 1. Usability (Ease of Use) a. Visual Outlook: How is the appearance of the MDM s admin and self-service portal? Is everything easy to see? b. Smoothness of interface c. Concise Menus? Are the menus logical and easy to navigate? 2. Reliability (Load Testing) a. Max Amount of Single Users at a Single Instance: How does the MDM handle with a large userbase on at a concurrent time? b. Amount Of Servers needed to support the user-base: What is the amount of resources required to run its user-base? c. Load Balancing: Does the company do any sort of load balancing? If so, how efficient and effective is the Load Balancing? 3. Security (Encryption of either Applications of Entire Device.) a. Device Encryption: Does the solution offer any sort of Device Containerization? If not can it enforce the device s hardware encryption? b. Containerization (File Encryption?): Can the service provide for a container that can allow sensitive files to be uploaded with selected restrictions present? c. SSL Encryption / AES Encryption: How are the connections between the server and the devices handled? What kind of encryption if any is presented in these solutions? d. Firewalls: Does the vendor provide any firewalls between the devices and the servers that contain the MDM and it s relevant information e. Public Key Infrastructure: Can the MDM handle PKI? 5

6 . Support/Service a. Help Desks: Does the company offer any sort of Help Desk support through their products? Or is it a third party responsible for the Help-Desk? How knowledgeable is the Help-Desk in the event of a complex problem arising? b. Hours of Help Desks: What are the hours for the Help-Desk? c. Timeliness of Responses from not only support, but also sales: How long does it take the sales and or support teams to get back to your inquires? 5. Features a. Innovativeness: Does the company have the ability to consistently introduce new or groundbreaking features to their platform? b. Time to implement new features: What is the turn around time with the implementation of new features? c. Ability to hold features across as many mobile platforms as possible: How does the company deal with the same features across multiple mobile platforms? 6. Size a. How large is the company: Do you get big time company feel or small company feel? b. Company Stability: Do you get a sense of financial security with the company? 7. History a. Company Technological Background: What is the background? Have they consistently dealt with enterprise markets? b. What is their primary function as a company? i. Security Software ii. End User Software iii. Telecom Expense Management iv. Enterprise Management Ratings Each vendor is given a rating based on criteria such as features, security, and customer service. The ratings are defined as follows: Poor: These vendors lack any advanced or distinguishing features, or might not contain some of the basic features seen from competitors. The vendor may have been hard to communicate with, or their support seemed to be lacking. Average: The product itself may offer basic features and security, but lacks defining features that would have set them apart from the competition. The company may also have average support for their products. Good: The product itself offers a very good feature set and offers reliable security. They may offer a good feature set, good support, as well as a few unique features. The difference between Good and Excellent vendors lies in innovation. Excellent: The vendor not only provides the basic features and security you see from the competitors but also includes a variety of features or security standards that set them apart from the competition. These vendors are also focused on innovation as well as providing a high level of support and standards for their products. Vendors are listed in alphabetical order. Pricing information, as it was delivered to PaRaBaL, is available by scheduling a call. Please info@parabal.com to schedule a free 15-minute call to discuss pricing information. For most vendors, pricing is based on the service provided, and the number of users. 6

7 Absolute Software Absolute Manage Headquartered in Vancouver, Canada, with offices located in Austin, Texas, Arlington, VA, and Reading, England, Absolute Software s MDM uses a variety of applications in order to manage user devices in a BYOD environment. Absolute Manage delivers its MDM services through a containerization approach with application suites and their own public application stores where users can login and gain access to their data. Platforms: ios, Android, and Windows Phone 7 Offers separate applications (AbsoluteSafe) from the MDM that can be used to send sensitive files without the use of . Allows for a separate partition between office and personal use. Due to the approach Absolute takes in going with an Application Suite, companies will not be able to control the entire device. (App Based Control vs. Policy Based Control) Contact Information: Headquarters: +1 (60) US Offices: +1 (512) Federal Office: +1 (703) Airwatch With Offices in Atlanta, Georgia and Mclean, Virginia, Airwatch is a MDM and MAS provider deploying across all mobile platforms. Airwatch is also currently the largest MDM vendor. 7 Offers 2/7/365 disaster recovery events. In terms of security, offers 256-bit SSL encryption for transfer of documents. Prevents the transfer of documents over 3G as well as prohibition of what documents applications can open. Can view the device remotely. Airwatch s software is not currently offered for Widows machines. While the largest MDM provider, Airwatch is still in its infancy within the international market. Contact Information: Headquarters: +1 (0) Amtel MDM With Offices in Santa Clara, CA, Amtel is an MDM provider for BYOD devices across all platforms. Originally designed as a company for Telecom Expense Management, Amtel has since then decided to delve it s efforts into Mobile Device Management. Amtel has the advantage of already developing its MDM on all mobile platforms while maintaining all common MDM features. Offers 2X7 support across all packages. The Enterprise edition also comes with Telecom and Mobile Expense Management. 7

