Windows 8 Devices Deliver: Enhanced networking enables anywhere, anytime work styles. Review infographic
|
|
- Holly Manning
- 8 years ago
- Views:
Transcription
1 Windows 8 Devices Deliver: Enhanced networking enables anywhere, anytime work styles Review infographic
2 Contents Executive Summary... 2 Introduction... 3 Overview... 3 Scenarios... 6 Connecting on the Go... 6 Office Productivity... 6 Network Connectivity... 8 Key Findings... 8 Network Optimization and Configuration... 9 Bandwidth Utilization... 9 Connectivity and Wireless Options Connecting on the Go Key Findings Unified Remote Access Productivity in the Office Conclusion Logic20/20, Inc. 2013, all rights r eserved. Page 1 of 16
3 Executive Summary Anywhere, anytime working is fast becoming the new normal. According to Forrester s 2013 Mobile Adoption Trends, 29 percent of the global workforce can be characterized as anywhere, anytime, a figure that is up from 23 percent in Additionally, nearly 80 percent of workers spend at least some part of their time working outside of their office, which makes strong networking functionality more important than ever. Data access across the wide-area network, remote access, and mobile broadband usage can be expensive to manage, and inefficient network management strategies can reduce the performance of mission-critical applications. Microsoft offers a comprehensive suite of tools built in to Windows 8.1 and based on the company s long history of providing enterprise tools. These tools offer enterprisegrade optimization, customization, bandwidth utilization, seamless remote access, and productivity features. These tools give IT administrators greater ability to control their networks and a single pane of glass from which to control all of them, while providing convenience and productivity for users by helping them get what they need, wherever they are. Apple s platforms support third-party tools that are similar to the features built in to the Windows 8.1 platform. However, introducing third-party vendor solutions can increase the complexity and cost of your deployment. ios in particular does not offer these features natively, requiring administrators to implement third-party tools instead of using the features and functionality that come built-in to Windows 8.1. For executives looking to help their employees be more productive regardless of where they are located, Windows 8.1 has the edge in enterprise networking. 1 Source: Logic20/20, Inc. 2013, all rights r eserved. Page 2 of 16
4 Introduction This paper compares the features of Windows 8 devices to similar features in ios 7 and OS X 10.8 Mountain Lion devices. The Apple products have been researched using publicly-available information. Similarly, the Windows 8.1 information also primarily comes from the public domain. This document is intended to be a feature-level deep dive into comparing the key networking features of three competing operating systems: Windows 8.1, ios 7, and OS X 10.8 Mountain Lion. The purpose of this comparison is to provide a view of the competitive landscape as it relates to networking. The audience for this document is technical and business decision makers, as well as subject-matter experts. Overview This document examines the networking features of Windows 8 devices and how they compare to the networking features used by ios and OS X devices. The following table summarizes the areas that will be examined, and how Windows 8.1 compares to the two Apple platforms: Networking Areas Network optimization and configuration Bandwidth Utilization Windows 8.1 versus OS X and ios Microsoft s Quality of Service (QoS) software suite offers enterprise-grade optimization capability that Apple s Profile Manager and Apple Server for OS X and ios do not match outof-the-box, as they require third-party vendor implementation to achieve the same feature set. The level of customization and security provided by QoS gives IT administrators and business decision makers (BDM) better value on enterprise deployments, while the ios tools are built around small deployments and consumer use. Microsoft s metered connections provides networking cost savings for enterprises in a bring-your-own-device scenario, especially when the users are traveling and connecting to the network through mobile data plans. Metering connections in Windows 8.1 allows users to restrict the bandwidth used, which provides savings and avoids the sticker shock of large usage bills. While OS X has a built-in Activity Manager, it does not provide detailed cost information to the user except by installing a thirdparty app. Similarly, ios does not have this feature at all except through third-party apps, which may increase the cost and complexity of your deployment. Logic20/20, Inc. 2013, all rights r eserved. Page 3 of 16
