Mobile App Containers: Product Or Feature?
|
|
|
- Suzan Pierce
- 10 years ago
- Views:
Transcription
1 ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating corporate applications (apps) and data on mobile devices are becoming a mainstream approach to mobile security strategies. While software solutions have been on the market for several years, and have even been available as carrier services (as dual persona solutions), adoption has been slow. This is likely to change, however, because the two biggest players in mobile device markets, Apple and Samsung, have embraced the approach. Apple s recently released ios 7 supports multiple enterprise- friendly features, including several that allow for a richer capability to separate personal and corporate apps and data. Samsung has gone even further by embracing containerization within its Samsung KNOX framework. While the containerization features in ios7 are not nearly as comprehensive as the Samsung KNOX container capability, that fact that Apple plays so strongly in the enterprise has generated significant attention on those features. Interestingly, VMware believes that the release of ios 7 has eliminated the need for third- party container and wrapper technologies on Apple devices. VMware Workspace 1.5 shipped without the ios application wrapping capabilities that VMware had developed for the product. 1 Mobile OS vendors and device original equipment manufacturers (OEMs) might well subsume the secure workspace market over time, but Apple would have to continue to extend the features it has only recently introduced, and a broader set of Android device OEMs would need to move in this direction. Regardless of whether containerization eventually becomes a standard product feature, today, both Apple and Samsung rely on third- party solutions to provide the server side components of their container features, which leaves ample opportunity for pure- plays. Samsung has even coined a term for these partners: Mobile Container Management vendors. 1 strategy- for- ios- 7- and- industry- implications/
2 NSS Labs Findings Apple has introduced rudimentary containerization features in ios 7 that will meet the needs of some enterprise clients. Samsung s KNOX solution provides an integrated secure workspace on a small but growing number of Samsung devices. Apple and Samsung both are reviewing third- party mobile device management (MDM) vendors to extend and fully enable their secure workspace capabilities. Third- party secure workspace solutions will continue to find customers, but increasingly as components of much broader enterprise mobility management (EMM) solutions. NSS Labs Recommendations Organizations using Apple products are urged to leverage the new enterprise features in ios 7, particularly those that enable better app and data segmentation and isolation. Enterprises that have been hesitant to allow Android devices onto their networks should examine Samsung KNOX, which adds robust security features to a popular consumer device line. Enterprises that have fully embraced bring your own device (BYOD) policies should consider best- of- breed secure workspace solutions to augment the security of these devices. EMM vendors, the majority of which have been moving into the secure workspace market, should continue to expand their footprints with the expectation that client- side mobile security features will continue to be subsumed within mobile operating systems. EMM vendors should continue to work closely with device manufacturers to add value beyond basic device management in complementary gateway, server, and cloud products. 2
3 Analysis Apple ios 7 Apple ios 7 has introduced some techniques to better enable dual persona segmentation on iphones and ipads. These include the introduction of Managed Open In, and additional MDM configuration controls that make the availability of managed apps and managed accounts much more useful for creating secure workspaces. Volume Licensing Perhaps the most important new feature in ios 7 is the volume licensing support from Apple. This feature allows enterprises to take a more app- centric approach to security. Organizations can now order and deploy apps in bulk and they have the right to reclaim a license when an employee leaves the organization. There are also no longer geographic (national) usage restrictions on licenses. These improvements make it much easier for organizations to manage applications deployed on employee devices, regardless of who actually owns a device. Enterprise Management Features ios 7 includes several important new enterprise features. The encryption capabilities for app data at rest that Apple introduced in ios 4 are now automatically enabled on all devices that have passcode lock enabled. All third- party apps now automatically have data protection enabled. Data stored in third- party apps will be protected with the user s passcode until they unlock the device. This change has clear security benefits, and it simplifies the app development process. Also now supported by ios 7 are per- app virtual private network (VPN) connections that enable specific VPN controls on individual managed apps. The ability of administrators to configure, or reconfigure, VPN settings is just one example of a broader capability to enforce managed