8 Only MDM that is SAS 70 Type II certified. Amtel is more geared towards a smaller user base. While Amtel may have all the standard features, Amtel lacks any key differentiators from competition. Contact Information: Headquarters: +1 (08) AppBlade (RaizLabs) As a subsidiary of RaizLabs Software, AppBlade focuses on innovation as well as a rich experience. AppBlade also has a strong focus on Application Distribution. Platforms: ios, Android Offers tools such as Jenkins and Hudson in order to automatically build Xcode Projects directly into an AppBlade Project. Offers public API s and SDK s as well. Has Dual Layer Security in which there is a device manager, no intermediary. Directly installs SDK s onto Applications in order to verify the applications being installed. AppBlade currently does not support Blackberry or Symbian, but can create fully-fledged services within a few weeks if requested. Contact Information: +1 (800) BoxTone With Offices in Columbia, Maryland, BoxTone provides a security focused product. Offers Mobile Service Management which includes real time security monitoring as well as service desk help. Patented real time user transaction flow. Can handle from 60-60,000 users in a single instance. BoxTone has the ability to scale to > 2 Million transactions per hour. Also complies with FIPS 10.2 security standards. BoxTone currently offers Data Loss Prevention capabilities. BoxTone is currently a US focused product with little market overseas. Contact Information: +1 (10) Casper Suite (JAMF Software) Headquartered in Minneapolis, MN with several offices in Cupertino, New York, and Eau Claire. They specialize in ios, which allows them to focus on a better experience with ios compared to competitors. Platforms: ios, OSX Offers communication between their servers (JSS) and Apple s Global Service Exchange database. Offers full suite of features that can integrate with their Desktop based software. 8

9 While offering a full breadth of features for ios, they are limited to ios without any support for Android, Symbian, or Windows Mobile platforms. They do not currently offer any sort of encryption. Does not directly communicate with devices, rather uses an intermediary to work with devices. Contact Information: +1 (612) Excitor DME Excitor is a Denmark based vendor that takes a containerization approach to their products. Excitor features all the standard MDM services. Offer extensive Mobile Cost Control & Alerts to their solution, and a very sleek user interface for their Admin and Self Service Portals. AES standards are used to encrypt devices, files and attachments. Includes a secure web browser. Excitor is currently primarily located in foreign markets without any offices in the United States; as a result, any sort of US business will have to be done through a reseller (Etuvian for United States), so experiences may vary. A free trial is offered then, a purchase is required. Contact Information: +(5) ; Etuvian: 1(888) FancyFon FancyFon Mobility Center Established in 2006 in Cork, Ireland, FancyFon was originally designed as an MDM vendor. Since then they have established their MDM with a focus on having support for all major mobile platforms., Samsung BADA, WebOS Strong support for a variety of mobile device platforms. Ability to implement a Telecom Expense Management Solutions into their product. Ability to encrypt all drives on a device and prevents data from being removed from the device. FancyFon is a smaller company with a focus on smaller businesses rather than larger enterprises. While FancyFon may advertise a wide support for devices, the features are not universal across platforms due to device restrictions. Contact Information: +1 (353) Fiberlink MaaS360 Headquartered in Blue Bell, PA, Fiberlink is one of the larger vendors specialized in selling BYOD MDM and EAS. Originally founded over twenty years ago, Fiberlink has specialized in Enterprise Management Solutions since its foundation. From 2008 on, Fiberlink has release MaaS360 (Mobility as a Service) in order to deal with the growing concern of managing mobile devices. Fiberlink is one of the few vendors to offer their services strictly through cloud services. Offers their solution across all major mobile platforms with the ability to deploy to a large user base (15 to 130k users) on an international scale with offices in the UK, Germany, and Asia. 9

