Technical Whitepaper. Secure Docs
|
|
|
- Michael Wilkins
- 10 years ago
- Views:
Transcription
1 Technical Whitepaper Secure Docs
2 Contents Introduction 3 Overview 4 Technical Details 4 Conclusion 7 Good Technology BE-GOOD Secure Docs Technical Whitepaper 2
3 Introduction As of Q1 2012, Good introduced Secure Docs, a new Good for Enterprise capability that for the first time ever allows users to securely view, edit, save and send files leveraging popular third-party document editors. Secure Docs is a new set of functionality that allows users to securely view, edit, save and send files leveraging popular third-party document editors supported by Good for Enterprise. With Good s new solution, mobile workers can install and utilize secure third-party editing applications that were developed on the Good Dynamics security platform for mobile applications, ensuring that they all contain enterprise-grade security and the flexibility to be deployed across multiple platforms with the same set of policies. This whitepaper provides a technical overview of this solution, including its complete, secure workflow with Good for Enterprise. The Need for Secure Docs The penetration of smart devices into consumer markets has made connectivity relatively easy and inexpensive, especially outside of the workplace. Connectivity, accompanied by the right apps and tools, increases collaboration and productivity in nearly any organization. While access to corporate , calendar and contacts is often the starting point, industry-leading companies recognize that employees need more than to fully participate in business processes. With the rapid emergence of ipads, the ability to edit documents on-the-go and manage transmitted files is more important than ever. Currently, editing documents on a mobile device requires the use of a third-party application, which is generally not secure and puts corporate information at risk. With Secure Docs, workers can now securely edit, save and send files using their ipad (support on more platforms is expected in 2012) without the worry of potentially corrupting corporate data or inadvertently sharing it with cloud-based applications. Good Technology BE-GOOD Secure Docs Technical Whitepaper 3
4 Secure Docs: An Overview The Secure Docs capability delivers enterprise-grade security through a complete mobile content editing workflow from viewing and editing to saving and sending. Mobile workers can edit a document using one of the new, secure third-party editors, and then save it in the Good File Repository, a secure environment for document saving and archiving. Files are stored and secured with FIPS certified AES encryption. Additionally, because Secure Docs works solely with Good for Enterprise (GFE), IT can rest assured that security policies for disabling cloud-based sync, Open In and Share capabilities, and Cut/Copy/Paste functions are applied to the corporate data being accessed by the secured editor, and that corresponding application-level security policies for password requirements and Jailbreak detection are enforced on the secured editor prior to data access. Technical Details Secure Docs is a means of exchanging data between two applications running on the same device. One of the applications must be the GFE and PIM application; the other must be a Good Dynamics-secured application. The security of data is not compromised during exchange. The data remains in Good secure storage throughout. The method of moving data from one application to another is the Good Dynamics API. This API includes the functions and structures required to send and receive data using Good Secure Docs. To utilize this API, the application must authorize by pairing with Good for Enterprise. Good for Enterprise (GFE) Secure Storage Secure Docs Editor (3 rd Party) Good Dynamics Libraries Mobile Device Good NOC Secure Inter-Container Communication of Files and Policies Firewall SECURE PIPE Good Mobile Control (GMC) Policies Good Mobile Messaging Server (GMMS) /Files Lotus Domino An IT administrator uses the Good Mobile Control console to enable users to use the third-party secure editors. The IT admin may specify the specific third-party editor to individual devices or groups of devices. End-users, on the other hand, need to install a third-party editor for free from the Apple App Store. Good Technology BE-GOOD Secure Docs Technical Whitepaper 4
5 Single Sign-On Secure Docs has a single sign-on method that is synced with the user s GFE password. The password policy protection is identical to GFE and the secure third-party editors. After authentication, every time a secure third-party editor is opened, it will flip to the GFE login page: 1. If GFE is logged in, user will automatically flip back to the secure editor 2. If GFE is not logged in, user will enter GFE s password that will take him/her back to the secure editor After authentication has been established, and on each and every user access or other application launch event, the Secure Docs editor invokes the Good Dynamics Libraries in order to perform compliance checks and authenticate the user as necessary, based on customer-specified policies for password entry, password timeouts, etc. It is not possible for the user to access documents or perform other application functions unless and until compliance checks and user authentication have been completed. The Good Dynamics library will determine if inactivity timeout has expired and will handle interaction with GFE to authenticate the user when timeout occurs. MDM and Security: Compliance Policies Secure Docs editors take advantage of the GFE MDM commands through the use of the Good Dynamics Libraries. When an MDM command is sent from GMC to the GFE application, not only will it trigger an action on the GFE side, all connected Secure Docs editors will be triggered. The following MDM features are supported: Lock Remotely lock GFE and Secure Docs editors Wipe Remotely wipe all container data, GFE and Secure Docs editors In addition to MDM functionality, the following Security Policies are supported: Password Timeout Maximum timeout before password is required for client unlock Lock on Background Always lock the UI when entering background mode Enable Lock Notifications Show notification alerts on lock screen for this user Cut / Copy / Paste Disable container data to be cut, copied, and pasted outside of the container. The following Compliance Policies from GMC are also enforced upon the launch of a Secure Docs editor: OS Version Compliance requires that the device is running one of a set of supported OS versions Model Compliance requires that the device hardware is in a set of supported hardware Rooted Compliance requires that the device not be Jailbroken Good Dynamics Library Compliance requires that the device is running one of a set of supported Good Dynamics library versions. Good Technology BE-GOOD Secure Docs Technical Whitepaper 5
