Enterprise Mobile Device Automated Configuration and Deployment Systems Integration Perspective White Paper
|
|
- Adrian Garrison
- 8 years ago
- Views:
Transcription
1 Enterprise Mobile Device Automated Configuration and Deployment Systems Integration Perspective White Paper 4 June 2015 Kaprica Security Inc Sunset Hills Road, Suite LL4, Reston, VA USA kaprica.com sales@kaprica.com +1 (202)
2 Executive summary This short white paper provides a high-level of overview of the state of the art of automated configuration and deployment for Apple and Samsung devices from a systems integration perspective, featuring own brand tools from Apple, Samsung and also introduces Kaprica s Tachyon tool as part of the Samsung Business ecosystem. Table of contents Executive summary... 2 Table of contents... 2 Keywords... 2 Audience... 2 Introduction... 3 Objectives... 3 What is the current state of play?... 4 Best practice for Apple... 5 Apple Configurator... 6 Apple Device Enrollment Program (DEP)... 6 Samsung Device Configuration Tool (DCT)... 8 Samsung Knox Mobile Enrollment (KME)... 8 Kaprica Tachyon... 9 Tachyon case study Tachyon video demos Conclusions Abbreviations About Kaprica Security Inc Keywords Apple Android BYOD Carrier Configuration Configurator CYOD DCT DEP Deployment Audience EMM Enterprise GFE Google Kaprica Kitting KME Knox MAM MDM MMS Mobile Enrollment Samsung Self service Provisioning Systems integrator Tachyon VAR VPP White glove Enterprise mobile infrastructure engineers, administrators and executives Systems integrators VAR (Value Added Resellers) and resellers MMS (Managed Mobile Services) providers EMM (Enterprise Mobile Management) vendors Telco Carriers Kaprica Security Inc. 2 of 11
3 Introduction Government and commercial organizations want to take advantage of the latest smartphone and tablet mobile devices for employees and potentially partners and customers 1. Unlike in the consumer realm, where everyone receives a standard factory build and customizes it to their personal tastes, organizational rollouts involve numerous standardized configuration steps between that factory build and end user delivery. This white paper deals with automation of configuration and deployment of mobile devices for enterprise, minimization of risk, time lines and costs for the two most popular groups of mobile devices Apple and Samsung 2. The main focus is initial configuration and deployment, or refreshes, and in maintaining quality, compliance and security. Consideration is also given to the related issues of partial, or complete, updates of devices already in use. While EMM are valuable tools for mobile management, recommended by Kaprica and industry analysts alike, the fallacy of EMM 3 as a hammer for which any and all issues of enterprise mobility configuration and deployment are nails is also addressed. Historically, enterprise admins, integrators, carriers or manufactures themselves carried out these steps either manually, or with partial automation, so called pre-staging. Combining setup steps and corporate data like usernames, addresses and passwords along with QA and testing can take from several minutes per device in simple use cases, to over an hour in complex environments. Since organizations have 100s to 1,000s of devices, this can add up not only to man weeks or months of manual setup and data entry but also rollout risk, with potential impacts to admin productivity, end user adoption, direct costs and indirect costs around end user productivity, help desk calls and re-work. Objectives High level goals such as driving productivity, reducing direct and indirect costs, imply attention to a number of areas: A strong and intuitive user experience to drive acceptance An accurate and timely process Flexibly supporting the needs of various groups across an organization Choosing between shipping directly to end users for self service and / or having one or more centralized locations staffed with admins offering a white glove (end-to-end) service Having security (confidentiality, integrity and availability) appropriate for each group Coverage of a supportable envelope of hardware, OS (Operating System), apps, updates and infrastructure 1 Organizationally or government furnished (GFE) and also BYOD (Bring Your Own Device), CYOD (Configure Your Own Device) and COPE (Corporate Owned, Personally Enabled) devices. 2 Generic Google Android is not recommended for enterprise usage given the fragmented and hard to support nature of the OS (over 18,000 variants per Open Signal in 2014) and that it does not offer a secure base on which to run enterprise software. 3 Previous iterations of EMM (Enterprise Mobile Management) were known as MAM (Mobile App Management) or MDM (Mobile Device Management) Kaprica Security Inc. 3 of 11