10 Offers their Mobile Expense Management services with their solution. Sox 70 Certified. Fiberlink offers no device encryption for their product. Those interested in security may be weary of their cloud offerings due to the inability to physically handle the servers, more people having access to your data. Contact Information: Headquarters: +1 (215) Sales: +1 (215) FileWave With Offices in Fishers, Indiana, Filewave is a Swedish vendor that was previously focused on the Mac and Windows desktop platforms. Since then however it has delved it s efforts into the ios realm. Platforms: ios Offers all major features to the ios platform. Offers file self-repair as well as rollback on devices. Does not offer SAAS. Currently, FileWave does not offer their services to any other platforms than ios. Focuses more on application management across computer and ios products rather than a general MDM. Contact Information: +1 (317) Good For Enterprise With Headquarters in Sunnyvale, CA, Good s offering s primarily feature containerized software. Platforms: ios, Android, Symbian, Windows Mobile, Windows Phone Good for Enterprise is currently one of the few companies that support FIPS 10-2 encryption within their solution. Works with the DoD PKI infrastructure. Used and complies with government agencies and standards. Good for Enterprise is handled due by an application suite. Due to that, there is no control over on the device s end and can be technically labeled a containerized solution. This can be a cause for concern based upon security requirements as well as policy enforcement. Does not support Blackberry platforms. Contact Information: +1 (08) IBM Endpoint Manager With Headquarters in New York, IBM is a large public company responsible for creating the Endpoint Manager, which manages costs, software, power, and patches on mobile devices and computers. Platforms: ios, Android, Symbian, Windows Mobile, Windows 7 Phone Ability to scale up to 250k concurrent users without trouble. Offers entire device encryption. 10

11 Supports NIST Security Controls. IBM also offers this solution with the rest of the Endpoint Manager, which includes (Power Management, Lifecycle Management, Security & Compliance, Patch Management, Lifecycle Management, Core Protection, and Software Use Analysis). Offers 2/7 help desk support as well. While IBM has a dedicated MDM service, from our research it s focus seems to be more towards computer management rather than mobile devices. Contact Information: Sales: +1 (877) , Priority Code: 109HJ03W LANDesk Mobility Manager With Headquarters in Salt Lake City, Utah, LANDesk started their MDM services in From there they have expanded, adding ios and Android platforms. The LANDesk approach towards MDM is one of integration between PC s and Mobile Devices. As a note, LANDesk is sold only through resellers so experiences may vary. LANDesk has recently purchased Wavelink. Platforms: ios, Android, Palm, Windows 7/8/CE LANDesk uses a combined approach, covering desktops, laptops, and ruggedized devices. Has a wide diversity geographically as it deals heavily in international markets. LANDesk is in the process of getting FIPS 10-2 certification and currently is pursuing an Authority to Operate on DoD Networks. LANDesk is not as mature as other products. The LANDesk Mobility Manager is sold more as part of a package rather than an individual product. LANDesk s user interface appears less organized and fluid than others. Contact Information: Headquarters: +1 (800) McAfee Enterprise Mobility Management Headquartered in Santa Clara, CA, McAfee is a large public company that is a large vendor in MDM software services. McAfee has partnered with AT&T to gain strategic relations. McAfee s focus for the MDM is on security. Partnership with AT&T, which allows them to have strategic ties with clients. McAfee s experience in the security field has allowed them to make acquisitions that have been implemented into their product. McAfee s Enterprise Mobility Manager is treated as part of a total solution rather than just a MDM solution. Contact Information: Sales: +1 (866) Mformation Headquartered in Edison, New Jersey, Mformation is a small vendor (135 Employees) that has taken the approach of selling its product absolutely indirectly. Their focus is on scalability and reliability, being able to adaptively scale servers at the peak efficiency. 11