5 Networking Areas Connectivity and Wireless Options Unified Remote Access Productivity in the Office Windows 8.1 versus OS X and ios Windows 8.1 supports a number of wireless options including mobile broadband, Wi-Fi, and setting up a device as a mobile hotspot. Additionally, the platform comes built-in with such productivity features as a native Miracast wireless display, nearfield communications (NFC) enabled tap-to-print, and Wi-Fi direct printing. While ios and OS X both support mobile broadband, Wi-Fi, and other standard methods of wired and wireless connectivity, the configurability and support for IPv6 that Windows 8.1 has makes Microsoft s offering more attractive to IT administrators and enterprise executives. Windows 8.1 supports in-box virtual private network (VPN) clients for third-party providers as well as Microsoft s own client, which allows vendors to work directly with Microsoft to include their VPN functionality right out-of-the-box. Additionally, the usability of the client has improved with the auto-triggered VPN feature. This pops up a prompt for VPN credentials when a user visits a site that requires them, instead of telling the user the site cannot be reached. Microsoft s DirectAccess provides increased flexibility and IT control when compared to Apple s virtual private network (VPN) on Demand by connecting the user anytime they have an Internet connection. While both services provide automatic corporate network access from Internet locations, DirectAccess allows IT administrators to keep remote systems up-to-date as well as monitor and enforce policy compliance. BranchCache in Windows 8.1 allows users to spend more time working, and less time waiting. It works by storing corporate data at locally branch office sites, instead of requiring connection over the wide-area network to the main servers. This helps reduce bandwidth costs at branch offices, and increase connection speed for users. Work Folders provides users the ability to access their files from anywhere by syncing directly to the users devices. Apple s ios and OS X do not include a similar feature to either BranchCache or WorkFolders built-in, and would require thirdparty software to gain similar functionality. Logic20/20, Inc. 2013, all rights r eserved. Page 4 of 16
6 Logic20/20, Inc. 2013, all rights r eserved. Page 5 of 16
7 Scenarios The following scenarios demonstrate some of the key features compared in this document. Connecting on the Go Kate is a professional working for a small business. As such, she is constantly heading from meeting to meeting, trying to get her work done anywhere a connection is available. Since she is using Windows 8 devices, she has better access to all of her required files with DirectAccess. Anywhere she has a connection, she has the ability to access her corporate file-share, intranet, and other resources, and she is also protected by her IT department even when not directly connected. DirectAccess allows IT administrators to push updates to users any time they are connected to the Internet. Beverly is another professional, using an ios device. While her tablet supports thirdparty VPN technologies, VPN on Demand requires her to provide credentials, and does not allow her IT department to automatically make security updates to her device, leaving her potentially vulnerable to phishing attacks. One evening, Kate is in a hotel after attending a conference with several colleagues. The hotel s wireless network is down, but she has a 4G signal on her Windows 8 device. She sets it up for wireless tethering, which broadcasts a wireless signal that her colleagues can connect to. Kate designates the connection as metered, which limits the amount of data that will be transferred by downloading low-resolution pictures and video when available, and halting any Windows updates. Windows 8.1 also helps her to track the amount of bandwidth she is using on this connection as well as the potential cost through her service provider, helping her avoid sticker shock. Beverly finds herself in a similar circumstance, and her ios 7 device allows her to set up wireless tethering. However, to achieve the same level of connecting tracking that Windows 8.1 s metered connections provides, her IT department would have to set up software through a third-party vendor, which can increase the cost and complexity of a deployment. When Kate arrives at the office after the conference, her device automatically switches to the work network, based on the preferred network. Windows 8.1 automatically connects to the less expensive networks, giving priority to Wi-Fi over mobile broadband, for example. DirectAccess, Metered Connections, and the broad support for various connectivity technologies sets the Windows 8.1 platform apart as a powerful enterprise tool. Office Productivity Logic20/20, Inc. 2013, all rights r eserved. Page 6 of 16
8 Ben is an employee at a large company, and has traveled to a new branch office that has been set up recently. The IT department has set up Windows BranchCache for this office, which stores corporate data at the office locally, instead of retrieving it from the main office s servers over the wide-area network. This provides a faster connection for Ben and his coworkers, and lowers bandwidth costs for the company. Ben is also able to set up Work Folders to maintain all of his important documents and files on the corporate network. Once set up, he can work on the latest files on the server from his Windows 8.1 tablet at home, synchronized to the device. Steve, an employee at a similar large company, works on an ipad. His company does not have a similar feature to BranchCache, which means that any connection he makes from the branch office needs to go through the wide-area network to the main office, which provides a slower connection and costs the company more in bandwidth. Additionally, The next day, Ben prepares for a presentation in another building on his company s campus by printing out slides. The printers on his campus have been set up with nearfield communication (NFC) by the IT department, which means they can automatically set up a direct connection between a device and the printer, just by tapping the tablet to the printer and accepting the pairing dialog that appears. Ben also happens to be escorting a