4 Maintenance of audit trails for QA and compliance purposes appropriate to the industry vertical e.g. DISA STIG, HIPAA or PCI DSS for government, healthcare or financial organizations. In an automated configuration and deployment context, these translate into attention to: Setup of both enterprise and custom in-house apps Settings, especially networking and security e.g. VPN, proxy and certificates Personalized data e.g. Google, and IAM such as usernames, passwords and PINs App layout, wallpapers, screen savers and the like for branding Optionally installing or using tools such as EMM or Samsung s Knox What is the current state of play? Product life cycles are much faster in the enterprise mobility space than in traditional IT, so what was true 6 or 12-months ago many not be today. For example, Microsoft, the once dominant vendor in enterprise desktop and laptop IT prior to cloud, and BlackBerry, the once dominant vendor in mobile IT, are not covered here given their niche market shares compared to Apple and Samsung 4. EMM from leading vendors such as AirWatch, MobileIron, Good Technology, Citrix, IBM, Samsung EMM and others have been marketed as solutions to all enterprise mobility issues. Not all organizations choose to deploy EMM. For example, organizations with 100 to 200 devices or less, organizations with straightforward setups at large scale, organizations where there is push back from users over privacy concerns 5, or organizations having a high sensitivity to monthly fees may choose to not deploy EMM. Similarly, regarding Samsung, not all organizations need to take advantage of the additional features of Knox Premium, when Knox Standard is built-in at no additional cost. EMM s strength in management does not mean that they cover all configuration and deployment needs. In fact, there is a gap between what can be done (so called pre-staging ), and what needs to be done for an end-to-end automated solution. In figure 1, a typical EMM for Samsung is shown as an example. It is able to setup certain aspects of devices well. The area bounded by the bold blue lines is what can be pre-staged, the area outside of those lines typically requires manual setup. An ideal automated solution would cover the entire area of the figure. Many EMMs are not able to cover requests such as icon layouts, configuring Google accounts, or setting up VPN. Gartner predicts that 75% of mobile security breaches 6 will be the result of basic misconfiguration, not the lack of security tools such as EMM, anti-virus, IDP / IDS systems or app vetting MWC Cleveland Research Report Market share estimate May 15, 2015 Smartphones - Samsung 26%, Apple 18%, Microsoft / Nokia 3% and BlackBerry 0%, Tablets - Samsung 18%, Apple 26%, Microsoft 4%, BlackBerry 0% How Medical College of Wisconsin designed a policy that mandated MDM enrollment for school-owned devices and is widely accepted by faculty and students Gartner Says 75 Percent of Mobile Security Breaches Will Be the Result of Mobile Application Misconfiguration Kaprica Security Inc. 4 of 11
5 Figure 1 Gap between pre-staging with an EMM and end-to-end configuration requirements Rollout/Update 40 Knox API / setup EMM installation Enterprise apps Custom apps Branding/layout Corporate data Settings Typical EMM on Samsung / Aribitrary Scale Best practice for Apple Apple s business environment 7 has two tools, one USB-oriented, Apple Configurator, and one OTAoriented, Apple Device Enrollment Program (DEP). These, although not offering end-to-end configuration and deployment, offer pre-staging, which in most cases will still require some manual setup and final QA per device, as illustrated in Figure 2. Neither tool is appropriate for partial or complete updates of devices already in use. Apple specifically does not permit staging of OS updates. As a walled garden system, the only third party tools allowed are EMM, which largely share the same Apple API abilities and limitations. As the diagram below summarizes, Apple DEP with a leading EMM will cover in the best of cases ~80% of needs, the remaining ~20% might need the device to then be run through the Configurator and/or to have manual setup work. In the worst of cases, only ~20% of needs are covered, so depending on the exact use case and the specific EMM, true end-to-end automation and/or user self service is unlikely Kaprica Security Inc. 5 of 11
6 Figure 2 Intersection of end-to-end Apple configuration needs, Configurator, DEP and EMM End-to-end Needs Apple DEP with EMM Apple Configurator Apple Configurator Configurator 8 is a USB based tool that can be used to configure multiple Apple mobile devices at a time. Its strengths are partial automation and support for EMM. However, it does not support OTA configuration, has no app configuration, no ties to corporate data or audit trails and the EMM can simply be removed at any time. Apple Device Enrollment Program (DEP) DEP 9 is an OTA tool that can be used for mass / bulk device enrollment. Its strengths are partial automation and support for EMM. The EMM is locked around device activation and cannot simply be removed Kaprica Security Inc. 6 of 11