app provisioning and configuration changes within ios 7. This ability to push, delete, and update managed apps on Apple devices provides much richer control to administrators. The distinction between managed (i.e., corporate) and unmanaged (i.e., personal) apps that ios 7 allows is most useful in its new Managed Open- In feature, which restricts data sharing between managed and unmanaged apps. As the name implies, the Open- In feature controls which apps are used to open documents. Managed Open In will not allow a document from a managed app to be opened or shared in an unmanaged app. This restriction can also be enforced the other way, providing additional privacy enforcement for personal data on a device by not allowing it to be opened within a managed app. An app or account is managed when it is provisioned on the device by a mobile device management (MDM) server. Third- party MDM solutions remain an important adjunct to ios as they are the mechanism for leveraging enterprise device APIs. Managed ios devices (and accounts) are by definition provisioned and managed by MDM solutions. Apple s maturing MDM framework supports the following features: Managed accounts: Installation, management, and removal of accounts that provide access to corporate services. Managed configurations: Configuration of settings such as passcodes, restrictions, and voice and data roaming policies. Managed apps: Installation, configuration, management, and removal of App Store and custom in- house apps. 3
4 Device queries: Scheduled querying of device, network, application, and security information. Security commands: Ability to clear a user s passcode, and remotely lock or wipe a lost or stolen device. Third- Party Integration MDM systems interact with ios devices through the Apple Push Notification Service (APNs). If an MDM server must communicate with an iphone or ipad, it must first notify the APNs, which will then alert the device to check in with the MDM server. All communication between the device and the MDM server is via an encrypted SSL/TLS connection. The MDM server performs all provisioning and configuration of the managed apps and accounts. These controls are maintained in configuration profiles (XML files), which are signed and encrypted before being installed on the device. ios 7 has added several important enterprise features that can be leveraged by MDM partners to create better data isolation for corporate apps on Apple devices. These include: Control of Open- In With ios 7, Apple has introduced a new API that allows information technology (IT) administrators to dictate which apps users can use to open attachments. These controls currently only enforce policy based on whether an app is managed (installed through an MDM system) or unmanaged (installed directly by the end user). Per- application VPN ios has supported device- level encryption for some time; however, with the release of ios 7, the OS now supports application- level VPN connections. To be functional, the organization s server side VPN hardware must also support this capability. Single sign- on With ios 7, Apple has also enabled application- level Kerberos authentication. Configure application settings ios 7 allows administrators to configure settings for individual apps. This includes installing and deleting apps, as well as specific configurations within the app or managed accounts (for example, server names, Lightweight Directory Access Protocol (LDAP) credentials, and certificates). Additional Considerations These features make the devices that are running ios 7 more secure and useful in the enterprise, with the Managed Open- In feature in particular providing basic containerization capabilities. Unfortunately, it does not allow fine- grained policy controls. Administrators can ensure that corporate documents are opened only in managed apps, but they cannot limit Open- In to particular managed apps. For example, any managed app can open any document that is attached to a corporate account. The only real restriction is that a corporate attachment cannot be opened in an unmanaged app. (A policy can also be set so that an attachment in a personal cannot be opened in a managed app.) Clearly, some corporate documents are more sensitive than others. However, beyond the distinction between managed and unmanaged, there are no supported restrictions that are based on document type. Enterprises currently using third- party secure workspace solutions will find the ios 7 features fairly rudimentary, while organizations that have yet to deploy broader EMM solutions likely will find them a positive and useful evolution in the Apple s products. The new ios 7 features are, of course, limited to (up- to- date) Apple devices but in fact may be used only on Apple devices where users have allowed some degree of management of the device. Samsung KNOX In early 2012, Samsung signaled an interest in expanding the target market for its Android devices to enterprise customers with its introduction of the first Samsung Approved for Enterprise (SAFE) devices. SAFE devices support 4
