The Centrify Vision: Unified Access Management
|
|
- Diane Jefferson
- 8 years ago
- Views:
Transcription
1 The Centrify Vision: Unified Access Management Control, Secure and Audit Access To Your On-Premise and Cloud-based Infrastructure On-premise Centrify the Enterprise Cloud Personal Devices Mobile Devices Servers Centrify Mgmt Platform Hosted Systems Apps SaaS (Mid 2012) Leverage infrastructure you already own Active Directory to Control Secure Audit Who can access what User access and privileges What the users did CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 1
2 Support & Management Challenges for Mac Mac population is growing due to employee demand Darn VP s and their shiny toys! Macs are a non-standard platform in most enterprise environments (excluding publishing/creative firms) IT support staff simply don t know how to manage Mac systems Typically Macs are managed individually or by the department expert Self-managed systems usually have one local admin account, the end-user Departmental support is focused on usability, not security policies IT struggles to enforce security policies consistently across the enterprise on all platforms Access control policies, password management policies and security configuration policies must be consistently enforced across the enterprise CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 2
3 The Solution: AD-based Management of OS X Centrify empowers the Windows-centric enterprise to manage and support OS X using existing expertise, tools and processes ADUC for user account, password and group management GPMC/GPOE for system and user configuration management MacBooks imacs Active Directory CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 3
4 Centrify DirectControl for Mac OS X Provides alternative to Apple AD bind utility Robust AD agent runs on OS X and 300+ Unix/Linux platforms Complete support for AD Sites, Offline Access, Group Policy Site Awareness means finding the closest domain controller Diagnostic tools to resolve issues Bind information, logging, diagnostic utility adinfo Local host name: tom-macbpro Joined to domain: centrify.com Joined as: tom-macbpro.centrify.com Pre-win2K name: tommacbpro Current DC: centrify-dc08.centrify.com Preferred site: SunnyvaleOffice Zone: Auto Zone CentrifyDC mode: connected Licensed Features: Enabled CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 4
5 Unified Administration With Active Directory Common account and authentication with Active Directory Manage Mac user accounts, their login and authorization rights Enables offline login to OS X laptops same experience as Windows Administrators granted local admin privileges Group Policy configuration of Apple Remote Desktop (for VNC) Active Directory group of administrators are granted local privileges Pre-validation for administrators enables offline login And no changes to Active Directory, no new servers, no change in process CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 5
6 User Access Options Auto-Zone All AD users can log in to the machine Similar to Apple AD plugin for access Executive Zone Department Administrator Zone Restrict User Access Department Zone Access restricted to department members only Executive Zone Each computer only accessible by designated executive and IT Admin support. Sales Zone Fred Joan Active Directory Active Directory Administrators CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 6
7 Macs Integrate into Existing Windows Services Provides Single Sign On for: Home directory auto-mounts to Windows file shares Authenticated printing to Windows print queues Services such as Exchange, SQL, and IIS servers Extensive home directory support On Mac OS X servers via AFP On Windows servers via SMB DFS shares in 10.7 or with Group Logic s Extreme Z-IP Server Portable Home Directory with auto-sync to network home directory CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 7
8 Certificate Auto Enrollment Supports Certificate Auto Enrollment through Windows Group Policy Machine certificate automatically downloaded at AD join time Automatic renewal of machine certificate at expiration Complete certificate lifecycle management 802.1X configuration for Wireless and Ethernet Centrify Group Policy 10.7 Apple Profile Manager VPN support for strong authentication CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 8
9 Smart card support Smart card-based strong authentication Secure login to Active Directory CAC CAC NG Oberthur 128 PIV.NET smart cards Safenet Tokens Certified by the Joint Interoperability Test Command (JITC) FIPS certification CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 9
10 Enforce Security Policies Using AD Group Policy Automated security policy configuration for consistency Group Policy is automatically enforced at system join to Active Directory Group Policy routinely checks the system for policy compliance, updating as required User Group Policy is enforced at user login System Group Policies control system configuration Centrify agent configuration policy Firewall & services policies control machine access Screen saver policy controls access to existing user sessions SSH policies for remote access security CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 10
11 Desktop Lockdown Using AD Group Policy Group Policy enforcement of Managed User settings Controls to lock down: Finder & Preferences settings Desktop & Dock settings User Group Policies control: Screen saver Allowed applications Login/logout scripts Media access settings Mac App Store access CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 11
12 Centrify Mobile
13 Mobile Devices as Objects Managed in Active Directory CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 13
14 Centrify ADUC and GPOE Extensions DirectControl for Mobile supports familiar Active Directory management tools, ADUC (left) and Group Policy Object Editor (right), so administrators can see which devices are assigned to a user, the properties of each device and manage policies across all devices CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 14
