Enterprise Mobile Device Automated Configuration and Deployment Systems Integration Perspective White Paper

Size: px
Start display at page:

Download "Enterprise Mobile Device Automated Configuration and Deployment Systems Integration Perspective White Paper"

Transcription

1 Enterprise Mobile Device Automated Configuration and Deployment Systems Integration Perspective White Paper 4 June 2015 Kaprica Security Inc Sunset Hills Road, Suite LL4, Reston, VA USA kaprica.com sales@kaprica.com +1 (202)

2 Executive summary This short white paper provides a high-level of overview of the state of the art of automated configuration and deployment for Apple and Samsung devices from a systems integration perspective, featuring own brand tools from Apple, Samsung and also introduces Kaprica s Tachyon tool as part of the Samsung Business ecosystem. Table of contents Executive summary... 2 Table of contents... 2 Keywords... 2 Audience... 2 Introduction... 3 Objectives... 3 What is the current state of play?... 4 Best practice for Apple... 5 Apple Configurator... 6 Apple Device Enrollment Program (DEP)... 6 Samsung Device Configuration Tool (DCT)... 8 Samsung Knox Mobile Enrollment (KME)... 8 Kaprica Tachyon... 9 Tachyon case study Tachyon video demos Conclusions Abbreviations About Kaprica Security Inc Keywords Apple Android BYOD Carrier Configuration Configurator CYOD DCT DEP Deployment Audience EMM Enterprise GFE Google Kaprica Kitting KME Knox MAM MDM MMS Mobile Enrollment Samsung Self service Provisioning Systems integrator Tachyon VAR VPP White glove Enterprise mobile infrastructure engineers, administrators and executives Systems integrators VAR (Value Added Resellers) and resellers MMS (Managed Mobile Services) providers EMM (Enterprise Mobile Management) vendors Telco Carriers Kaprica Security Inc. 2 of 11

3 Introduction Government and commercial organizations want to take advantage of the latest smartphone and tablet mobile devices for employees and potentially partners and customers 1. Unlike in the consumer realm, where everyone receives a standard factory build and customizes it to their personal tastes, organizational rollouts involve numerous standardized configuration steps between that factory build and end user delivery. This white paper deals with automation of configuration and deployment of mobile devices for enterprise, minimization of risk, time lines and costs for the two most popular groups of mobile devices Apple and Samsung 2. The main focus is initial configuration and deployment, or refreshes, and in maintaining quality, compliance and security. Consideration is also given to the related issues of partial, or complete, updates of devices already in use. While EMM are valuable tools for mobile management, recommended by Kaprica and industry analysts alike, the fallacy of EMM 3 as a hammer for which any and all issues of enterprise mobility configuration and deployment are nails is also addressed. Historically, enterprise admins, integrators, carriers or manufactures themselves carried out these steps either manually, or with partial automation, so called pre-staging. Combining setup steps and corporate data like usernames, addresses and passwords along with QA and testing can take from several minutes per device in simple use cases, to over an hour in complex environments. Since organizations have 100s to 1,000s of devices, this can add up not only to man weeks or months of manual setup and data entry but also rollout risk, with potential impacts to admin productivity, end user adoption, direct costs and indirect costs around end user productivity, help desk calls and re-work. Objectives High level goals such as driving productivity, reducing direct and indirect costs, imply attention to a number of areas: A strong and intuitive user experience to drive acceptance An accurate and timely process Flexibly supporting the needs of various groups across an organization Choosing between shipping directly to end users for self service and / or having one or more centralized locations staffed with admins offering a white glove (end-to-end) service Having security (confidentiality, integrity and availability) appropriate for each group Coverage of a supportable envelope of hardware, OS (Operating System), apps, updates and infrastructure 1 Organizationally or government furnished (GFE) and also BYOD (Bring Your Own Device), CYOD (Configure Your Own Device) and COPE (Corporate Owned, Personally Enabled) devices. 2 Generic Google Android is not recommended for enterprise usage given the fragmented and hard to support nature of the OS (over 18,000 variants per Open Signal in 2014) and that it does not offer a secure base on which to run enterprise software. 3 Previous iterations of EMM (Enterprise Mobile Management) were known as MAM (Mobile App Management) or MDM (Mobile Device Management) Kaprica Security Inc. 3 of 11