guest who will be presenting with him, and helps him to connect to the printer using Wi-Fi direct printing, which allows him to connect directly to the printer over the Wi-Fi connection. In the meeting room, Ben uses the Miracast wireless display to connect to the projector, and is able to give his presentation directly from the tablet, instead of having to fumble with wired connections and adapter dongles. Steve s device does not offer the same productivity tools. Instead of directly connecting to a printer, he needs to find the correct printer in the directory. When presenting, he needs to connect the projector to his device with a compatible cable, instead of using a wireless connection. While this is not a major difference in terms of the extra time it takes to perform these tasks, over the course of the day a large number of people might need to do these things, which can add up quickly in terms of productivity for the enterprise. The Windows 8.1 platform offers networking and productivity tools and features that make it less expensive to manage your workers, whether they are located near the servers or far away at a branch office, and provide key conveniences for the users. Apple s platforms do not have similar technologies, and rely on third-party solutions that may increase the cost and complexity of the deployment. Logic20/20, Inc. 2013, all rights r eserved. Page 7 of 16
9 Network Connectivity Reducing cost and improving user experience on networks is important when deploying a large number of devices in an enterprise. Deploying devices installed with an operating system that can utilize client-side APIs and tools to use a server s advanced networking capability can give greater power and flexibility to IT administrators. The sections below compare Windows 8.1, ios 7, and OS X 10.8 Mountain Lion based on the strength of their network management, including considerations such as: Network optimization and configuration Bandwidth utilization Access management and audit Protection of network assets Key Findings Network optimization and configuration: Microsoft s Quality of Service (QoS) software suite offers enterprise-grade optimization capability that Apple s Profile Manager and Apple Server for OS X and ios do not match. The level of customization and security provided by QoS gives IT administrators and BDMs better value on large-scale deployments. Bandwidth utilization: Microsoft s metered connections feature provides a powerful set of tools to monitor and limit network usage. Setting a connection as metered allows a user to limit the bandwidth used for Windows updates, downloads, and other network activity. While OS X has a built-in Activity Manager, it does not provide detailed cost information to the user except by installing a third-party app. Similarly, ios does not have this feature at all except through third-party apps, which may increase the cost and complexity of your deployment. Connectivity and wireless options: Windows 8.1 supports mobile broadband, Wi-Fi, and setting up a device as a mobile hotspot. Additionally, the platform comes built-in with Miracast wireless display, NFC-enabled tap-to-print, and Wi- Fi direct printing. While ios and OS X both support mobile broadband, Wi-Fi, and other standard methods of wired and wireless connectivity, the configurability and support for IPv6 that Windows 8.1 has makes Microsoft s offering more attractive to IT administrators and enterprise executives. Logic20/20, Inc. 2013, all rights r eserved. Page 8 of 16
10 Network Optimization and Configuration Windows 8.1 uses QoS technologies to manage enterprise network traffic in a costeffective manner. QoS tools allow IT administrators to measure bandwidth, detect congestion or availability of bandwidth, and prioritize or throttle traffic. QoS gives IT administrators the flexibility to, for example, prioritize latency-sensitive traffic such as voice or video communications, and control the impact of latency-insensitive traffic such as bulk data transfers. Windows 8.1 comes built-in with the QoS Packet Scheduler tool, which controls packet scheduling for policy-based QoS and the traffic of QoS-enabled applications. Additionally, Windows 8.1 uses qwave to provide QoS-related software modules specifically for audio and video applications and wireless networks. The qwave feature is integrated into the QoS subsystem, and works with several Internet and network interface layer packet priority technologies. Apple s OS X offers Open Directory, which is a deployable directory and network authentication server built around Open Lightweight Directory Access Protocol (OpenLDAP). Open Directory utilizes OpenLDAP to access and maintain distributed directory information over the network using the Kerberos Key Distribution Center (KDC) for user authentication. Microsoft QoS technologies are designed to scale for any size enterprise, and offer powerful tools to IT administrators and executives. Apple s Server App, Profile Manager, and Open Directory offer basic network management that could be effective in smallscale deployments, but are not as scalable when considering network bandwidth optimization. Bandwidth Utilization Windows 8.1 s metered connections helps users to monitor and limit network usage. Windows 8.1 comes built-in with the ability to display estimated data usage along with any unbilled charges, and works with 3G and 4G networks that handle data charges differently from fixed broadband connections. Having this capability is a benefit for enterprise users, since it can prevent any surprises in billing for those who might be using corporate data plans while traveling. Microsoft facilitates this tool by exposing APIs for other applications to utilize. Windows Update and other Windows 8 apps can deliver content differently with the knowledge that the user is using a metered connection. For example, the user might receive lower resolution pictures, lower quality video, see reduced buffer sizes, and so forth. The effect of these policies is to reduce the usage of the metered connection. Users of ios devices have access to apps that perform a similar function, but these are delivered by third-party vendors, and may increase the cost or complexity of your deployment. Logic20/20, Inc. 2013, all rights r eserved. Page 9 of 16