12 Platforms: ios, Android, Symbian, Windows Mobile, Windows Phone Mformation focuses on scalability, in this case being able to handle from a few thousand to several million devices in a single instance. Offers many options for white listing guaranteeing no channel conflict. Mformation currently does not support the Blackberry Systems, but can quickly do so if needed. Does not offer the advanced features we see from larger MDM s. Contact Information: Headquarters: +1 (732) Mobile Active Defense Based in Atlanta, Georgia, and with offices Mainz, Germany, and London England, Mobile Active Defense is a MDM with a focus on securing sensitive information on the device. Mobile Active Defense is NIST /12, ISO certified, with FIPS 10-2 AES 256 bit encryption between device and server. Mobile Active Defense has the ability to support up to one million users. Offers security-training courses. Offers the full breadth of common MDM/MAS features. Mobile Active Defense does not have the most market visibility. In order for full Android control, the kernel must be modified which may be a cause for concern to some consumers. Contact Information: +1 (877) MobileIron Started in August of 2007 with Headquarters in Mountain View, California, U.S, MobileIron has been one of the more progressive vendors on the markets delivering MDM focused products since 2009., WebOS Has the ability to work with many capable partners in all aspects of business. Provides Expense Management services, with a sleek and easy to use interface. This vendor is one of the more stable MDM/MAS companies in the industry with a considerable amount of investors helping their ventures. They have consistently been one of the leading vendors in MDM innovation. In order to use other platforms, additional costs for the platform must be purchased. Only provide the encryption that has already been shipped with the device. New entry into containerization. May have difficulty with larger deployments as they work to expand capacity. Contact Information: +1 (650) Notify Technology Notify MDM Headquartered in San Jose, CA, Notify Technology is a software company primarily offering a variety of Mobile Platform software packages including Mobile Device Management services. 12

13 Features all the basic MDM features for all Mobile Platforms. Notify also has the ability to offer cloud as well as offer multiple on-premise server points within a DMZ as well as part of the companies internal private network. Can be offered with Notify s NotifySync features. While Notify may have been in the Mobile Industry for over 10 years, their MDM platform was only recently released (/2011). As a result Notify currently has a smaller market presence within the MDM field. Contact Information: +1 (08) Sophos Mobile Control With North American Headquarters in Burlington Massachusetts, Sophos Mobile Control is a UK-based vendor. Sophos offers their services as an entire package that consists of their MDM, Mobile Security software, and device encryption. Sophos can integrate mobile encryption with Dropbox. They deal heavily in international markets. Sophos Mobile Control comes with Sophos Mobile Control allowing for further security including entire device encryption. Unlimited 2X7 support. While Sophos is strongly developing an MDM solution, they are primarily still seen as a Security Software company in the market. Some features are still being developed due to the product being recently released. Contact Information: +1 (866) SOTI MobiControl With Headquarters in Ontario, Canada as well as offices in Europe and the Australia, SOTI MobiControl was launched in 200 starting with Windows Device Management and eventually picked up Android and ios. Has already demonstrated its solution in large markets. Uses AES 256 bit encryption to secure its data transfer connections. Unique features include remote view and remote control. Due to the variety of devices supported by SOTI, features of the MDM are dependent of the device platform itself. SOTI MobiControl does not offer device encryption. Instead SOTI relies upon the encryption offered by the device s OS. Contact Information: Ontario Headquarters: +1 (905)

14 Sybase Afaria Sybase (An SAP Company) With Headquarters in Dublin, CA, Sybase is a subsidiary of German Software Company, SAP. Sybase was founded back in 198 and originally working with the mobile database market. Since 2001 Sybase has been working MDM on ruggedized devices and now onto smartphones. Platforms: ios, Android, Blackberry, Symbian, Windows Mobile Offers it s additional applications ( SAP Applications ) that allow for additional features and applications to be installed. Sybase is one of the more professional and stable companies in the field. Sybase strives to allow all devices to have the same features. The Sybase Solutions often lacks in bringing in new features quickly compared to their competitors. Compared to other companies, SAP is a bit costlier than competition. Contact Information: +1 (925) Symantec Mobile Management With Headquarters in Mountain View, CA as well as offices in Japan, Singapore, and Ireland, Symantec is well known for its security software. Symantec has focused its MDM on security. Symantec s size allows for a very stable product. And due to their size, they have been able to start implementing acquired technologies (Ex. Nukona). Due to their size the solution can easily be deployed in large numbers across the globe. Symantec Mobile Management is FIPS 10-2 Certified. Symantec only sells their Mobile Management Suite through resellers, so experiences may vary depending on the vendor. Has a very large company feel when in contact with Symantec. Lacks the innovations seen from competitors. Contact Information: +1 (888) (Note: Symantec is sold solely through retailers.) Tarmac Equinux Software Equinux is a German based vendor with offices in Munich and San Francisco. Equinux is known for their Apple software suites, particularly it s security suite VPN tracker. Tarmac is exclusively distributed via select authorized partners. Platforms: ios Tarmac offers their MDM solution with a VPN Tracking solution as well. Communication between the server and devices is encrypted. With offices in Germany, they comfortably deal with international markets. Tarmac can dynamically remove ios 5 features to have backwards compatibility with ios. Currently, Tarmac is only applicable to the ios platform. Clients looking for USA centric options may be deterred as all US sales are done entirely through retailers. Contact Information: +1 (888)