4 Maintenance of audit trails for QA and compliance purposes appropriate to the industry vertical e.g. DISA STIG, HIPAA or PCI DSS for government, healthcare or financial organizations. In an automated configuration and deployment context, these translate into attention to: Setup of both enterprise and custom in-house apps Settings, especially networking and security e.g. VPN, proxy and certificates Personalized data e.g. Google, and IAM such as usernames, passwords and PINs App layout, wallpapers, screen savers and the like for branding Optionally installing or using tools such as EMM or Samsung s Knox What is the current state of play? Product life cycles are much faster in the enterprise mobility space than in traditional IT, so what was true 6 or 12-months ago many not be today. For example, Microsoft, the once dominant vendor in enterprise desktop and laptop IT prior to cloud, and BlackBerry, the once dominant vendor in mobile IT, are not covered here given their niche market shares compared to Apple and Samsung 4. EMM from leading vendors such as AirWatch, MobileIron, Good Technology, Citrix, IBM, Samsung EMM and others have been marketed as solutions to all enterprise mobility issues. Not all organizations choose to deploy EMM. For example, organizations with 100 to 200 devices or less, organizations with straightforward setups at large scale, organizations where there is push back from users over privacy concerns 5, or organizations having a high sensitivity to monthly fees may choose to not deploy EMM. Similarly, regarding Samsung, not all organizations need to take advantage of the additional features of Knox Premium, when Knox Standard is built-in at no additional cost. EMM s strength in management does not mean that they cover all configuration and deployment needs. In fact, there is a gap between what can be done (so called pre-staging ), and what needs to be done for an end-to-end automated solution. In figure 1, a typical EMM for Samsung is shown as an example. It is able to setup certain aspects of devices well. The area bounded by the bold blue lines is what can be pre-staged, the area outside of those lines typically requires manual setup. An ideal automated solution would cover the entire area of the figure. Many EMMs are not able to cover requests such as icon layouts, configuring Google accounts, or setting up VPN. Gartner predicts that 75% of mobile security breaches 6 will be the result of basic misconfiguration, not the lack of security tools such as EMM, anti-virus, IDP / IDS systems or app vetting MWC Cleveland Research Report Market share estimate May 15, 2015 Smartphones - Samsung 26%, Apple 18%, Microsoft / Nokia 3% and BlackBerry 0%, Tablets - Samsung 18%, Apple 26%, Microsoft 4%, BlackBerry 0% How Medical College of Wisconsin designed a policy that mandated MDM enrollment for school-owned devices and is widely accepted by faculty and students Gartner Says 75 Percent of Mobile Security Breaches Will Be the Result of Mobile Application Misconfiguration Kaprica Security Inc. 4 of 11

5 Figure 1 Gap between pre-staging with an EMM and end-to-end configuration requirements Rollout/Update 40 Knox API / setup EMM installation Enterprise apps Custom apps Branding/layout Corporate data Settings Typical EMM on Samsung / Aribitrary Scale Best practice for Apple Apple s business environment 7 has two tools, one USB-oriented, Apple Configurator, and one OTAoriented, Apple Device Enrollment Program (DEP). These, although not offering end-to-end configuration and deployment, offer pre-staging, which in most cases will still require some manual setup and final QA per device, as illustrated in Figure 2. Neither tool is appropriate for partial or complete updates of devices already in use. Apple specifically does not permit staging of OS updates. As a walled garden system, the only third party tools allowed are EMM, which largely share the same Apple API abilities and limitations. As the diagram below summarizes, Apple DEP with a leading EMM will cover in the best of cases ~80% of needs, the remaining ~20% might need the device to then be run through the Configurator and/or to have manual setup work. In the worst of cases, only ~20% of needs are covered, so depending on the exact use case and the specific EMM, true end-to-end automation and/or user self service is unlikely Kaprica Security Inc. 5 of 11

