McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
|
|
|
- Norah Jenkins
- 10 years ago
- Views:
Transcription
1 McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management
2 Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises manage their growing mobile device fleets in a way that is secure, easy, and scalable? 3 Why ActiveSync Isn t Enough 3 Ease of setup and provisioning 4 Breadth of capabilities 4 Strong authentication 4 Compliance enforcement 4 Detailed reporting 4 Operational considerations 4 Application mobilization 4 Mobile operating system (OS) advancements 5 Device management 5 IT activation 5 Policy compliance 5 Applications beyond 6 Division of IT responsibilities 6 Summary 6 Getting Started 6
3 Microsoft (EAS) is a mobile data synchronization technology and protocol that provides push synchronization of contacts, calendars, tasks, and between ActiveSync-enabled servers and devices. EAS however supports only limited security policy management. McAfee Enterprise Mobility Management (McAfee EMM ), on the other hand, complements EAS by providing the full lifecycle of the device, self-service provisioning, configuration and policy management, compliance management, and reporting. McAfee EMM is the right solution for enterprises looking to manage their mobile fleets in way that is secure, easy, and scalable. What Can Do? ActiveSync is a mobile data synchronization technology and protocol developed by Microsoft, originally released in There are two implementations of the technology: one that synchronizes data and information with handheld devices with a specific desktop computer (originally known as Handheld PC Explorer) and another technology, commonly known as (or EAS), which provides push synchronization of contacts, calendars, tasks, and between ActiveSync-enabled servers and devices. is a proprietary protocol and is licensed to a number of mobile device companies, including Apple for the Apple iphone, HP for its webos devices, and Google for certain Android smartphones. technology is also used by other messaging and collaborative software servers, including Novell GroupWise and Lotus Domino. Why buy, deploy, and use the McAfee EMM solution if you can achieve so much with EAS to begin with? The smartphone revolution is sweeping the enterprise Since the original release of the iphone 1.0 on January 9, 2007, the mobile market has gone through a major paradigm shift. Smartphones now are on track to becoming the majority of mobile devices in use, and vendors who were smart enough to develop a superior offering now dominate this rapidly growing market. Innovative new smartphones are displacing traditional mobile phones, and that wave has now reached the enterprise. Until recently, the BlackBerry was the preferred choice of the mobile worker; today the situation is changing quickly. In contrast to the BlackBerry, McAfee EMM allows enterprises to control end to end, making their smartphones and Apple ipads true endpoints that are part of their data centers, just like laptops. More and more enterprises are testing other smartphone platforms such as the iphone and Android and like what they see. Moreover, the re-emergence of the tablet with the launch of the ipad opens up a new set of mobile device opportunities and requirements. Can enterprises manage their growing mobile device fleets in a way that is secure, easy, and scalable? The need for an enterprise-level mobile device management (MDM) solution has been a critical issue for many CIOs and CSOs and their teams. At first, many were looking to address this issue using tools they already had in house, such as the Microsoft EAS. However, more and more IT leaders within the enterprise have come to the realization that tools such as EAS can only take them so far. Secure, easy, and scalable enterprise mobility management solution has thus become mission-critical for the enterprise. Why ActiveSync Isn t Enough ActiveSync is a highly scalable protocol developed by Microsoft primarily to synchronize devices with Microsoft Exchange. Microsoft has licensed this protocol to device manufacturers and to many server vendors. For example, IBM Lotus Notes uses ActiveSync to push to Apple iphones. ActiveSync also includes a limited policy management capability as part of the protocol, and Microsoft Exchange leverages ActiveSync for basic policy management. 3
4 McAfee EMM, on the other hand, covers the full lifecycle of the device, including: Self-service provisioning Configuration and policy management Compliance management Detailed deep mobile device reporting In comparison, EAS covers only a limited subset of this lifecycle, focusing on some policy management and elements of compliance. Ease of setup and provisioning McAfee EMM s self-service provisioning fully configures the device for , along with WiFi and VPN. Exchange s ActiveSync policies can exercise partial control over the device only once Exchange has been configured. The initial device configuration is complicated, and McAfee EMM makes it easy. Breadth of capabilities ActiveSync is limited in what it can do, especially when compared to McAfee EMM. For example, ActiveSync can wipe the whole device, while McAfee EMM can selectively wipe parts of the device (Exchange synced , contacts, and calendar), in addition to the whole device. This is useful for personally owned devices that are accessing only corporate . Strong authentication McAfee EMM puts a client certificate on the device so that the device strongly authenticates itself to the network for access. Most large enterprises require strong or two-factor authentication and are bending their policies to permit push . They choose not to use a VPN because of latency, battery impact, and complexity. McAfee EMM provides push with strong authentication with no impact on performance or battery life, and it hides the complexity of a mobile VPN. Compliance enforcement Enterprises need to ensure that only devices that satisfy their security properties are able to connect to their networks. Exchange s ability to enforce compliance is limited. McAfee EMM ensures that only authenticated, managed, and secured