15 Tangoe MDM Founded in 2000 and with headquarters in Orange, CT, Tangoe is a public, large company that is known in the field as the leading Telecom Expense Management Provider. Recently however they have put their attention on Mobile Device Management. Their take on MDM s is one that includes their Telecom Expense Management in an attempt to help save the company money. Platforms: ios, Android, Blackberry, Windows Phone, Windows Mobile, Symbian Tangoe is a public company. Offers a self-service web portal for help. Also allows for Resets and Decommissioning without IT specifics. Offers scalable options as well. Offers device encryption respective to platforms. Resources are more divided into it s other products such as telecom expense management. As a result, fewer resources are focused on their MDM services. Tangoe s User Interface looks dated compared to competitors. Contact Information: +1 (203) Zenprise With Headquarters in Redwood City, CA, Zenprise is a Mobile Device Management company founded in Originally created to try and provide technical support, they have since acquired Sparus Software and from there have developed their own MDM solution. Provides the more unique features amongst MDM s. Zenprise s servers are very capable, comfortably supporting over 70k devices on just one server. Features Expenses Management courtesy of a partnership through Tangoe. Features Data Loss Prevention. Currently does not offer any additional encryption on the devices other than what the device offers itself. Primarily deals with domestic markets. Contact Information: +1 (888) The following chart sums up the basic features of each MDM. It is formatted to 8 ½ x 1 paper. 15

IS BYOD (BRING YOUR OWN DEVICE) PART OF YOUR COMPANY S FIELD SERVICE AUTOMATION PLAN?

IS BYOD (BRING YOUR OWN DEVICE) PART OF YOUR COMPANY S FIELD SERVICE AUTOMATION PLAN? WHITE PAPER IS BYOD (BRING YOUR OWN DEVICE) PART OF YOUR COMPANY S FIELD SERVICE AUTOMATION PLAN? INTRODUCTION A recent study by Ericsson projects that there will be 5.6 billion smartphones (or 60 percent

More information

Mobile Device Management Global Market Analysis

Mobile Device Management Global Market Analysis Market Research Mobile Device Management Global Market Analysis February 2012 Copyright 2013 all rights reserved 1 Content of Research Global Market Review Global Competitors Spotlight on 5 Leading Competitors

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

Sophos Mobile Control - Competitive Overview

Sophos Mobile Control - Competitive Overview Sophos Mobile Control - Competitive Overview Content Page Introduction to MDM Market overview, positioning and discovery questions 2 Lightweight vs Heavy weight approaches 3 Competitive comparisons AirWatch

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt Mobile Device Management Andrius Šaveiko andrius.saveiko@atea.lt Content Mobile Device Management (MDM) where to start? Situation on MDM market MDM solutions very similar, but very different ios, Android,

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Total Enterprise Mobility

Total Enterprise Mobility Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate

More information

white paper Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content Abstract

white paper Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content Abstract white paper Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content Abstract This paper highlights what is the need of Enterprise Mobility Management

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Mobile Device. Management-

Mobile Device. Management- Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly

More information

Mobile App Containers: Product Or Feature?

Mobile App Containers: Product Or Feature? ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating

More information

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011

Consumerization of IT. Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011 Consumerization of IT Sara M. Russo MBA Fellow Project Center for Digital Strategies 5 May 2011 1 Agenda What is consumerization of IT? What s the hype? And why now? Media tablets in the enterprise 2 Is

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013 WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest

More information

Why Digital Certificates Are Essential for Managing Mobile Devices

Why Digital Certificates Are Essential for Managing Mobile Devices WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

As worldwide growth in the mobility market surges among both business and personal users,

As worldwide growth in the mobility market surges among both business and personal users, February 2012 Galvin Consulting, LLC EXECUTIVE SUMMARY As worldwide growth in the mobility market surges among both business and personal users, organizations are seeking ways to monitor, manage and secure