6 Figure 2 Intersection of end-to-end Apple configuration needs, Configurator, DEP and EMM End-to-end Needs Apple DEP with EMM Apple Configurator Apple Configurator Configurator 8 is a USB based tool that can be used to configure multiple Apple mobile devices at a time. Its strengths are partial automation and support for EMM. However, it does not support OTA configuration, has no app configuration, no ties to corporate data or audit trails and the EMM can simply be removed at any time. Apple Device Enrollment Program (DEP) DEP 9 is an OTA tool that can be used for mass / bulk device enrollment. Its strengths are partial automation and support for EMM. The EMM is locked around device activation and cannot simply be removed Kaprica Security Inc. 6 of 11

7 However, EMM usage is mandatory. There is no support for USB configuration, no app configuration, no ties to corporate data or audit trails. It is only available in certain geographies, a limitation shared with Apple s VPP (Volume Purchase Program) for apps. Best practices for Samsung Samsung s business environment has two own-brand tools, one USB-oriented, Device Configuration Tool (DCT), and one OTA-oriented, Knox Mobile Enrollment (KME), that with one important exception (detailed below) do not offer end-to-end configuration and deployment, instead offering pre-staging, which in most cases will still require some manual setup and final QA per device. Neither tool is appropriate for partial or complete updates of devices already in use. Cellular carriers do not permit staging of OS updates for Samsung devices. The Samsung system is more open to third parties than Apple s. It supports several EMM, although there is a wide degree of variation in their support of Samsung s extensive APIs among them. A third party tool, Tachyon, from Kaprica Security, is able to leverage all Samsung Knox APIs and extend both USB and OTA scenarios to offer end-to-end configuration. It accomplishes this running independently, or as a compliment to Samsung Knox or EMM tools. It can be also be used for partial or complete updates of devices already in use. As Figure 3 summarizes, Samsung KME with a leading EMM will cover in the best of cases ~80% of needs, the remaining ~20% of needs may require the device to have manual setup work. In the worst of cases, only ~20% of needs are covered, so depending on the exact use case and the specific EMM, true end-to-end automation and/or user self service is unlikely. Kaprica s Tachyon, working with KME and/or EMM, can cover 100% of configuration and deployment needs, allowing the flexibility to offer both end user self service, or admin white glove service (faster, more accurately and less expensively), as required Kaprica Security Inc. 7 of 11

8 Figure 3 - Intersection end-to-end Samsung configuration needs, DCT, KME, EMM & Tachyon Tachyon, EMM & KME cover 100% end-to-end needs EMM & Samsung KME Samsung DCT Samsung Device Configuration Tool (DCT) DCT 10 is a USB based tool that can be used to configure multiple Samsung mobile devices at a time. Its strengths are partial automation and the ability to call KNOX APIs. However, it does not support OTA or EMM configuration, has no app configuration, no ties to corporate data or audit trails. It requires Android s ADB / USB debugging mode to be enabled, which is a painful manual process in itself. Samsung Knox Mobile Enrollment (KME) KME 11 is an OTA tool that can be used for mass / bulk device enrollment. Its strengths are partial automation with EMM and full end-to-end automation with Tachyon. To parallel the discussion with Apple s DEP. It is possible for certain EMM (and also Tachyon independently) to lock the device so that settings and/or EMM cannot simply be removed Kaprica Security Inc. 8 of 11