devices can connect. For example, McAfee EMM can block compromised (jailbroken) iphones. Detailed reporting McAfee EMM collects lots of device data and metadata as well as real-time information about the device and provides reports on this information. Exchange reporting about devices is minimal. A McAfee EMM report tracks the compliance status of devices and can report on noncompliant devices. This report can be used to help IT guide users to remediate their devices back to compliance. Operational considerations Organizationally and politically, many enterprises do not want to use Exchange to manage devices. They don t use Exchange to manage laptops and don t want to risk the availability of . iphone devices are viewed as small computers properly managed by the endpoint group, not as an appendage of messaging. Application mobilization The enterprise is intent on mobilizing business applications beyond , such as business intelligence, sales force automation, point of sale, and document creation. Today, McAfee EMM is able to distribute applications for Windows mobile devices and with the release of ios 4.0 by Apple, the platform will become an Enterprise App Store for custom app distribution for Apple mobile devices like the iphone and ipad. 4
5 Mobile operating system (OS) advancements Mobile OS vendors are recognizing the need for device security and management beyond ActiveSync. Apple ios 4.0 includes a mature MDM capability and a device side that needs a server like McAfee EMM for security management. Google Android 2.2 introduces a similar MDM capability. Both demonstrate that enterprise mobile device security management needs a full management server for scale, security, compliance, and reporting. Device management McAfee EMM does full iphone security and configuration management through the use of ActiveSync policies and iphone Configuration Profiles. Conversely, Exchange can only manage ActiveSync policies that govern a subset of the iphone s features. Currently, ActiveSync policies govern a subset of the iphone and Apple ipod Touch features, and ActiveSync enforces only a limited set of policies for defining functions such as how the device password is used and controlling the device camera. In addition, the ActiveSync protocol supports remote wipe of the device. Apple differentiates the iphone from other smartphones by providing a second, richer way for IT to configure devices en masse. Configuration profiles are XML files that quickly load device configuration (for example, VPN and WiFi settings) and authorization information. Profile Services, used for the creation and secure distribution of configuration profiles, is core to Apple s blueprint and serves as a reference model for IT departments supporting the iphone or ipod Touch. McAfee EMM combines these two management approaches Apple Configuration Profiles and ActiveSync policy management into a single device management solution that uses group-based policy management, where a device is associated with a user who is associated with a group. This allows for one-to-many policy management and simplifies large-scale deployment of the iphone. Exchange, on the other hand, manages each device independently. IT activation Increasingly, enterprises are adopting policies that permit employees to use their personal iphones for business. IT wants to automate the activation process that allows employees to connect their personal devices to work. Automation typically includes the configuration of basic services such as and access (WiFi or VPN). For the iphone, these capabilities are configured via configuration profiles that are beyond the capabilities of Exchange. McAfee EMM bootstraps an iphone that is not known to and does not know of the enterprise data center into a fully managed endpoint that mobilizes applications and services from the data center. Exchange relies on manual configuration of the ActiveSync client to enable the iphone to be managed by Exchange through the set of ActiveSync policies that it supports. McAfee EMM also implements the Apple iphone enrollment process, including the use of simple certificate enrollment protocol (SCEP) to deploy digital certificates to the iphone. This capability enables the secure deployment of subsequent iphone configuration profiles used to configure IT services and application. This process is outside the scope of Exchange policy management. Policy compliance The McAfee EMM Access Manager performs a compliance check on all iphones before they enter the corporate network to ensure that ActiveSync policies and configuration profiles remain persistent. Since the McAfee EMM Access Manager operates in the demilitarized zone (DMZ), IT does not have to publish ActiveSync directly to the Internet, providing an added layer of security. Policy compliance enforcement by the McAfee EMM platform considers all the device information known about the iphone, including hardware version (to ensure that data at rest is encrypted on the iphone 3GS), software version, configuration profiles, and ActiveSync policies, as well as the authorization of the user and of his iphone. Exchange manages compliance based only on the ActiveSync policies present on the device. 5
6 Applications beyond McAfee EMM is independent of the messaging server and supports environments that include Exchange, Lotus Notes, IMAP, and Google Apps. Furthermore, McAfee EMM treats as just one more application and provisions and connects the iphone to applications beyond , using VPN and WiFi configurations. Division of IT responsibilities In summary, most IT organizations would never entertain the management and control of their Blackberry devices from Exchange. Enterprise IT is highly protective of its messaging infrastructure, has not used it as an endpoint manager for laptops or PCs, and does not want to risk the availability of corporate messaging servers by using Exchange as a device manager for the iphone. In a similar fashion, the messaging group does not want to give administrative access to Exchange to the device management group. Summary The mobile environment in the enterprise is changing rapidly. The smartphone