5 Samsung On Device Encryption (ODE) and a software development kit (SDK) that allows partners to leverage a richer set of security and management APIs than is found in the base Android build. In February 2013, Samsung further extended its security differentiation with the introduction of KNOX. Containerization is a core component of Samsung s enterprise security strategy and KNOX framework. The main security features in KNOX 2 are: Trusted Boot: a hardware- assisted feature that ensures that the device boots only from an authorized kernel TrustZone- based Integrity Measurement Architecture (TIMA): provides a continuous security check of the integrity of the kernel Security Enhancements (SE) for Android: leverages the SE for Android kernel, which allows the use of Mandatory Access Control (as opposed to Discretionary Access Control) Secure Workspace: provides a secure container for work apps, and widgets. The Samsung KNOX Application Container is a virtual Android environment within the mobile device. Samsung KNOX Application Container The Samsung container is managed through a third- party MDM system. KNOX secures apps and data within its container through the following features: separation of data file systems used by the personal space and the KNOX container; encryption of all data within the KNOX container; isolation of apps and data within and without the KNOX container. A separate, dedicated encrypted file system is employed for data stored within the container. The data is encrypted using an Advanced Encryption Standard (AES) cipher algorithm with a 256- bit key (AES- 256). Apps that are installed in the container must be wrapped first. Wrapping apps for use in Samsung KNOX devices is a two- part process. Samsung s web- based, automated app wrapping service unpacks an app s original Android application package (APK) file in order to extract the app certificate then repackages the app with additional files to further secure it, and finally adds a new digital signature and KNOX container- specific certificate. Samsung also offers a quality assurance service. Wrapped apps are checked for device compatibility and basic function and are also inspected for malware or risk behaviors. Apps that pass the testing may be distributed and deployed through the Samsung KNOX App Store or enterprise app stores. These third party and custom apps can be installed either by enterprise IT administrators via MDM or by the end user from the container app store. The KNOX container has the following apps preinstalled: personal information manager (PIM), , web browser, and device utilities. These are essentially the same apps with which consumer users of Samsung devices are already familiar, but the containerized versions enforce several use restrictions. For example, users cannot copy- and- paste text or images from the container into the personal space, nor can they access container data (i.e., browser bookmarks) from the personal space and move files from the container to the personal space. With KNOX, Samsung now supports more than 500 policies that IT administrators can use to configure devices through an MDM console. This is in addition to the almost 300 policy controls available through Samsung SAFE. All told, Samsung has exposed more than 1000 APIs, which can be leveraged through third- party MDM solutions. Samsung s current KNOX partners are: Centrify, AirWatch, SOTI, Fixmo, MobileIron, Famoc, and SAP. 2 For additional detail, see enterprise- ready- android- devices- 0 5
6 Market Impact While the Samsung approach to providing a secure workspace offers a more comprehensive solution than do the containerization features found in Apple s ios 7, it also requires more from end users and thus has more impact on the user experience. For example, the Samsung approach requires the use of two versions of several core apps, including the native PIM. This may confuse some users. For example, the native calendar found on the personal side of the phone cannot view all events in the PIM on the container side of the device. KNOX is also a value- added feature, whereas the Apple container capabilities are standard features in ios 7. Current KNOX pricing is per device and licensing is available on a monthly (USD $3.60) or annual (USD $43.20) basis. Clearly, enterprise requirements are being paid considerable attention by Samsung and Apple, the two largest mobile device manufacturers. It is also likely that other Android device OEMs will also introduce enterprise- friendly features, particularly since Google has shown little interest in baking enterprise- specific features into the core Android kernel. Secure workspaces, enabled by container and app wrapping techniques are emerging as viable solutions to solving the dual persona requirements of enterprises that are adapting to the world of consumerized IT. Enterprises should expect that both Apple and Samsung will continue to mature and extend their containerization capabilities, but on a refresh cycle that is considerably slower than third- party providers. Enterprises can find utility in the Apple and Samsung features today, but they should consider their ability to restrict device choice to one device vendor to fully exploit these solutions. It is expected that third- party vendors will continue to thrive in the secure workspace market for some time. Even as these vendors are pushed off the endpoint as more container features are baked into the devices, there will continue to be opportunity for managing heterogeneous device ecosystems from the server side. 6