9 However, with EMM alone, there is no support for USB configuration, no app configuration, no audit trails and no ties to corporate data. KME is only available in certain geographies, although access to apps via Google Play or private app stores is very flexible. Kaprica Tachyon Tachyon 12 is a Samsung exclusive technology, consisting of an app and a browser admin portal. It automates end-to-end mass / bulk configuration, deployment and QA of all current Samsung tablets and smartphones. It is not an EMM or a replacement for an EMM since its focus is configuration, being invoked and then finishing (reporting back to the portal), rather than running continuously for management and monitoring purposes as EMM do. In a nutshell, Tachyon is a superset of the Samsung configuration and deployment capabilities detailed above: Runs independently, or as a compliment to EMM and Knox Supports Offline and OTA scenarios KME, as well as QR code or traditional usernames / passwords Knox Standard and optionally Knox Premium Every Knox API is supported e.g. blacklisting phone numbers (EMMs cover only subsets) Every native Android setting supported e.g. VPN and Google Third party and in-house app configuration Custom home screen arrangement Pulls in specific corporate data for each device and maintains an audit trail for compliance purpose Rather than being just a generic configuration tool, Tachyon offers a growing library of off-the-shelf configurations to match specific industry verticals or use cases, for example: 1-click DISA STIG setup 1-click handling of sophisticated IAM / certificate / networking environments 1-click healthcare patient privacy and security for HIPAA compliance 1-click migration from one EMM to another Popularly, its an easy button for the complex process of bulk Samsung configuration and deployment. The last two examples from the list above, data sanitization and EMM migration, illustrate updating of devices in specific areas, without requiring the users to visit or ship devices to centralized locations. Other uses might include updating versions of custom apps, for example, in retail services or banking scenarios Kaprica Security Inc. 9 of 11

10 Tachyon case study A large Systems Integrator (SI), with locations in North America and in Europe, leverages Samsung for its enterprise mobile solutions practice. Its customer, a leading Ohio-based healthcare provider, needed an automated approach for deploying over 3,000 Samsung Galaxy Note devices to over 500 skilled nursing and rehabilitation locations across the US. The manual configuration of devices, including 70 individual steps and ending with a traditional EMM installation, was taking too long and the error rates were too high. The SI deployed Kaprica Security s Tachyon automated solution to speed up configuration, deployment and improve quality. An automated script was developed and tested to cover the 70 steps, leveraging the Tachyon Portal and its library of ready to use steps. Tachyon dramatically reduced configuration and deployment time and associated costs while increasing quality. The SI standardized on Tachyon for this and additional new clients with similar large deployments. The SI s administrators were able to continue to offer a white glove service, configuring 10 devices at once rather than configuring one at a time manually as they had previously done. The total time taken to configure each device was reduced from 30 to 5 minutes (not counting the charging or boot time). The QA time per device was reduced from 5 minutes to 0 since reporting and compliance are automated in the tool. With the new KME functionality, the time per device will be close to zero. The SI, like the majority of Tachyon's clients already have EMM tools, with Tachyon adding the additional configuration and deployment automation that they do not have built-in. Tachyon video demos 1-click from a QR code 0-touch with Knox Mobile Enrollment Conclusions This white paper presented best practices for Apple and Samsung mobile devices automation and configuration, detailing industry standard tools from Apple s Configurator and DEP, to Samsung s DCT and KME, to EMM. It introduced the Tachyon tool that can run independently or extend the capabilities of existing tools on Samsung platforms, to move from pre-staging, to end-to-end configuration and deployment, offering a much finer grain of control of both initial setups and on-going updates, with increased speed, accuracy and reduced costs Kaprica Security Inc. 10 of 11

11 Abbreviations ADB API BYOD COPE CYOD DARPA DC DEP DISA EMM GFE HIPAA IAM IDP IDS Android Debug Bridge Application Programming Interface Bring Your Own Device Company-issued, Personally-Enabled Device Choose Your Own Device Defense Advanced Research Projects Agency District of Columbia Device Enrollment Program Defense Information Systems Agency Enterprise Mobile Management Government Furnished Equipment Health Insurance Portability and Accountability Act Identity and Access Management Intrusion Prevention Systems Intrusion Detection System IT KME MAM MDM MMS PCI DSS OS OTA QA QR SI STIG TX USB VA VAR VPP VPN Information Technology Knox Mobile Enrollment Mobile App Management Mobile Device Management Managed Mobility Services Payment Card Industry Data Security Standard Operating System Over The Air Quality Assurance Quick Response Systems Integrator Security Technical Implementation Guide Texas Universal Serial Bus Virginia Value Added Reseller Volume Purchase Program Virtual Private Network About Kaprica Security Inc. Kaprica is an expert in mobility and security, providing hosted and on premise solutions. It was founded in 2011 by a team of cyber security experts from Lockheed Martin and Carnegie Mellon University, with the goals of delivering high quality cyber security services to a wide government and enterprise audience, and simultaneously developing easy to use and deploy software tools to support them. Today, clients range from DARPA, to the Department of Transportation, Lockheed, Intel and the University of Maryland. Kaprica is a Silver-Level Samsung partner and its enterprise software products include the Skorpion, Tachyon and RunSafe lines and associated patents. Kaprica is headquartered just outside Washington, DC, in Reston, VA, with offices in Austin, TX. Learn more at kaprica.com Kaprica Security Inc. 11 of 11