7 However, EMM usage is mandatory. There is no support for USB configuration, no app configuration, no ties to corporate data or audit trails. It is only available in certain geographies, a limitation shared with Apple s VPP (Volume Purchase Program) for apps. Best practices for Samsung Samsung s business environment has two own-brand tools, one USB-oriented, Device Configuration Tool (DCT), and one OTA-oriented, Knox Mobile Enrollment (KME), that with one important exception (detailed below) do not offer end-to-end configuration and deployment, instead offering pre-staging, which in most cases will still require some manual setup and final QA per device. Neither tool is appropriate for partial or complete updates of devices already in use. Cellular carriers do not permit staging of OS updates for Samsung devices. The Samsung system is more open to third parties than Apple s. It supports several EMM, although there is a wide degree of variation in their support of Samsung s extensive APIs among them. A third party tool, Tachyon, from Kaprica Security, is able to leverage all Samsung Knox APIs and extend both USB and OTA scenarios to offer end-to-end configuration. It accomplishes this running independently, or as a compliment to Samsung Knox or EMM tools. It can be also be used for partial or complete updates of devices already in use. As Figure 3 summarizes, Samsung KME with a leading EMM will cover in the best of cases ~80% of needs, the remaining ~20% of needs may require the device to have manual setup work. In the worst of cases, only ~20% of needs are covered, so depending on the exact use case and the specific EMM, true end-to-end automation and/or user self service is unlikely. Kaprica s Tachyon, working with KME and/or EMM, can cover 100% of configuration and deployment needs, allowing the flexibility to offer both end user self service, or admin white glove service (faster, more accurately and less expensively), as required Kaprica Security Inc. 7 of 11
8 Figure 3 - Intersection end-to-end Samsung configuration needs, DCT, KME, EMM & Tachyon Tachyon, EMM & KME cover 100% end-to-end needs EMM & Samsung KME Samsung DCT Samsung Device Configuration Tool (DCT) DCT 10 is a USB based tool that can be used to configure multiple Samsung mobile devices at a time. Its strengths are partial automation and the ability to call KNOX APIs. However, it does not support OTA or EMM configuration, has no app configuration, no ties to corporate data or audit trails. It requires Android s ADB / USB debugging mode to be enabled, which is a painful manual process in itself. Samsung Knox Mobile Enrollment (KME) KME 11 is an OTA tool that can be used for mass / bulk device enrollment. Its strengths are partial automation with EMM and full end-to-end automation with Tachyon. To parallel the discussion with Apple s DEP. It is possible for certain EMM (and also Tachyon independently) to lock the device so that settings and/or EMM cannot simply be removed Kaprica Security Inc. 8 of 11
9 However, with EMM alone, there is no support for USB configuration, no app configuration, no audit trails and no ties to corporate data. KME is only available in certain geographies, although access to apps via Google Play or private app stores is very flexible. Kaprica Tachyon Tachyon 12 is a Samsung exclusive technology, consisting of an app and a browser admin portal. It automates end-to-end mass / bulk configuration, deployment and QA of all current Samsung tablets and smartphones. It is not an EMM or a replacement for an EMM since its focus is configuration, being invoked and then finishing (reporting back to the portal), rather than running continuously for management and monitoring purposes as EMM do. In a nutshell, Tachyon is a superset of the Samsung configuration and deployment capabilities detailed above: Runs independently, or as a compliment to EMM and Knox Supports Offline and OTA scenarios KME, as well as QR code or traditional usernames / passwords Knox Standard and optionally Knox Premium Every Knox API is supported e.g. blacklisting phone numbers (EMMs cover only subsets) Every native Android setting supported e.g. VPN and Google Third party and in-house app configuration Custom home screen arrangement Pulls in specific corporate data for each device and maintains an audit trail for compliance purpose Rather than being just a generic configuration tool, Tachyon offers a growing library of off-the-shelf configurations to match specific industry verticals or use cases, for example: 1-click DISA STIG setup 1-click handling of sophisticated IAM / certificate / networking environments 1-click healthcare patient privacy and security for HIPAA compliance 1-click migration from one EMM to another Popularly, its an easy button for the complex process of bulk Samsung configuration and deployment. The last two examples from the list above, data sanitization and EMM migration, illustrate updating of devices in specific areas, without requiring the users to visit or ship devices to centralized locations. Other uses might include updating versions of custom apps, for example, in retail services or banking scenarios Kaprica Security Inc. 9 of 11