15 DirectControl for Mobile Group Policy Settings Passcode Settings - require passcode on device - allow simple value - require alphanumeric value - minimum passcode length - minimum number of complex characters - maximum passcode age (days) - auto-lock (minutes) - passcode history - grace period for device lock - maximum number of failed attempts Exchange ActiveSync Settings (support for one or more Exchange Mailboxes) Each Mailbox supports: - Profile Name - Exchange ActiveSync host - Use SSL - Use User Principal Name (UPN) if no address - Past days of mail to sync (drop down box) - Provide client certificate (serves both to trigger PKI cert auto-issuance as well as to configure the system to use PKI for Exchange authentication) Restrictions - allow installing apps - allow use of camera - allow screen capture - allow automatic sync while roaming - allow voice dialing - allow in-app purchase - allow multi-player gaming - allow adding Game Center friends - force encrypted backups - allow use of YouTube - allow use of itunes Music Store - allow use of Safari - allow explicit music and Podcasts - ratings region - allowed movies content rating - allowed TV shows content ratings - allowed apps content rating * Some settings are device OS specific CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 15
16 DirectControl for Mobile Group Policy Settings (cont.) VPN - PPTP Settings (support for one or more VPN-PPTP configurations) General settings - Connection name - Server - User authentication (Password or RSA SecurID) - Encryption level (None, Automatic, Maximum (128bit)) - Send all traffic Proxy settings for each connection - None, Manual, Automatic WiFi Settings (support for one or more WiFi settings) General settings - SSID - auto-join - hidden network - security type - password Protocols settings Authentication settings Proxy settings * Some settings are device OS specific CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 16
17 Centrify Mobile Components Self-service enrollment using a web-based form or mobile app and automated configuration of profiles make the setup and enforcement of device and security settings easy for administrators and users CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 17
18 Centrify Mobile and Cloud Architecture CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 18
19 Centrify Cloud Management Platform Centrify s Hosted Management Platform Integrates with existing on-premise Active Directory Enables rapid adoption of cloud services, simplifying installation and configuration Scales as required to support the largest deployments Highly available Report & Monitor on Mobile Devices Maintain current device status including AD integration and Policy Enforcement status as well as last update date Inventory of all enrolled devices Inventory of installed software Centralized Management of Enrolled Devices Full and Selective Wipe (removing profiles) of the device Lock and unlock the device Force a Policy Update to the device Ping and Call Home operations ensure connectivity and management of the device CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 19
20 Centrify Cloud Proxy Server Centrify Cloud Proxy Server installs in a few minutes and is non-intrusive, no firewall configuration changes or additional infrastructure in DMZ are required CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 20
21 Why Customers Choose DirectControl for OS X IT can leverage existing directory, processes and skill sets to manage Macs Centralized authentication and password policies are enforced Smart card login to AD supports SSO and requirement for two-factor authentication Automated security policies enforcement with Group Policy Fine grained desktop lockdown security policies are centrally enforced Separation of administrative duties simplifies deployment in complex environments DirectControl offers the simplest and most fullfeatured Active Directory integration solution for Mac OS X. Because it relies on Active Directory's Group Policy architecture, it functions more seamlessly for managing access... particularly for systems administrators who are unfamiliar with Mac OS X. Ryan Fass ComputerWorld CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 21
22 Why Centrify Mobile? Easiest product to deploy Leverages existing Active Directory infrastructure and skill sets Cloud Service eliminates need to deploy & manage on-premise infrastructure Does not require firewall configuration changes, appliances or stuff to be deployed in DMZ Not just a point solution for mobile devices Centrify also supports Mac and Linux devices Free offering makes getting started easy Supports unlimited number of devices Online/community support Provides immediate solution while you consider your mobile strategy CENTRIFY CORPORATION. ALL RIGHTS RESERVED SLIDE 22
Direct Control for Mobile & Supporting Mac OS X in Windows Environments
Direct Control for Mobile & Supporting Mac OS X in Windows Environments Leveraging Existing IT Staff Knowledge, Processes and Infrastructure to Support Mac OS X Systems and Their Users Ed Frola Senior
More informationCentralizing Mac Home. Live Webinar David McNeely Centrify Geordie Korper Group Logic
Centralizing Mac Home Directories on Windows Servers Live Webinar David McNeely Centrify Geordie Korper Group Logic Agenda EDA Overview Centrify DirectControl Group Logic ExtremeZ-IP Centralizing Home
More informationImproving Mobile Device Security and Management with Active Directory
CENTRIFY WHITE PAPER, FEBUARY 2012 Improving Mobile Device Security and Management with Active Directory An overview of mobile device market trends, challenges and approaches to securing and managing smart
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationDeploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
More informationiphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
More informationDeploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
More informationipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
More informationipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
More informationManage Your Mac with Active Directory Group Policies
Manage Your Mac with Active Directory Group Policies How to secure Mac OS X systems with your Active Directory infrastructure WWW.CENTRIFY.COM Manage your Mac with Active Directory Group Policies Contents
More informationCentrify Identity Service and Mac - Online Training
C E N T R I F Y D A T A S H E E T M A R C H 2015 Centrify Identity Service and Mac - Online Training Overview This course is designed for administrators of the Centrify User Suite and mobile devices. At
More informationMcAfee Enterprise Mobility Management
Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers
More informationSystems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
More informationiphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationUsing Centrify s DirectControl with Mac OS X
WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Using Centrify s DirectControl with Mac OS X Centralized, Active Directory-based authentication, access control and policy enforcement for Mac OS X systems in Windows
More informationFINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1.