11 OS X uses the Activity Manager feature to monitor network usage. While this tool displays usage in either TCP packets or data received and sent, it does not translate this usage data into the cost incurred by the user. This functionality is available with thirdparty apps, which can increase the cost and complexity of your deployment. Windows 8.1 s Metered Connections comes out-of-the-box, and provides convenience for users, control for IT administrators, and can reduce costs for executives managing traveling employees. Apple s platforms do not include this functionality without involving a third-party vendor. Connectivity and Wireless Options Windows 8.1 has a number of features related to handling wireless and wired connections, including the following: Broadband driver and tethering: This broadband driver comes out-of-the-box with Windows 8.1, allowing users to connect a SIM card or mobile device to the PC, for automatic setup. The driver is kept up-to-date with Windows Update. Windows 8.1 also supports tethering, allowing users to turn their device into a mobile hotspot. Airplane mode: Some or all of the radios, including Wi-Fi, mobile broadband, and Bluetooth can be turned completely off within the Windows 8 interface. Optimized preferred networks: Windows 8.1 maintains a list of preferred networks for the user, based on which the user explicitly disconnects and reconnects to. This includes automatically switching from a higher-cost network such as 4G to a lower-cost network such as a preferred Wi-Fi network. Support for carrier-unlocked devices: Windows 8 devices that support carrierswitching can connect to any supported network within the Windows 8 interface. Windows 8.1 will automatically identify the mobile carrier associated with the device, and allow users to purchase data plans or perform other transactions with that carrier. Support for new wireless connectivity standards: Windows 8.1 supports IPv6, Bluetooth low energy, Miracast wireless display, Wi-Fi Direct printing, NFC, and other new connectivity standards. These items are discussed more in detail in the Productivity in the Office section, below. Apple ios and OS X supports tethering, but does not include a built-in broadband driver that is updated similarly to Windows 8.1 s. The Apple platforms also support airplane mode. Neither Apple platform automatically switches the user s network based on switching from higher-cost networks to lower-cost ones. All three platforms support the major wireless option, such as Wi-Fi, Bluetooth, 3G, and 4G. While their individual tools for managing them are different, they provide a similar feature set and are considered on par with each other. However, the productivity tools used by Windows 8.1 give Microsoft an edge in terms of helping workers to do their jobs in a more efficient manner, and neither ios nor OS X have the same comprehensive Logic20/20, Inc. 2013, all rights r eserved. Page 10 of 16
12 set of features without involving third-party vendors, which can increase the cost and complexity of your deployment. Logic20/20, Inc. 2013, all rights r eserved. Page 11 of 16
13 Connecting on the Go With the increasing use of BYOD scenarios for users in the enterprise, providing remote access is a growing priority for businesses. Remote access allows users to connect to the corporate network and intranet over the Internet. The sections below compare Windows 8.1, ios 7, and OS X 10.8 Mountain Lion based on their remote access solutions, including considerations such as: Unified remote access Connectivity and wireless options Productivity in the office Key Findings Unified remote access: Microsoft s DirectAccess provides increased flexibility and IT control when compared to Apple s VPN on Demand. While both services provide automatic corporate network access from Internet locations, DirectAccess allows IT administrators to keep remote systems up-to-date as well as monitor and enforce policy compliance. Productivity in the office: BranchCache provides users at remote offices of large enterprises shorter wait times by storing content closer to the user. Work Folders provides users the ability to access their files from anywhere. This provides executives and IT administrators the benefit of reducing bandwidth usage. Unified Remote Access Microsoft s client VPN is standards-based, and can connect to many back-end servers. Additionally, Microsoft supports auto-triggered VPN, which pops up a prompt for VPN credentials when a user visits a site that requires them, instead of telling the user the site cannot be reached. This VPN on Demand feature is more granular than Apple s offering, and allows IT administrators to finely tune the app and process whitelist. Microsoft s VPNs are supported by the InTune client, which provides IT administrators the