revolution is sweeping the globe, and its impact is reverberating throughout IT and security organizations. The future mobile workforce demands the enablement of many mobile computing platforms, including smartphones and tablets, all of which need to be supported in a way that is secure, easy, and scalable. Attempts by Microsoft to extend ActiveSync as an enterprise mobility management tool are limited in breadth and depth. While at first glance it seems that EAS can provide all of an organization s MDM needs, it is quickly becoming apparent this is not the case. McAfee EMM provides a secure, easy, and scalable enterprise mobility management solution. EAS is not a viable alternative to McAfee EMM. Getting Started McAfee EMM is the best solution in the market today for enterprise mobility management. Reach out to a McAfee representative, and schedule a webinar and an evaluation. We are certain that you will notice the increase in productivity once you get iphones, ipads, and Android devices seamlessly integrated into your organization. About McAfee, Inc. McAfee, Inc., headquartered in Santa Clara, California, is the world s largest dedicated security technology company. McAfee is relentlessly committed to tackling the world s toughest security challenges. The company delivers proactive and proven solutions and services that help secure systems and networks around the world, allowing users to safely connect to the Internet, browse and shop the web more securely. Backed by an award-winning research team, McAfee creates innovative products that empower home users, businesses, the public sector, and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee, Inc Mission College Boulevard Santa Clara, CA McAfee, the McAfee logo, and McAfee EMM are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2010 McAfee, Inc wp_emm-vs-activesync_0910_fnl_ASD 6
McAfee Enterprise Mobility Management
Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers
McAfee Enterprise Mobility Management
McAfee Enterprise Mobility Management Providing mobile application enablement and HIPAA security compliance Table of Contents HIPAA and ephi 3 Overview of 3 HIPAA Compliance for Remote Access 4 Table 1.
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Mobile Device Management Glossary. www.maas360.com
Mobile Device Management Glossary www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink,
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
MDM Mobile Device Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Enterprise solution comparison chart
Enterprise solution comparison chart This quick reference compares supported devices and features across,, and Server. For the latest OS compatibility information visit www.blackberry.com/go/serverdocs
Secure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
M a as3 6 0 fo r M o bile D evice s
by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
SANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
The Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
Exchange ActiveSync (EAS)
Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,
Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
11 Best Practices for Mobile Device Management (MDM)
MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
The flexible workplace: Unlocking value in the bring your own device era
IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring
White Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
The Future of Mobile Device Management
The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table
SANS Mobility/BYOD Security Survey
Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software
McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
IBM MobileFirst Managed Mobility
Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.
BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next CONTENTS 1. OPEN ALL HOURS...2 Page 2. MOBILE DEVICE MANAGEMENT
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-Platform Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility is enabling organizations to
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
ios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
The Future of Mobile Computing
2 The Future of Mobile Computing when you re at a desk Our vision: We see a world where Mobile Computing unleashes boundless opportunity. We believe in a world where you only need one computer The Opportunity:
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
A Symantec Connect Document. A Total Cost of Ownership Viewpoint
A Symantec Connect Document Two-Factor Authentication A Total Cost of Ownership Viewpoint White Paper: Two-Factor Authentication: A TCO Viewpoint Two-Factor Authentication Contents Introduction............................................................................................
Technical Note. ForeScout MDM Data Security
Contents Introduction........................................................................................................................................... 3 Data Security Requirements for BYOD..................................................................................................................
Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments
Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
DEVICE MANAGEMENT EXTENSIONS
for System Center Manager DEVICE MANAGEMENT EXTENSIONS 2011 www.odysseysoftware.com Athena for System Center Manager Document Information Date: 4/13/2011 2011, All Rights reserved. Athena is a trademark
How To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
E-commerce: Competing the Advantages of a Mobile Enterprise
Addressing the Challenges of Going Mobile Mobile Data Collection Using COMMANDmobile Table of Contents Introduction... 3 Challenges of Going Mobile... 4 Existing Infrastructures... 4 Configuration Management...
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Statement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Why Digital Certificates Are Essential for Managing Mobile Devices
WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper
Healthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