MobileIron and Samsung Value Proposition

MobileIron and Samsung Value Proposition MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Secure Mobile Solutions

Secure Mobile Solutions Secure Mobile Solutions Manage workloads securely on the move sevices@softbox.co.uk 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management

More information

Good for Enterprise Good Dynamics

Good for Enterprise Good Dynamics Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity

More information

ios 9.3 Enterprise Solution Brief MobileIron and ios 9.3

ios 9.3 Enterprise Solution Brief MobileIron and ios 9.3 ios 9.3 Enterprise Solution Brief v3 MobileIron and ios 9.3 With the introduction of ios 9.3, Apple continues to make strides in simplifying management and deployment of ios devices in Enterprises by including

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Mobile App Containers: Product Or Feature?

Mobile App Containers: Product Or Feature? ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating

More information

GETS AIRWATCH MDM HANDBOOK

GETS AIRWATCH MDM HANDBOOK GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS

More information

Cloud Services MDM. Overview & Setup Admin Guide

Cloud Services MDM. Overview & Setup Admin Guide Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4

More information

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Enterprise Mobility: The Impact of Changing Employee Behaviour

Enterprise Mobility: The Impact of Changing Employee Behaviour Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility richard.absalom@ovum.com / @RichAbsalom 23 April 2015 1 About Ovum Leading independent

More information

How To Manage A Mobile Device Management (Mdm) Solution

How To Manage A Mobile Device Management (Mdm) Solution Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

***NOTICE***: Proposed Selection Date now 12/16/13

***NOTICE***: Proposed Selection Date now 12/16/13 Hall County Schools MDM RFP Q&A ***NOTICE***: Proposed Selection Date now 12/16/13 Are bulk enrollments a criteria? Not a criteria, but would be a nice feature to have. Is the ability to push docs out

More information

Deploying Apple ios in Education

Deploying Apple ios in Education Solution Guide Deploying Apple ios in Education March 013 This document covers strategies for deploying, monitoring, and supporting ios devices in education environments. Table of Contents 1 3 4 5 6 7

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

The Current Landscape

The Current Landscape SMALLER SCALE HAS MORE SPACING INSIDE LOGOMARK LARGE SCALE HAS LESS SPACING INSIDE LOGOMARK MOBILE APPLICATIONS MANAGEMENT December 2013 Prepared by Clarity Innovations Contributors: Steve Burt, Marie

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

Mobile Device and Application Strategy. Right Technology, Right Design, Right Price

Mobile Device and Application Strategy. Right Technology, Right Design, Right Price Mobile Device and Application Strategy Right Technology, Right Design, Right Price Agenda 1 Mobility Strategy Methodology 2 3 Mobile Device Strategy Mobile Application Development 4 Q &A Mobility Strategy

More information

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

allchoice We are XMA. Empowering employee device choice within the workplace

allchoice We are XMA. Empowering employee device choice within the workplace allchoice Empowering employee device choice within the workplace We are XMA. We are XMA. We deliver innovative IT solutions that enhance how people learn, teach, govern, deliver healthcare and do business.

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO

Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO Which is the Right EMM: Enterprise Mobility Management Craig Cohen - President & CEO Adam Karneboge - CTO Mobile is strategic for business Mobile provides a beeer experience Mobile changes the way people

More information

Mobile Application Management

Mobile Application Management Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER July 2012 Meeting the BYOD challenge with next-generation application and device management Overview... 3 The Challenge... 4 MAM Functions...