controls to manage the network. Microsoft supports DirectAccess, which allows devices to access internal resources any time they are located on the Internet, without needing to log in to a VPN connection. DirectAccess automatically establishes a bi-directional connection from client devices to the corporate network, providing key convenience for users by not requiring them to manually connect to their enterprise network. DirectAccess grants users access to line-of-business apps and internal websites they might need for productivity, and allows IT administrators to manage remote computers outside the office, even when not connected to the VPN. In Windows Server 2012, DirectAccess and VPN function as a single, integrated server. This means that IT administrators can deploy and manage both VPN and DirectAccess from a single Logic20/20, Inc. 2013, all rights r eserved. Page 12 of 16
14 console, providing a single integrated solution that does not require separate clients and back-ends. OS X provides a VPN client, and also supports VPN on Demand. This feature is similar to DirectAccess in some ways, as it establishes a corporate network connection automatically when accessing predefined domains. The functionality of this tool can be configured through a Configuration Profile, or manually on the device by the user. VPN on Demand is supported only for configurations using certificate-based authentication. Additionally, support is specific to certain domains as controlled by the IT administrator. Users of ios devices can use a built-in VPN client, and third-party applications are also supported. Given that all three platforms use Internet-standard protocols for their builtin VPN clients, there is no notable difference between them. However, Microsoft s DirectAccess provides IT administrators better control over remote systems, helping to keep them patched, up-to-date, and monitored for policy compliance, which are features that Apple s VPN On Demand does not include. Productivity in the Office BranchCache downloads files, apps, and other content from the wide area network (WAN) and stores it locally as cached data. Client machines can then access this local cached data, instead of downloading it across the WAN repeatedly, which reduces WAN usage, improves access speed of cached content, and improves performance for users in remote offices. To protect this cache, Windows 8.1 includes cache encryption. Data de-duplication technology reduces the number of times that the same data needs to be transmitted, as well. BranchCache scales from small offices to large enterprises by supporting any number of hosted cache servers at a given location. An additional productivity feature for Windows 8.1 is Work Folders. This tool allows IT administrators to set up a folder on the corporate server called a sync share, which will automatically sync on all of a user s devices. This helps users get access to their files from work, from home, in BYOD scenarios, or a combination of all of these. Windows 8.1 introduces several other productivity enhancements, as well: NFC tap-to-pair printing: By attaching an NFC tag to an existing printer, users can tap their Windows 8.1 device against it to directly connect and print. Wi-Fi direct printing: Users can connect directly to Wi-Fi printers, without the need for additional drivers or software. This forms a direct peer-to-peer connection between the device and the printer. Native Miracast wireless display: Windows 8.1 supports Miracast out-of-thebox. Miracast is a peer-to-peer wireless screencast standard that facilitates easy pairing over Wi-Fi, helping users project their work wire-free. Workplace Join: Windows 8.1 allows users to enroll their own devices in the corporate network. Once registered, IT can manage their network access and help Logic20/20, Inc. 2013, all rights r eserved. Page 13 of 16
15 to maintain security and company policies. This, in combination with Work Folders, allows personal and work activities to remain separated. IT controls the company s assets but does not control the personal assets. Neither Apple platform have features comparable to these built-in, but third-party solutions may be able to address that gap. BranchCache helps decrease the cost of bandwidth at remote offices, and Work Folders helps to improve productivity for workers in BYOD scenarios. The new Windows 8.1 features offer easy solutions to common office problems. Logic20/20, Inc. 2013, all rights r eserved. Page 14 of 16
16 Conclusion With the increase in BYOD and anywhere, anytime work styles, enterprises need to have smart and efficient networking tools to keep up. Microsoft s comprehensive suite of tools for Windows 8 and 8.1 offer enterprise-grade optimization, customization, bandwidth utilization, and productivity features that give IT administrators greater ability to control their networks, and provides convenience and productivity for users by helping them get what they need, wherever they are. Microsoft offers a comprehensive suite of tools built in to Windows 8.1 and based on the company s long history of providing enterprise tools. These tools offer enterprisegrade optimization, customization, bandwidth utilization, seamless remote access, and productivity features. These tools give IT administrators greater ability to control their networks and a single pane of glass from which to control all of them, while providing convenience and productivity for users by helping them get what they need, wherever they are. Microsoft offers several features, such as DirectAccess, native Miracast wireless display support, NFC tap-to-print, QoS technologies, and BranchCache which are not offered by Apple. Apple s platforms support third-party tools that are similar to the some of the features built in to the Windows 8.1 platform. However, introducing third-party vendor solutions can increase the complexity and cost of your deployment. ios in particular does not offer these features natively, requiring administrators to implement third-party tools instead of using the features and functionality that come built-in to Windows 8.1. For executives looking to help their employees be more productive regardless of where they are located, Windows 8.1 has the edge in enterprise networking. Logic20/20, Inc. 2013, all rights r eserved. Page 15 of 16