7 Reading List Need for Data Isolation Drives Innovation. NSS Labs data- isolation- drives- innovation App Hardening to Protect Mobile Device Data. NSS Labs hardening- protect- mobile- device- data Building Enterprise- Ready Android Devices. NSS Labs enterprise- ready- android- devices- 0 7
8 Contact Information NSS Labs, Inc. 206 Wild Basin Rd Building A, Suite 200 Austin, TX USA +1 (512) This analyst brief was produced as part of NSS Labs independent testing information services. Leading products were tested at no cost to the vendor, and NSS Labs received no vendor funding to produce this analyst brief NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the authors. Please note that access to or use of this report is conditioned on the following: 1. The information in this report is subject to change by NSS Labs without notice. 2. The information in this report is believed by NSS Labs to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at the reader s sole risk. NSS Labs is not liable or responsible for any damages, losses, or expenses arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY NSS LABS. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON- INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY NSS LABS. IN NO EVENT SHALL NSS LABS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet the reader s expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. 8
Mobile Security Buyer s Guide
ANALYST BRIEF Mobile Security Buyer s Guide PART 1: THE BASICS Author Andrew Braunberg Overview The consumerization of information technology (IT), particularly relating to the increasingly common bring
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
In-Depth Look at Capabilities: Samsung KNOX and Android for Work
In-Depth Look at Capabilities: Samsung KNOX and Android for Work Silent Install Using the Samsung KNOX Workspace Mobile Device Management (MDM) APIs, IT admins can install and enable applications automatically.
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
MDM Mobile Device Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
Internet Advertising: Is Your Browser Putting You at Risk?
ANALYST BRIEF Is Your Browser Putting You at Risk? PART 2: CLICK FRAUD Authors Francisco Artes, Stefan Frei, Ken Baylor, Jayendra Pathak, Bob Walder Overview The US online advertising market in 2011 was
Multiple Drivers For Cyber Security Insurance
ANALYST BRIEF Multiple Drivers For Cyber Security Insurance EXPECTATIONS PLACED ON INSURANCE CARRIERS RISE WITH MARKET GROWTH Author Andrew Braunberg Overview There has been considerable good news for
SSL Performance Problems
ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
BROWSER SECURITY COMPARATIVE ANALYSIS
BROWSER SECURITY COMPARATIVE ANALYSIS Privacy Settings 2013 Randy Abrams, Jayendra Pathak Tested Vendors Apple, Google, Microsoft, Mozilla Overview Privacy is an issue on the front lines of the browser
ENTERPRISE EPP COMPARATIVE REPORT
ENTERPRISE EPP COMPARATIVE REPORT Security Stack: Socially Engineered Malware Authors Bhaarath Venkateswaran, Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3.15.539 ESET
Evolutions in Browser Security
ANALYST BRIEF Evolutions in Browser Security TRENDS IN BROWSER SECURITY PERFORMANCE Author Randy Abrams Overview This analyst brief aggregates results from NSS Labs tests conducted between 2009 and 2013
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
DATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security Value Map (SVM) 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
MAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
Quick Reference. Good for Enterprise to Good Work Transition Guide
Quick Reference Good for Enterprise to Good Work Transition Guide Published: 2016-04-15 SWD-20160415144335381 Contents Good for Enterprise to Good Work transition guide... 4 Key concepts... 4 Steps to
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
ZENworks Mobile Management 3.0.x Deployment Quick Start
ZENworks Mobile Management 3.0.x Deployment Quick Start September 2014 This Quick Start helps you deploy ZENworks Mobile Management in your environment. It includes the following sections: Install Your
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Total Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski [email protected] www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
Implement Mobile Device Management to Deploy HCSS Mobile Apps
Implement Mobile Device Management to Deploy HCSS Mobile Apps A guide to MDM & EMM product selection Femi Ariyo [email protected] Our Goal Understand mobile device management and its benefits Examine different
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Security Guide. BES12 Cloud
Security Guide BES12 Cloud Published: 2015-08-20 SWD-20150812133927242 Contents Security features of BES12 Cloud...4 How BES12 Cloud protects data stored in BlackBerry data centers...4 How BES12 Cloud
A number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
Oracle Mobile Security
Oracle Mobile Security What s New in OMSS 11gR2 Patch Set 3 ORACLE WHITE PAPER MAY 2015 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes
User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual
User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...