More information

Streamline Mobile Telecom Management with DATALERT! And MobileIron

Streamline Mobile Telecom Management with DATALERT! And MobileIron Streamline Mobile Telecom Management with DATALERT! And MobileIron Companies are constantly struggling with the day-to-day management of their telecom expenses. With expanded use of mobile devices, companies

More information

Mobile Device. Management-

Mobile Device. Management- Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly

More information

Secure, Centralized, Simple

Secure, Centralized, Simple Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,

More information

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,

More information

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact

More information

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015 Department of Veterans Affairs Two-Factor Authentication Quick Start Guide November 18, 2015 Introduction: This guide provides instructions for installation of the soft token on your non-piv enabled or

More information

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

IT Resource Management vs. User Empowerment

IT Resource Management vs. User Empowerment Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile

More information

Implement Mobile Device Management to Deploy HCSS Mobile Apps

Implement Mobile Device Management to Deploy HCSS Mobile Apps Implement Mobile Device Management to Deploy HCSS Mobile Apps A guide to MDM & EMM product selection Femi Ariyo Femi@hcss.com Our Goal Understand mobile device management and its benefits Examine different

More information

Deploying iphone and ipad Apple Configurator

Deploying iphone and ipad Apple Configurator Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions

More information

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics

Samsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics Samsung Solutions for Enterprise Mobility MichailasTraubas Samsung Electronics Baltics Samsung Today Samsung Electronics Baltics Established in 2008 [1999] Employees: 144 people Revenue: 357 mio. USD in

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

MAM - Mobile Application Management

MAM - Mobile Application Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Enterprise mobility trends 2015 and beyond

Enterprise mobility trends 2015 and beyond Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources

More information

Mobilize your Enterprise in 60 Minutes!

Mobilize your Enterprise in 60 Minutes! Mobilize your Enterprise in 60 Minutes! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Statement of Direction

Statement of Direction Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...

More information

MANAGE IT. An Overview of Enterprise Mobility Management Services THE SITUATION THE CHALLENGES THE SOLUTION THE BENEFITS

MANAGE IT. An Overview of Enterprise Mobility Management Services THE SITUATION THE CHALLENGES THE SOLUTION THE BENEFITS MANAGE IT. An Overview of Enterprise Mobility Management Services THE SITUATION THE CHALLENGES THE SOLUTION THE BENEFITS THE SITUATION MANAGING ALL DEVICES UNDER THE SUN. As your staff uses more mobile

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

Dell Mobile Management. Apple Device Enrollment Program

Dell Mobile Management. Apple Device Enrollment Program Dell Mobile Management Contents Dell Mobile Management 3 Setting up the 3 DMM Device Deployment Program Prerequisites 4 Configure Apple VPP Token in DMM 5 Download Apple VPP Token 5 Assign VPP App Licenses

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Mobile First Government

Mobile First Government Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,

More information

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s

More information

Beyond BYOD: how businesses might COPE with mobility

Beyond BYOD: how businesses might COPE with mobility Beyond BYOD: how businesses might COPE with mobility Identifying the right mobility strategy for your organization EXECUTIVE SUMMARY Ovum view: BYOD is a behavior, not a strategy There has been a lot of

More information

Enterprise Mobility Management

Enterprise Mobility Management Enterprise Mobility Management Security Without Compromising User Experience SESSION ID: SPO2-R03 Brian Robison Principal Technology Evangelist, XenMobile Citrix Systems, Inc. Providing the freedom to

More information

Enterprise Mobility Management

Enterprise Mobility Management Enterprise Mobility Management Vodafone Global Enterprise Vodafone Power to you Delivering the truly mobile enterprise A Ready Business is truly connected allowing you to be ready for almost anything by

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows

More information

Mobile Device Security Risks and RemediaAon Approaches

Mobile Device Security Risks and RemediaAon Approaches Mobile Device Security Risks and RemediaAon Approaches Raj Chaudhary, Principal, Crowe Horwath LLP In- Depth Seminars D11 CRISC CGEIT CISM CISA Informal Poll What is your Atle/role? Internal Audit IT Audit

More information

BYOD Policy Implementation Guide. February 2016 March 2016

BYOD Policy Implementation Guide. February 2016 March 2016 BYOD Policy Implementation Guide February 2016 March 2016 Table of Contents Step One: Evaluate Devices... 3 Step Two: Refine Network Accessibility... 4 Step Three: Determine Appropriate Management Policies...