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

Sophos Mobile Control

Sophos Mobile Control Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce

More information

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization

More information

Samsung Mobile Security

Samsung Mobile Security Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Implement Mobile Device Management to Deploy HCSS Mobile Apps

Implement Mobile Device Management to Deploy HCSS Mobile Apps Implement Mobile Device Management to Deploy HCSS Mobile Apps A guide to MDM & EMM product selection Femi Ariyo Femi@hcss.com Our Goal Understand mobile device management and its benefits Examine different

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Mobile App Management:

Mobile App Management: Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management

More information

Addressing NIST and DOD Requirements for Mobile Device Management

Addressing NIST and DOD Requirements for Mobile Device Management Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Critical Capabilities for Mobile Device

Critical Capabilities for Mobile Device Page 1 of 16 for Mobile Device 8 August 2012 ID:G00230106 Analyst(s): Monica Basso, Phillip Redman VIEW SUMMARY Mobile device management offerings are expanding from traditional configurations, policy

More information

IT Self Service and BYOD Markku A Suistola

IT Self Service and BYOD Markku A Suistola IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Mobile Device Management and Security Glossary

Mobile Device Management and Security Glossary Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes

More information

Good for Enterprise Good Dynamics

Good for Enterprise Good Dynamics Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity

More information

Aragon Research. RESEARCH NOTE Number: 2013-01 January 4, 2013. The Aragon Research Globe for Enterprise Mobile Management Software, 2013

Aragon Research. RESEARCH NOTE Number: 2013-01 January 4, 2013. The Aragon Research Globe for Enterprise Mobile Management Software, 2013 Aragon Research Authors: Mike Anderson, Jim Lundy Topic: Mobile Issue: Who are the vendors that are battling to lead the mobile computing revolution? The Aragon Research Globe for Enterprise Mobile Management

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

J David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com)

J David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com) MDM Solutions Strengths, Weaknesses, Obstacles, Solutions J David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com) Nick McSpadden (nick.mcspadden@sacredsf.org)

More information

Cloud Services MDM. Overview & Setup Admin Guide

Cloud Services MDM. Overview & Setup Admin Guide Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4

More information

IBM United States Software Announcement 215-078, dated February 3, 2015

IBM United States Software Announcement 215-078, dated February 3, 2015 IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus. Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley

More information

Secure Mobile Solutions

Secure Mobile Solutions Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management

More information

Introducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI

Introducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI Introducing AirWatch by VMware: Enterprise Mobility Simplified Menny Tsarfaty EUC Business Specialist MEDI Market already changed End-User Computing Vision PCs, Laptops Thin Clients Tablets, Smartphones

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Critical Capabilities for Mobile Device Management

Critical Capabilities for Mobile Device Management G00230106 Critical Capabilities for Mobile Device Management Published: 8 August 2012 Analyst(s): Monica Basso, Phillip Redman Mobile device management offerings are expanding from traditional configurations,

More information

Page 1 of 16 for Mobile Device 8 August 2012 ID:G00230106 Analyst(s): Monica Basso, Phillip Redman VIEW SUMMARY Mobile device management offerings are expanding from traditional configurations, policy

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Critical Capabilities for Mobile Device Management

Critical Capabilities for Mobile Device Management Critical Capabilities for Mobile Device 8 August 2012 ID:G00230106 Analyst(s): Monica Basso, Phillip Redman VIEW SUMMARY Mobile device management offerings are expanding from traditional configurations,

More information

ClearPass Policy Manager

ClearPass Policy Manager ClearPass Policy Manager V2 October 2013 Introduction With the release of ClearPass Policy Manager 6.2.0 in July 2013 we have continued to build on our previous industry leading functionality, now with

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Service Definition Nine23 MDM

Service Definition Nine23 MDM Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Management of Multi-OS Smart Devices Made Simple.

Management of Multi-OS Smart Devices Made Simple. Singtel Business Product Factsheet Managed Mobility Device Defense Manager Services Management of MultiOS Smart Devices Made Simple. A smart solution that enables companies to secure, control and manage

More information

MDM features vs. native mobile security

MDM features vs. native mobile security vs. : Mobile device management or MDM plays a critical role in, but should always trump native security features of mobile devices? Lisa Phifer weighs in on how to choose the best approach for your workforce.