1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Solve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
Cloud Services MDM. Overview & Setup Admin Guide
Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
Compatibility Matrix. BES12 Cloud. July 20, 2016
Compatibility Matrix BES12 Cloud July 20, 2016 Published: 2016-07-20 SWD-20160719104452880 Contents Introduction... 4 Legend... 4 Browser...5 BlackBerry Connectivity Node... 6 Operating system...6 Microsoft
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
Compatibility Matrix BES12. September 16, 2015
Compatibility Matrix BES12 September 16, 2015 Published: 2015-09-16 SWD-20150916153710116 Contents Introduction... 4 Legend...5 BES12 server... 6 Operating system...6 Database server...6 Browser... 8 Mobile
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
BES10 Self-Service. Version: 10.2. User Guide
BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Enterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
Compatibility Matrix. BES12 Cloud. December 14, 2015
Compatibility Matrix BES12 Cloud December 14, 2015 Published: 2015-12-14 SWD-20151214144314895 Contents Introduction... 4 Legend... 4 Browser... 4 BlackBerry Cloud Connector...5 Operating system...5 Microsoft
Mobile App Management:
Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management
Statement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
User Guide. BES12 Self-Service
User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles
FIREWALL COMPARATIVE ANALYSIS Total Cost of Ownership (TCO) 2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles Tested s Barracuda F800, Check Point 12600, Cyberoam CR2500iNG, Dell SonicWALL
MobileIron and Samsung Value Proposition
MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
DATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Security 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Data Center Overview
New Security Features
New Security Features BlackBerry 10 OS Version 10.3.1 Published: 2014-12-17 SWD-20141211141004210 Contents About this guide... 4 Advanced data at rest protection... 5 System requirements... 6 Managing
Key Requirements of Enterprise Mobility Management Solutions
Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:
Android for Work powered by SOTI
Android for Work powered by SOTI Work The Way You Live Secure Enterprise Mobility Management Android for Work powered by SOTI transforms workplace mobility with enhanced security, consistent management
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts
Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts 2013 mobco MobileIron Hendrik Van De Velde Your regional
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
AnceroAir Mobile Device Management (MDM) Service Guide
AnceroAir Mobile Device Management (MDM) Service Guide Contents Service Overview... 3 Core Mobile Device Management... 3 Mobility Management Bundle... 3 Secure Productivity Suite... 4 TouchDown (with Exchange
Mobilize your Enterprise in 60 Minutes!
Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
An Old Dog Had Better Learn Some New Tricks
ANALYST BRIEF An Old Dog Had Better Learn Some New Tricks PART 2: ANTIVIRUS EVOLUTION AND TECHNOLOGY ADOPTION Author Randy Abrams Overview Endpoint protection (EPP) products are ineffective against many
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization
BES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
PrinterOn Mobile Applications for ios and Android
PrinterOn Mobile Applications for ios and Android Table of Contents 1. Key Features & Functionality... 4 1.1. Printer Discovery... 4 1.1.1. Location-Based Search... 4 1.1.2. Keyword Search... 5 1.1.3.
Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.
PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Published Date July 2015 Contents Executive Summary 3 Introduction
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
ios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
Securing Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
Mobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients June 2015 Exchange ActiveSync The my Xperia service
Dell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015
SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015 2014 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any
Secure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