17 Presented By: Logic20/20 Writer: Justin Bright Contributors: Marius Marcu, Anders Westby, Emily Winans, Bill Tsang, Adam Hall, Craig Ashley, Abhishek Tiwari Date: Fall 2013 This paper includes research gathered as of October 1, 2013 regarding Windows 8.1, ios 7, and OS X Logic20/20, Inc. acknowledges the support of Microsoft Corporation, which made possible some of the research presented in this white paper. Publicly available sources were also used as research and are cited in the paper. This white paper is for informational purposes only. The information contained in this document is deemed reliable at the time of writing, but is not guaranteed. Logic20/20, Inc. MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Without limiting any rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express prior written permission of Logic20/20, Inc. Logic20/20 and the Logic20/20 logo are trademark(s) of Logic20/20, Inc. All other trademarks are trademarks of their respective owners Logic20/20, Inc. All rights reserved. Logic20/20, Inc. 2013, all rights r eserved. Page 16 of 16
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
More informationios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
More informationCorporate-level device management for BlackBerry, ios and Android
B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and
More informationHIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
More informationBlackBerry 10.3 Work Space Only
GOV.UK Guidance BlackBerry 10.3 Work Space Only Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network architecture
More informationNew Choices in Windows * Device Management
White Paper 4th Generation Intel Core Processors and Intel Atom Processors Intel and Windows 8.1* Mobility New Choices in Windows * Device Management Considerations in Deciding How to Manage Windows Devices
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationHIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
DATASHEET HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY Gold level EMM for BlackBerry Regulated-level security for BlackBerry 10 devices Ultimate security. BlackBerry 10 devices managed by BES10 with
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationSecure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationMaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
More informationConnecting your Aiki phone to a network
Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or
More informationComparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationWindows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows
More informationiphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
More informationARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org
More informationAndroid App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationDirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team
DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world
More informationWireless Network Quality of Service WHITE PAPER
Wireless Network Quality of Service WHITE PAPER Executive Summary Most wireless deployments rely on cellular data networks for connectivity, which have bandwidth constraints. The quality of service (QoS)
More informationMobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
More informationMeru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Mobility has transformed work from a location to an activity. Smartphones, tablets, and laptops enable
More informationSecure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst
ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access
More informationSECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationIntroducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland
Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows
More informationTechnical Overview of Terminal Services
Technical Overview of Terminal Services Microsoft Corporation Updated: January 2005 Abstract Windows Server 2003 includes the Terminal Services features of Windows 2000, the client and protocol enhancements
More informationSecure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
More informationCaching SMB Data for Offline Access and an Improved Online Experience
Caching SMB Data for Offline Access and an Improved Online Experience Agenda What is Offline Files How does Offline Files interact with SMB Offline Files enhancements for Windows 7 Questions 2 What is
More informationICT Professional Optional Programmes
ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications
More informationMaaS360 Mobile Service
Services > Overview MaaS360 Mobile Service Go Mobile! Everything for mobile work - visibility, control, easy mobile connectivity, management tools and security - all in one economical, hosted solution.