6 Data Storage and Encryption Secure Docs editors use the Good-provided Good Dynamics Libraries to store and retrieve data and perform related encryption and decryption functions, in combination with a user-provided password, where that password s length, complexity, etc. shall be defined by policy parameters passed from the GFE application to the Secure Docs editors, as further described below. The Good Dynamics Libraries handle all aspects of password selection, password updates, and related key generation and management, data encryption and storage, and data decryption and retrieval. The Secure Docs capability disables the ability for a user to store data unencrypted, outside the storage provided, through the Good Dynamics Libraries. Data Leakage Controls Secure Docs carries the same set of flexible policies as GFE that helps manage the mobile fleet and keeps corporate data secure. Secure Docs includes an extra set of secure policy features: Prevent data loss and data exposure by disabling cloud-based sync and sharing options. Easily set security levels and which approved third party editors your employees can use for viewing and editing documents. In addition to the use of the Good Dynamics Libraries to provide for secure and encrypted data storage, Secure Docs editors implement the following application-level controls to prevent data loss/leakage to other native and/or third party applications and cloud services: Cut/Copy/Paste If an application allows a user to cut/copy text, and paste it outside of the application, you must first implement cut/copy/paste policy controls that prevent the end user from copying data either into or out of the application. The Good Dynamics library will provide current policy at startup and invoke a callback if the policy changes. The Good Dynamics library will also clear the clipboard automatically when the third-party editor enters background mode. This policy is controlled by the GMC and mirrors the policy set for GFE. Open With/Open In Secure Docs editors prevent the user from opening documents with or in other native and/or 3 rd party applications, other than within the Good for Enterprise application itself. Connect To/Upload Secure Docs editors disable the ability of the user to upload documents to 3 rd party document storage/sharing services, FTP servers, etc. Send/Save Secure Docs editors do not allow the user to Save or Send documents using any 3 rd party or native applications. URL-Based Invocation Secure Docs editors do not allow for URL-based invocation or provide any URL-based or other similar external interfaces that would allow the application to be launched or application functions to be used by any native or 3 rd party application. Save 1 Secure Docs editors allow the user to Save selected documents, both in their own file store and in the GFE application. Secure Docs editors do not allow saving to any other apps or storage areas on the device, other than the storage provided through the Good Dynamics Libraries, or in the GFE application. The Good Dynamics Libraries will provide an Application Programming Interface to enable this Save function. Send Similarly to Save, Secure Docs editors allow the user to Send selected document(s) using the GFE application. They do not allow sending via native or any 3 rd party application. The Good Dynamics Libraries will provide an Application Programming Interface to enable this Send function. The first Good for Enterprise ios client version to include support for Secure Docs is v Both the Save and Send features are executed using the Open With API. To either save or send a document to GFE, a use selects a button that securely pushes the document to GFE. The user is then asked via a dialogue box whether they would like to or Save the document. Selecting will launch Good Compose. Selecting Save will save the document in the Good File Repository. Good Technology BE-GOOD Secure Docs Technical Whitepaper 6
7 Conclusion In today s dynamic business environment, enterprises must keep pace with technological innovation while maintaining corporate security. With Secure Docs, employees can increase productivity on-the-go. And IT can rest assured that all enterprise data is secure. To learn more about Good solutions, visit good.com or call BE-GOOD. Good Technology For more information, please call BE GOOD or visit Global Headquarters (main) BE GOOD (sales) EMEA Headquarters +44 (0) VISTO Corporation and Good Technology, Inc. All rights reserved. Good, Good Technology, the Good logo, Good for Enterprise, Good for Government, Good for You, Good Mobile Messaging, Good Mobile Intranet, and Powered by Good are trademarks of Good Technology, Inc. ConstantSync, Constant Synchronization, Good Mobile Client, Good Mobile Portal, Good Mobile Exchange Access, Good Mobile Platform, Good Easy Setup, Good Social Networking and Good Smarticon are either trademarks or registered trademarks of VISTO Corporation. All third-party trademarks, trade names, or service marks may be claimed as the property of their respective owners. Good and Visto technology are protected by U.S. patents and various other foreign patents. Other patents pending. WP_Secure Docs_Jan2012_US Good Technology BE-GOOD Secure Docs Technical Whitepaper 7
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here.