10 Tachyon case study A large Systems Integrator (SI), with locations in North America and in Europe, leverages Samsung for its enterprise mobile solutions practice. Its customer, a leading Ohio-based healthcare provider, needed an automated approach for deploying over 3,000 Samsung Galaxy Note devices to over 500 skilled nursing and rehabilitation locations across the US. The manual configuration of devices, including 70 individual steps and ending with a traditional EMM installation, was taking too long and the error rates were too high. The SI deployed Kaprica Security s Tachyon automated solution to speed up configuration, deployment and improve quality. An automated script was developed and tested to cover the 70 steps, leveraging the Tachyon Portal and its library of ready to use steps. Tachyon dramatically reduced configuration and deployment time and associated costs while increasing quality. The SI standardized on Tachyon for this and additional new clients with similar large deployments. The SI s administrators were able to continue to offer a white glove service, configuring 10 devices at once rather than configuring one at a time manually as they had previously done. The total time taken to configure each device was reduced from 30 to 5 minutes (not counting the charging or boot time). The QA time per device was reduced from 5 minutes to 0 since reporting and compliance are automated in the tool. With the new KME functionality, the time per device will be close to zero. The SI, like the majority of Tachyon's clients already have EMM tools, with Tachyon adding the additional configuration and deployment automation that they do not have built-in. Tachyon video demos 1-click from a QR code 0-touch with Knox Mobile Enrollment Conclusions This white paper presented best practices for Apple and Samsung mobile devices automation and configuration, detailing industry standard tools from Apple s Configurator and DEP, to Samsung s DCT and KME, to EMM. It introduced the Tachyon tool that can run independently or extend the capabilities of existing tools on Samsung platforms, to move from pre-staging, to end-to-end configuration and deployment, offering a much finer grain of control of both initial setups and on-going updates, with increased speed, accuracy and reduced costs Kaprica Security Inc. 10 of 11
11 Abbreviations ADB API BYOD COPE CYOD DARPA DC DEP DISA EMM GFE HIPAA IAM IDP IDS Android Debug Bridge Application Programming Interface Bring Your Own Device Company-issued, Personally-Enabled Device Choose Your Own Device Defense Advanced Research Projects Agency District of Columbia Device Enrollment Program Defense Information Systems Agency Enterprise Mobile Management Government Furnished Equipment Health Insurance Portability and Accountability Act Identity and Access Management Intrusion Prevention Systems Intrusion Detection System IT KME MAM MDM MMS PCI DSS OS OTA QA QR SI STIG TX USB VA VAR VPP VPN Information Technology Knox Mobile Enrollment Mobile App Management Mobile Device Management Managed Mobility Services Payment Card Industry Data Security Standard Operating System Over The Air Quality Assurance Quick Response Systems Integrator Security Technical Implementation Guide Texas Universal Serial Bus Virginia Value Added Reseller Volume Purchase Program Virtual Private Network About Kaprica Security Inc. Kaprica is an expert in mobility and security, providing hosted and on premise solutions. It was founded in 2011 by a team of cyber security experts from Lockheed Martin and Carnegie Mellon University, with the goals of delivering high quality cyber security services to a wide government and enterprise audience, and simultaneously developing easy to use and deploy software tools to support them. Today, clients range from DARPA, to the Department of Transportation, Lockheed, Intel and the University of Maryland. Kaprica is a Silver-Level Samsung partner and its enterprise software products include the Skorpion, Tachyon and RunSafe lines and associated patents. Kaprica is headquartered just outside Washington, DC, in Reston, VA, with offices in Austin, TX. Learn more at kaprica.com Kaprica Security Inc. 11 of 11
MobileIron and Samsung Value Proposition
MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationSecure Mobile Solutions
Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management
More informationGood for Enterprise Good Dynamics
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
More informationios 9.3 Enterprise Solution Brief MobileIron and ios 9.3
ios 9.3 Enterprise Solution Brief v3 MobileIron and ios 9.3 With the introduction of ios 9.3, Apple continues to make strides in simplifying management and deployment of ios devices in Enterprises by including
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationMobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
More informationGETS AIRWATCH MDM HANDBOOK
GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS
More informationCloud Services MDM. Overview & Setup Admin Guide
Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4
More informationCompany Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationSamsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
More informationHow To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
More informationEnterprise Mobility: The Impact of Changing Employee Behaviour
Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility richard.absalom@ovum.com / @RichAbsalom 23 April 2015 1 About Ovum Leading independent
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More information***NOTICE***: Proposed Selection Date now 12/16/13
Hall County Schools MDM RFP Q&A ***NOTICE***: Proposed Selection Date now 12/16/13 Are bulk enrollments a criteria? Not a criteria, but would be a nice feature to have. Is the ability to push docs out
More informationDeploying Apple ios in Education
Solution Guide Deploying Apple ios in Education March 013 This document covers strategies for deploying, monitoring, and supporting ios devices in education environments. Table of Contents 1 3 4 5 6 7
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationThe Current Landscape
SMALLER SCALE HAS MORE SPACING INSIDE LOGOMARK LARGE SCALE HAS LESS SPACING INSIDE LOGOMARK MOBILE APPLICATIONS MANAGEMENT December 2013 Prepared by Clarity Innovations Contributors: Steve Burt, Marie
More informationInsert Partner logo here. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.
More informationMobile Device and Application Strategy. Right Technology, Right Design, Right Price
Mobile Device and Application Strategy Right Technology, Right Design, Right Price Agenda 1 Mobility Strategy Methodology 2 3 Mobile Device Strategy Mobile Application Development 4 Q &A Mobility Strategy
More informationBUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.
BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationallchoice We are XMA. Empowering employee device choice within the workplace
allchoice Empowering employee device choice within the workplace We are XMA. We are XMA. We deliver innovative IT solutions that enhance how people learn, teach, govern, deliver healthcare and do business.
More informationBYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
More informationBring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
More informationWhich is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO
Which is the Right EMM: Enterprise Mobility Management Craig Cohen - President & CEO Adam Karneboge - CTO Mobile is strategic for business Mobile provides a beeer experience Mobile changes the way people
More informationMobile Application Management
Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER July 2012 Meeting the BYOD challenge with next-generation application and device management Overview... 3 The Challenge... 4 MAM Functions...
More informationStreamline Mobile Telecom Management with DATALERT! And MobileIron
Streamline Mobile Telecom Management with DATALERT! And MobileIron Companies are constantly struggling with the day-to-day management of their telecom expenses. With expanded use of mobile devices, companies
More informationMobile Device. Management-
Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly
More informationSecure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
More informationTCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
More informationMobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise
MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact
More informationDepartment of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015
Department of Veterans Affairs Two-Factor Authentication Quick Start Guide November 18, 2015 Introduction: This guide provides instructions for installation of the soft token on your non-piv enabled or
More informationHIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationIT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
More informationImplement Mobile Device Management to Deploy HCSS Mobile Apps
Implement Mobile Device Management to Deploy HCSS Mobile Apps A guide to MDM & EMM product selection Femi Ariyo Femi@hcss.com Our Goal Understand mobile device management and its benefits Examine different
More informationDeploying iphone and ipad Apple Configurator
Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions
More informationSamsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics
Samsung Solutions for Enterprise Mobility MichailasTraubas Samsung Electronics Baltics Samsung Today Samsung Electronics Baltics Established in 2008 [1999] Employees: 144 people Revenue: 357 mio. USD in
More informationMobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
More informationMAM - Mobile Application Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationEnterprise mobility trends 2015 and beyond
Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources
More informationMobilize your Enterprise in 60 Minutes!
Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationStatement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
More informationMANAGE IT. An Overview of Enterprise Mobility Management Services THE SITUATION THE CHALLENGES THE SOLUTION THE BENEFITS
MANAGE IT. An Overview of Enterprise Mobility Management Services THE SITUATION THE CHALLENGES THE SOLUTION THE BENEFITS THE SITUATION MANAGING ALL DEVICES UNDER THE SUN. As your staff uses more mobile
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationDell Mobile Management. Apple Device Enrollment Program
Dell Mobile Management Contents Dell Mobile Management 3 Setting up the 3 DMM Device Deployment Program Prerequisites 4 Configure Apple VPP Token in DMM 5 Download Apple VPP Token 5 Assign VPP App Licenses
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationMobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
More informationMDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
More informationBeyond BYOD: how businesses might COPE with mobility
Beyond BYOD: how businesses might COPE with mobility Identifying the right mobility strategy for your organization EXECUTIVE SUMMARY Ovum view: BYOD is a behavior, not a strategy There has been a lot of
More informationEnterprise Mobility Management
Enterprise Mobility Management Security Without Compromising User Experience SESSION ID: SPO2-R03 Brian Robison Principal Technology Evangelist, XenMobile Citrix Systems, Inc. Providing the freedom to
More informationEnterprise Mobility Management
Enterprise Mobility Management Vodafone Global Enterprise Vodafone Power to you Delivering the truly mobile enterprise A Ready Business is truly connected allowing you to be ready for almost anything by
More informationCentrify Mobile Authentication Services for Samsung KNOX
Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under
More information[BRING YOUR OWN DEVICE POLICY]
2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2
More informationWindows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows
More informationMobile Device Security Risks and RemediaAon Approaches
Mobile Device Security Risks and RemediaAon Approaches Raj Chaudhary, Principal, Crowe Horwath LLP In- Depth Seminars D11 CRISC CGEIT CISM CISA Informal Poll What is your Atle/role? Internal Audit IT Audit
More informationBYOD Policy Implementation Guide. February 2016 March 2016
BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationIntroducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI
Introducing AirWatch by VMware: Enterprise Mobility Simplified Menny Tsarfaty EUC Business Specialist MEDI Market already changed End-User Computing Vision PCs, Laptops Thin Clients Tablets, Smartphones
More information1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
More informationBusiness Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.
Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationIT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
More informationMobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt
Mobile Device Management Andrius Šaveiko andrius.saveiko@atea.lt Content Mobile Device Management (MDM) where to start? Situation on MDM market MDM solutions very similar, but very different ios, Android,
More informationsamsung mobility solutions discover business built in
samsung mobility solutions discover business built in the world s most popular devices are now ready for enterprise with business built in Samsung Mobility Solutions include a complete range of enterprise
More informationMobile Device Management
Mobile Device Management Real World Lessons Jim Darrow Ilitch Holdings, Inc. Ilitch Holdings, Inc / Ilitch Companies Just you basic Mom and Pop Business Provide Shared services and consulting Technical
More informationHow to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
More informationBuilding Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh
Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationSpecial Report. Choosing the right mobile device platform for your business
Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation
More informationThe Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
More informationCortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationHealthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationUser Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual
User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...
More informationBYOD - Provisioning an Android Phone
UCHC IT DEPARTMENT BYOD - Provisioning an Android Phone A Provisioning Guide for Employee-owned Android Devices using the BYOD portal at UCHC Version 2.0 Please note: Android versions can differ greatly
More informationEnterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
More informationEnterprise mobile management a need or an option?
perspective Enterprise mobile management a need or an option? - Payal Patel, Jagdish Vasishtha (Jags) Abstract Even as native platforms are growing tighter with security features, the enterprise mobile
More informationDeploying Management and Security Agents to Mobile Devices. Deploying Mgmt and Security Agents
Deploying Management and Security Agents to Mobile Devices John Engels Principal Product Manager Symantec Scott Jareo Field Enablement Engineering Symantec Agenda 1 Symantec MDM Agent Options 2 Mobile
More informationXperia TM. in Business. Enterprise Mobility Management. Read about how Xperia devices can be administered in a corporate IT environment.
Xperia TM in Business Enterprise Mobility Management Read about how Xperia devices can be administered in a corporate IT environment April 2016 About this document Products covered This document describes
More informationAVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationBest-of-Breed Enterprise Mac Management
White Paper Best-of-Breed Enterprise Mac Management Choose the right tool for the job A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and
More informationMaaS360 Mobile Device Management (MDM) Administrators Guide
MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
More informationTelstra Mobile Device Management (T MDM) Getting Started Guide
Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device
More informationThe 9 Pillars of Enterprise Mobility
The 9 Pillars of Enterprise Mobility Building a framework that benefits IT, users and the business An Enterprise Mobility Program (EMP) focuses on policies, processes and enabling technologies that align
More informationGood MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
More informationA CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
More information