More informationHow To Secure Your Mobile Devices
SAP White Paper Enterprise Mobility Protect Your Enterprise by Securing All Entry and Exit Points How Enterprise Mobility Management Addresses Modern-Day Security Challenges Table of Contents 4 Points
More informationEasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks
EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,
More informationHow To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device
Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...
More informationWindows 8 Devices Deliver: Simplified management done through a single pane of glass. Review infographic
Windows 8 Devices Deliver: Simplified management done through a single pane of glass Review infographic Contents Executive Summary... 2 Introduction... 3 Overview... 3 Scenarios... 6 Scenario 1: Managing
More informationPOLICY MANAGEMENT MODULE
Granular Management of Wireless Bandwidth, Security and Mobile Productivity www.netmotionwireless.com Executive Summary Administering a mobile environment is challenging, and involves issues above and
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
More informationComputer Networks CCNA Module 1
Chapter 1: Quiz 1 Q1: Which statement describes a network that supports QoS? The fewest possible devices are affected by a failure. The network should be able to expand to keep up with user demand. The
More informationTrust the Connectivity Experts
Trust the Connectivity Experts Simplified, Proven Connection Management Mobile operators, cable operators, and device OEMs require a dynamic solution to keep subscribers online across every possible combination
More informationWhat is Bitdefender BOX?
Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationConfiguring and Administering Windows 7
Configuring and Administering Windows 7 Length: 5 days Overview This five-day instructor-led course provides students with the knowledge and skills to configure and administer Microsoft Windows 7 as a
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationQUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab November 2012 Statement of test result confidence Aruba makes every attempt
More informationWireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com
Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that
More informationCourse 50322B: Configuring and Administering Windows 7
Course 50322B: Configuring and Administering Windows 7 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course provides students with the knowledge
More informationOpen Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
More informationLync for Mac 2011 Deployment Guide
2011 Deployment Guide Getting Started Information in this document, including URL and other Internet Web site references, is subject to change without notice. Content in this document represents the current
More informationNEW! CLOUD APPS ReadyCLOUD & genie remote access
Performance & Use AC1900 1900 DUAL BAND 600+1300 RANGE AC1900 WiFi 600+1300 Mbps speeds 1GHz Dual Core Processor Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
More informationPrinterOn Print Management Overview
PrinterOn Print Management Overview Table of Contents 1. PrinterOn and Print Management Overview... 4 1.1. Combined PrinterOn and Print Management Capabilities... 5 1.1.1. Comprehensive Workflow Tracking
More informationIt s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration
It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration By Zeus Kerravala, Founder and Principal Analyst with ZK Research Contents Introduction: Effective File Collaboration Is
More informationMeru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Today, network management is a tug-of-war between user demands and IT requirements. Users are pulling
More informationNETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0
User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,
More informationHow To Unify Your Wireless Architecture Without Limiting Performance or Flexibility
w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationSecuring Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
More informationEmpowering People-Centric IT. October 2013
Empowering People-Centric IT October 2013 Table of Contents Empowering People-Centric IT... 3 Overview... 4 Enable Users... 7 Overview... 8 Simplify BYOD Registration and Enrollment... 9 Enable Consistent
More informationSeamless Roaming in a Remote Access VPN Environment
Always on If we look just a few years into the future, the office warrior who works exclusively onsite will be a scarce phenomenon. Instead, these busy professionals will use PCs, smartphones, and tablets
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationCortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
More informationWindows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
More informationSDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility
WHITEPAPER SDN for Wi-Fi OpenFlow-enabling the wireless LAN can bring new levels of agility Copyright 2014 Meru Networks, Inc. All rights reserved. Table of Contents Executive summary... 3 Introduction...