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Enterprise mobile management a need or an option?

Enterprise mobile management a need or an option? perspective Enterprise mobile management a need or an option? - Payal Patel, Jagdish Vasishtha (Jags) Abstract Even as native platforms are growing tighter with security features, the enterprise mobile

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization

More information

Why EMM Is the Future of Mac Management

Why EMM Is the Future of Mac Management Why EMM Is the Future of Mac Management In the keynote session at WWDC 2014, Apple s Senior Vice President of Software Engineering Craig Federighi called ios a huge hit in the enterprise, noting the breadth

More information

GETS AIRWATCH MDM HANDBOOK

GETS AIRWATCH MDM HANDBOOK GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS

More information

11 Best Practices for Mobile Device Management (MDM)

11 Best Practices for Mobile Device Management (MDM) MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.

More information

IBM MobileFirst Managed Mobility

IBM MobileFirst Managed Mobility Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the

More information

We Manage Mobility. www.soti.net. Manage Secure Support Monitor Track. Balhar Dosangh Director, Strategic Alliances balhar@soti.

We Manage Mobility. www.soti.net. Manage Secure Support Monitor Track. Balhar Dosangh Director, Strategic Alliances balhar@soti. We Manage Mobility Manage Secure Support Monitor Track Balhar Dosangh Director, Strategic Alliances balhar@soti.net www.soti.net MOBILE DEVICE MANAGEMENT THE LANDSCAPE WE PREDICT THROUGH 2017, 90% OF

More information

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360.

Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360. MaaS360.com > White Paper Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility www.maas360.com 1 Copyright 2014 Fiberlink Communications Corporation.

More information

Compliance Management for Mobile Devices

Compliance Management for Mobile Devices Compliance Management for Mobile Devices MOBILE SOLUTIONS Agenda Mobile Device Use Today Mobile Device Use Tomorrow Mobile Device Configuration Challenges in the Mobile Device Environment Policy and Configuration

More information

Device Independence - BYOD -

Device Independence - BYOD - Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Securing Enterprise Mobility for Greater Competitive Advantage

Securing Enterprise Mobility for Greater Competitive Advantage SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise

More information

CWSI Service Definition for Mobile Device Management and Security

CWSI Service Definition for Mobile Device Management and Security CWSI Service Definition for Mobile Device Management and Security October 2015 Contents I. Document Control... 3 a). History... 3 b). Reference Documents... 3 II. Company and Contact information... 3 1.

More information

Enterprise- Grade MDM

Enterprise- Grade MDM Enterprise- Grade MDM This brief describes a foundational strategic feature of the Citrix enterprise mobility offering, enterprise-grade MDM. 2 While the transition of mobile phones into computers has

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Mobile Device Management horizons for CERN Managed ios and Mac Self-Service. Maciej Muszkowski, Michal Kwiatek, Vincent Bippus (IT-OIS)

Mobile Device Management horizons for CERN Managed ios and Mac Self-Service. Maciej Muszkowski, Michal Kwiatek, Vincent Bippus (IT-OIS) Mobile Device Management horizons for CERN Managed ios and Mac Self-Service Maciej Muszkowski, Michal Kwiatek, Vincent Bippus (IT-OIS) Today s agenda Introduction MDM market CERN numbers and trends CERN

More information

Salmon Group, Inc. An 8(a) Certified, Veteran owned company

Salmon Group, Inc. An 8(a) Certified, Veteran owned company www.salmongroupinc.com info@salmongroupinc.com Main Office: 888.751.5551 Fax: 240.607.6712 About Us We are a: Maryland-based, Veteran Owned Corporation Certified participant of the SBA 8(a) and Small Disadvantaged

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Unified Windows Device Management in the Enterprise

Unified Windows Device Management in the Enterprise Unified Windows Device Management in the Enterprise Chuck Brown Product Management Jimmy Tsang Product Marketing Lenovo ThinkPad 8 Giveaway Tweet @MaaS360 with event hashtag #MaaS360Win Winner will be

More information

GlobalSign Integration Guide

GlobalSign Integration Guide GlobalSign Integration Guide GlobalSign Enterprise PKI (EPKI) and AirWatch Enterprise MDM 1 v.1.1 Table of Contents Table of Contents... 2 Introduction... 3 GlobalSign Enterprise PKI (EPKI)... 3 Partner

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information