Securing Business Mobility Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices Your Device Here. Good supports hundreds of
Good for Enterprise Good Dynamics
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
Bring Your Own Device. Individual Liable User Policy Considerations
Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations
User Self-Service Configuration Overview
User Self-Service Configuration Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Secure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight
Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight Karthik Ramgopal/Paras Segal [email protected] [email protected] www.maas360.com Why Mobile Applications are a Must? Rising
The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Oracle Mobile Security
Oracle Mobile Security What s New in OMSS 11gR2 Patch Set 3 ORACLE WHITE PAPER MAY 2015 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes
AVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
SharePlus Enterprise: Security White Paper
INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should
Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh
Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in
Securing Enterprise Mobility for Greater Competitive Advantage
SAP Brief SAP Technology SAP Afaria Objectives Securing Enterprise Mobility for Greater Competitive Advantage Build a strong foundation for mobile success Build a strong foundation for mobile success Enterprise
Good Share Client User Guide for ios Devices
Good Share Client User Guide for ios Devices Product Version: 3.1.3 Doc Rev 3.1 Last Updated: 24-Feb-15 Good Share TM Table of Contents Introducing Good Share 1 Installing the Good Share App 1 Getting
Total Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski [email protected] www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
Vodafone Secure Device Manager Administration User Guide
Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Sophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
activecho Driving Secure Enterprise File Sharing and Syncing
activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get
Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
Top. Reasons Federal Government Agencies Select kiteworks by Accellion
Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
Resco Mobile CRM Security
Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
IBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen
Enterprise Mobile App Management Essentials Presented by Ryan Hope and John Nielsen 1 Mobile App Trends Global mobile app downloads to exceed 30B by 1016 US and Europe account for over 70% of the market
McAfee Enterprise Mobility Management
Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
MTP. MTP AirWatch Integration Guide. Release 1.0
MTP MTP AirWatch Integration Guide Release 1.0 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of
Compliance Rule Sets in MaaS360
Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in
MaaS360 Mobile Device Management (MDM) Administrators Guide
MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
Safeguard Protected Health Information With Citrix ShareFile
Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization
Cortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
Secure Mobile Applications. A Technical White Paper
Secure Mobile Applications A Technical White Paper Contents Abstract 3 Reality of the Wireless Enterprise 3 Changing the Mobile Landscape 4 Good Architecture Overview 4 Good Security Model 5 Secure User
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
System Configuration and Deployment Guide
System Configuration and Deployment Guide This guide provides information on...... Configuring an Organization using the Organization Wizard... Setting a default Policy Suite using the Organization Wizard...
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Cloud Services MDM. Overview & Setup Admin Guide
Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4
Sophos Mobile Control Administrator guide. Product version: 3
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
Sophos Mobile Control User guide for Apple ios. Product version: 4
Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
Windows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual
User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
GO!Enterprise Mobile Device Management Android Release Notes
GO!Enterprise Mobile Device Management Android Release Notes GO!Enterprise MDM Version 3.9.0 Release Notes 1 GO!Enterprise MDM for Android Table of Contents GO!Enterprise MDM Version 3.9.0 Release Notes
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
MaaS360 Cloud Extender
MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
MDM User Guide June 2012
June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App
Introduction to the AirWatch Workspace
Introduction to the AirWatch Workspace Overview Prior to the AirWatch Workspace, organizations' BYOD deployments were architecturally similar to their deployments using only corporate-owned devices. AirWatch
Egnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