FINAL DRAFT APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE Version 1, Release 0.1 18 September 2015 Developed by Apple and for the DoD LIST OF TABLES Page Table 1: Non-Supervised
More informationPMDP is simple to set up, start using, and maintain
Product Datasheet IBELEM, SA ITS Group - 5, boulevard des Bouvets 92741 Nanterre Cedex - FRANCE Tel: +33(0)1.55.17.45.75 Fax: +33(0)1.73.72.34.08 - www.ibelem.com - info@ibelem.com PMDP is simple to set
More informationCentralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
More informationManaging ios Devices. Andrew Wellington Division of Information The Australian National University XW11
Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationiphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
More informationLabTech Mobile Device Management Overview
You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated
More informationIntroduction to AirWatch and Configurator
Introduction to AirWatch and Configurator Overview AirWatch integrates seamlessly with Apple Configurator to enable IT administrators to effectively deploy and manage Apple ios devices. Deploying a large
More informationData Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense
Data Security on the Move Mark Bloemsma, Sr. Sales Engineer Websense Consumerization of IT Fast & disruptive Enables business Increases productivity It s Mine! THE MOBILE ENTERPRISE. TYPES OF DEVICES METHODS
More informationCorporate-level device management for BlackBerry, ios and Android
B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationMobile Device Management ios Policies
Mobile Device Management ios Policies Introduction ios policies allow administrators to use mobile device management features of CentraStage and push them, over the air (OTA), to ios devices (in other
More informationAbsolute Manage MDM. John Wu Systems Engineer jcwu@absolute.com
Absolute Manage MDM John Wu Systems Engineer jcwu@absolute.com Saving Time and Money Comprehensive IT Automation Patch Management Software Distribution Software License Management Power Management Asset
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationApps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.
Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying
More informationCENTRIFY TRAINING CLASS Centrify Suite Standard Edition - Mac OS X Training Course Details. Format: 100% lecture including demonstrations.