More informationWireless Network Quality of Service
Wireless Network Quality of Service WHITE PAPER NetMotion Wireless 701 N 34th Street, Suite 250 Seattle, WA 98103 206.691.5555 Overview The Yankee Group estimates that over 39% of the US workforce 51 million
More informationEMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
More information5 tips. awesome. mobile. enterprise. apps. An introduction to great app development using motwin Platform
5 tips build to awesome mobile enterprise apps. An introduction to great app development using motwin Platform 1. Real-Time Data Streaming Ensure that the data your user access is dynamic and up-todate.
More informationFROM TELEPHONY TO IP COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH IP COMMUNICATIONS APPLICATION NOTE
FROM TELEPHONY TO COMMUNICATIONS: A NATURAL EVOLUTION REDUCE COSTS AND IMPROVE MOBILITY WITH COMMUNICATIONS APPLICATION NOTE CONTENTS INTRODUCTION / 3 INCREASE PRODUCTIVITY WITH A CONNECTED WORKSTATION
More informationThe Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices
The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices Essay Authors Ted Shorter, CTO, Certified Security Solutions, Inc. Wayne Harris, PKI Practice Lead, Certified Security
More informationios Education Deployment Overview
ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationSecure Mobile Content Management for the Enterprise
SAP Brief SAP Technology SAP Mobile Documents Objectives Secure Mobile Content Management for the Enterprise Managing mobile content and protecting corporate assets Managing mobile content and protecting
More informationKEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE
KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE There s been lots of buzz about the tsunamis of change hitting IT. Talk of pivoting to the cloud, the growing mobile workforce, and the Internet of Things
More informationMCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access
MCTS Guide to Microsoft Windows 7 Chapter 14 Remote Access Objectives Understand remote access and remote control features in Windows 7 Understand virtual private networking features in Windows 7 Describe
More informationHosted desktops from Synergy IT Solutions Inc. with
[partner logo here] Hosted desktops from Synergy IT Solutions Inc. with Microsoft Windows Server 2012 Technical whitepaper Contents 1 Virtual Desktop Solutions 3 Microsoft VDI 3 New and enhanced features
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationMaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
More informationWhat s New in ISA Server 2004 ISA Server 2004 contains a fullfeatured,
Microsoft Internet Security and Acceleration (ISA) Server 2004 is the advanced application-layer inspection firewall, VPN, and Web cache solution that enables enterprise customers to maximize existing
More informationVIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationReal World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
More informationMicrosoft 70-696 Exam
Volume: 86 Questions Topic 1: Proseware, Inc. 8 Topic 2: Litware, Inc. 14 Topic 3: Contoso, Ltd. 7 Topic 4: Fabrikam, Inc. 13 Topic 5: Mix Questions 44 Topic 1, Proseware, Inc. Case Study Overview General
More informationSolutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.
Solutions Guide Secure Remote Access Allied Telesis provides comprehensive solutions for secure remote access. Introduction The world is generating electronic data at an astonishing rate, and that data
More informationHow To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationStep By Step Guide: Demonstrate DirectAccess in a Test Lab
Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008
More informationQuick Start. Nighthawk X8 AC5300 Tri-Band WiFi Router Model R8500. Package Contents. NETGEAR, Inc. 350 East Plumeria Drive San Jose, CA 95134 USA
Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support to register your product, get help, access the latest downloads and user manuals, and join our community. We
More informationDeploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
More informationMaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationEnd User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
More informationWith a little bit of IPv6 magic: Windows 7 DirectAccess
With a little bit of IPv6 magic: Windows 7 DirectAccess Click to edit Master subtitle style Thomas Treml Technologieberater Microsoft Deutschland GmbH Thomas.Treml@microsoft.com Networking and Access Landscape
More informationVIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
More informationSSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
More informationIBM System i Integrated Collaboration
Delivering on the Promise IBM System i Integrated Collaboration Highlights Integrate your voice, collaboration and business applications on a single system Boost customer satisfaction and loyalty by enhancing
More informationGood Share Client User Guide for ios Devices
Good Share Client User Guide for ios Devices Product Version: 3.1.3 Doc Rev 3.1 Last Updated: 24-Feb-15 Good Share TM Table of Contents Introducing Good Share 1 Installing the Good Share App 1 Getting
More information