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Introducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI

Introducing AirWatch by VMware: Enterprise Mobility Simplified. Menny Tsarfaty EUC Business Specialist MEDI Introducing AirWatch by VMware: Enterprise Mobility Simplified Menny Tsarfaty EUC Business Specialist MEDI Market already changed End-User Computing Vision PCs, Laptops Thin Clients Tablets, Smartphones

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence. Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt Mobile Device Management Andrius Šaveiko andrius.saveiko@atea.lt Content Mobile Device Management (MDM) where to start? Situation on MDM market MDM solutions very similar, but very different ios, Android,

More information

samsung mobility solutions discover business built in

samsung mobility solutions discover business built in samsung mobility solutions discover business built in the world s most popular devices are now ready for enterprise with business built in Samsung Mobility Solutions include a complete range of enterprise

More information

Mobile Device Management

Mobile Device Management Mobile Device Management Real World Lessons Jim Darrow Ilitch Holdings, Inc. Ilitch Holdings, Inc / Ilitch Companies Just you basic Mom and Pop Business Provide Shared services and consulting Technical

More information

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global

More information

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Special Report. Choosing the right mobile device platform for your business

Special Report. Choosing the right mobile device platform for your business Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation

More information

The Future of Mobile Device Management

The Future of Mobile Device Management The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table

More information

Cortado Corporate Server

Cortado Corporate Server Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual

User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...

More information

BYOD - Provisioning an Android Phone

BYOD - Provisioning an Android Phone UCHC IT DEPARTMENT BYOD - Provisioning an Android Phone A Provisioning Guide for Employee-owned Android Devices using the BYOD portal at UCHC Version 2.0 Please note: Android versions can differ greatly

More information

Enterprise Mobility as a Service

Enterprise Mobility as a Service Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...

More information

Enterprise mobile management a need or an option?

Enterprise mobile management a need or an option? perspective Enterprise mobile management a need or an option? - Payal Patel, Jagdish Vasishtha (Jags) Abstract Even as native platforms are growing tighter with security features, the enterprise mobile

More information

Deploying Management and Security Agents to Mobile Devices. Deploying Mgmt and Security Agents

Deploying Management and Security Agents to Mobile Devices. Deploying Mgmt and Security Agents Deploying Management and Security Agents to Mobile Devices John Engels Principal Product Manager Symantec Scott Jareo Field Enablement Engineering Symantec Agenda 1 Symantec MDM Agent Options 2 Mobile

More information

Xperia TM. in Business. Enterprise Mobility Management. Read about how Xperia devices can be administered in a corporate IT environment.

Xperia TM. in Business. Enterprise Mobility Management. Read about how Xperia devices can be administered in a corporate IT environment. Xperia TM in Business Enterprise Mobility Management Read about how Xperia devices can be administered in a corporate IT environment April 2016 About this document Products covered This document describes

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Best-of-Breed Enterprise Mac Management

Best-of-Breed Enterprise Mac Management White Paper Best-of-Breed Enterprise Mac Management Choose the right tool for the job A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Telstra Mobile Device Management (T MDM) Getting Started Guide

Telstra Mobile Device Management (T MDM) Getting Started Guide Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device

More information

The 9 Pillars of Enterprise Mobility

The 9 Pillars of Enterprise Mobility The 9 Pillars of Enterprise Mobility Building a framework that benefits IT, users and the business An Enterprise Mobility Program (EMP) focuses on policies, processes and enabling technologies that align

More information

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

A CIO s Guide To Mobility Management

A CIO s Guide To Mobility Management The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202

More information