Centrify Suite Standard Edition - Mac OS X Training Course Details Synopsis This course introduces the customer to the Centrify Mac OS X specific features of the Centrify Suite Standard Edition. What You
More informationMac OS X Security Checklist:
Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded
More informationHow To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
More informationBest Practices for Adding Macs to Microsoft Networks
WHITE PAPER Best Practices for Adding Macs to Microsoft Networks WWW.CENTRIFY.COM Best Practices for Adding Macs to Microsoft Networks Contents Abstract 3 Introduction 4 Requirements for Solving the Challenge
More informationPolicy and Profile Reference Guide. BES10 Cloud Market Preview
Policy and Profile Reference Guide BES10 Cloud Market Preview Published: 2014-02-04 SWD-20140204170848330 Contents About this guide... 13 What is BES10 Cloud?... 13 Key features of BES10 Cloud...14 IT
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationManaging OS X with Configuration Profiles
Apple Technical White Paper Managing OS X with Configuration Profiles OS X Lion v 10.7.3 1 Table of Contents About Configuration Profiles... 3 Creating Configuration Profiles... 8 Deploying Configuration
More informationCentrify Cloud Management Suite
Centrify Cloud Management Suite Installation and Configuration Guide April 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
More informationDell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
More informationP13 -Leveraging Active Directory to Secure and Audit Access to Non-
P13 -Leveraging Active Directory to Secure and Audit Access to Non- Presented by: Windows Systems David McNeely, Sr. Director of Product Management david.mcneely@centrify.com Centrify Corporation Trust
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationCortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
More informationCharles Firth charles@firthconsulting.com. Managing Macs in a Windows World
Charles Firth charles@firthconsulting.com Managing Macs in a Windows World Prerequisites Familiarity with Windows Active Directory networks Interest in Macintosh OSX integration and support Basic understanding
More informationApple Client Management with JAMF. Andrew D Huston Client Infrastructure Group Informa8on Services Kent State University
Apple Client Management with JAMF Andrew D Huston Client Infrastructure Group Informa8on Services Kent State University Intro Intro 2011 Kent State University President s Excellence in Action Award Winner
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationCentralized Mac Home Directories with ExtremeZ-IP
APPLICATION NOTE Centralized Mac Home Directories with ExtremeZ-IP Published: July 2009 Abstract Organizations wanting to integrate Mac OS X systems into their Windows-based enterprise network will most
More informationCentrify Server Suite Management Tools
SERVER SUITE TECHNICAL BRIEF Centrify Server Suite Management Tools Centrify Server Suite includes - at no extra charge - a powerful set of management tools in all editions: Centrify Identity Risk Assessor
More informationGuidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationEndpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationJumpCloud is your Directory-as-a-Service. A fully managed directory to rule your infrastructure whether on-premise or in the cloud.
JumpCloud is your Directory-as-a-Service A fully managed directory to rule your infrastructure whether on-premise or in the cloud. Authenticate Ensure your users are who they say they are. JumpCloud authenticates
More informationWhat s New in Centrify Server Suite 2013 Update 2
CENTRIFY SERVER SUITE 2013.2 DATA SHEET What s New in Centrify Server Suite 2013 Update 2 The new Centrify Server Suite 2013 Update 2 (2013.2) builds on the core enhancements Centrify introduced in Server
More informationowncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
More informationVodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
More informationowncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
More informationSystem Configuration and Deployment Guide
System Configuration and Deployment Guide This guide provides information on...... Configuring an Organization using the Organization Wizard... Setting a default Policy Suite using the Organization Wizard...
More informationSharePlus Enterprise: Security White Paper
INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationMobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
More informationImplementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationRed Hat Enterprise ipa
Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users
More informationMobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
More informationCourse 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationEnd User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
More informationipad Classroom Installation & Deployment Important information
ipad Classroom Installation & Deployment Important information Our aim is to carry out your installation as quickly and efficiently as possible whilst utilising Apple s recommended procedures for the deployment
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationiphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure
More informationIntroduction to Google Apps for Business Integration
Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.
More informationAn Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationHOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationVMware Virtual Desktop Manager User Authentication Guide
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
More informationConfiguration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
More informationSYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
More informationSophos Mobile Control
Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce
More informationAPPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationMobile Device Manager. Windows User Guide (Windows Phone 8/RT)
Mobile Device Manager Windows User Guide (Windows Phone 8/RT) Document Revision Date: Oct. 22, 2014 Mobile Device Manager Windows Phone 8 User Guide i Contents Windows Phone 8 Features Matrix... 1 Overview...
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationA Practical Path to Unified Identity Across Data Center, Cloud and Mobile
C E N T R I F Y W H I T E P A P E R A Practical Path to Unified Identity Across Data Center, Cloud and Mobile Abstract The major trends challenging IT organizations today are the increasing heterogeneity
More informationcompany policies are adhered to and all parties (traders,
APPLICATION SECURITY OVERVIEW Users have access to additional layers of security that are controlled and determined by the company s ICE administrator. These are designed to ensure company policies are
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationHOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
More informationSecuring VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite
WHITE PAPER CENTRIFY CORP. MARCH 2009 Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite Securing and auditing administrative access to the Virtual Infrastructure
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationIntroduction to the Windows Phone 8 Guide
Introduction to the Windows Phone 8 Guide Overview Windows Phone 8 is Microsoft's operating system designed for smartphones and shares the Modern UI with other Windows 8 devices. Windows Phone 8 offers
More informationBest Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009
Best Practices: Integrating Mac OS X Technical White Paper April 2009 2 Contents Page 3 Page 5 Page 9 Page 10 Page 11 Page 12 Apple s Built-In Solution How to Integrate Mac OS X Getting Started dsconfigad
More informationBuilding a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
More information