2 Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing outages and other issues. By enabling system administrators to access over 500 functions across dozens of different types of servers, platforms and devices through a convenient smartphone client, Mobile Admin provides a cost-effective means of increasing the availability of mission-critical business applications. The product enhances the efficiency of the IT team, which in turn has a direct positive impact on the productivity of the entire user population. Security is a fundamental concern of all IT Management solutions, and it is of particular importance when mobile devices are used to access corporate information across the firewall. Mobile Admin s client-server architecture features a fully-integrated security model that provides both data encryption and user authentication.
3 Mobile control of your network Mobile Admin is a client-server application. The Mobile Admin Server software is installed behind your corporate firewall on any one computer that has access to all other servers in your network that you want to manage. The Mobile Admin Client software is installed on your wireless device. You can use Mobile Admin to manage a wide range of computers, servers, and systems in your network: Microsoft Windows computers and networks Microsoft Active Directory Microsoft Exchange 2000/2003 Microsoft Exchange 2007 Microsoft SQL Server Microsoft IIS Microsoft DHCP Microsoft DNS Microsoft Cluster Servers Microsoft SCOM Microsoft SCMDM SolarWinds Orion IBM Lotus Domino Novell edirectory/nds BlackBerry Enterprise Server Blackberry Enterprise Server 5 Oracle Citrix RSA Authentication Manager HP Integrated Lights Out (ilo) Backup Exec VMware VMware Virtual Infrastructure Nagios Amazon Elastic Compute Cloud (EC2) Mobile Admin allows you to use your wireless device to perform a full range of administrative tasks on these servers, including: managing users and groups, event logs, services, and print jobs rebooting servers resetting passwords editing server documents deleting mailbox messages.
4 Supported devices Mobile Admin can be used with any of the following wireless handheld devices: BlackBerry smartphones Apple ios devices Android devices Mobile Admin can also be used on any computer with an Internet connection using the Mobile Admin Web Interface (Mozilla Firefox and Internet Explorer are the supported browsers).
5 Encryption The types of data encryption available to you with Mobile Admin depend on the type of wireless handheld devices you use: BlackBerry smartphones, with or without a BlackBerry Enterprise Server Apple ios devices, with or without a VPN Android devices, with or without a VPN Encryption options for Mobile Admin on BlackBerry smartphone You can choose to use Mobile Admin on BlackBerry smartphones with or without a BlackBerry Enterprise Server. Mobile Admin with BlackBerry smartphones and a BlackBerry Enterprise Server When you use Mobile Admin with a BlackBerry Enterprise Server, you are able to leverage the industry-leading security infrastructure of the BlackBerry network. If you use a BlackBerry Enterprise Server, all your Mobile Admin data is sent over the Mobile Data Service (MDS), and is, by default, automatically encrypted using Triple Data Encryption Standard (TDES or 3DES). While TDES provides the highest industrystandard encryption, you can also choose additional layers of encryption. All versions of the BlackBerry Enterprise Server use TDES as the default encryption for all data. The BlackBerry Enterprise Server 4.1, however, allows you to choose between using TDES and Advanced Encryption Standard (AES), or both. While TDES and AES are generally recognized as the most robust encryption methods available today, the US Government has also certified TDES and AES as compliant with Federal Information Processing Standards (FIPS).
6 The Mobile Admin Server is configured, by default, to add a layer of encryption with Hypertext Transfer Protocol Secured (HTTPS). HTTPS is HTTP encrypted with Transport Layer Security (TLS). When Mobile Admin uses HTTPS, all Mobile Admin data transmitted between the Mobile Admin Server and the wireless handheld is encrypted. Architecture overview BlackBerry smartphones with a BlackBerry Enterprise Server Figure 1-1 shows how Mobile Admin connects your wireless device to your network if you are using a BlackBerry Enterprise Server. The Mobile Admin Server is connected to the servers and computers that you want to manage with Mobile Admin. Information about these servers and computers is sent through the Mobile Admin Server to the BlackBerry Enterprise Server. The BlackBerry Enterprise Server encrypts the data with Triple Data Encryption Standard (TDES) or Advanced Encryption Standard (AES) and sends it over the Internet and the wireless network to the BlackBerry smartphone. The BlackBerry smartphone decrypts the data so that it can be viewed using the Mobile Admin Client. Similarly, Mobile Admin Client commands from the BlackBerry smartphone are encrypted then sent over the wireless network and the Internet to the BlackBerry Enterprise Server. The BlackBerry Enterprise Server decrypts the commands and sends them to the Mobile Admin Server, which then further decrypts the commands if required, and then performs the requested actions. When Mobile Admin uses HTTPS, data is encrypted with TLS before it is transmitted between the Mobile Admin Servers and the BlackBerry smartphones. Note Figure 1-1 shows the Mobile Admin Server and the BlackBerry Enterprise Server installed on separate computers. However, the Mobile Admin Server can be installed on the same computer as the BlackBerry Enterprise Server.
7 Figure 1-1 Mobile Admin architecture with BlackBerry smartphones and a BlackBerry Enterprise Server Protecting your network when a handheld device is lost BlackBerry Enterprise Server 4.0 and above offers the ability to kill a lost BlackBerry device. The kill command disables the device, and deletes all of its stored information, including everything related to the Mobile Admin application. The kill command is one of the hundreds supported by Mobile Admin, enabling a system administrator to use one BlackBerry device to kill another one. Mobile Admin with BlackBerry smartphones without a BlackBerry Enterprise Server When you do not use a BlackBerry Enterprise Server, data sent between the Mobile Admin Server and BlackBerry smartphones can be encrypted using HTTPS. If you do not use a BlackBerry Enterprise Server with your BlackBerry smartphones, it is strongly recommended that Mobile Admin be configured to make HTTPS connections.
8 Architecture overview BlackBerry smartphones without a BlackBerry Enterprise Server Figure 1-2 shows how Mobile Admin connects your wireless device to your network if you are not using a BlackBerry Enterprise Server. The Mobile Admin Server is connected to the servers and computers that you want to manage with Mobile Admin. The Mobile Admin Server encrypts the data with HTTPS and sends it over the Internet and the wireless network to the BlackBerry smartphone. The BlackBerry smartphone decrypts the data so that it can be viewed using the Mobile Admin Client. Similarly, Mobile Admin Client commands from the BlackBerry smartphone are encrypted using HTTPS, and then sent over the wireless network and the Internet. The Mobile Admin Server decrypts the commands if required, and then performs the requested actions. Figure 1-2 Mobile Admin architecture with BlackBerry smartphones
9 Other considerations If you do not have a BlackBerry Enterprise Server, you can choose to either rent a BlackBerry Enterprise Server from a hosting company for a monthly fee, or to use Mobile Admin without one. To use Mobile Admin without a BlackBerry Enterprise Server, you must: use a BlackBerry smartphones meeting Mobile Admin s minimum system requirements connect from the Mobile Admin Client handheld to the Mobile Admin Server using Internet TCP/IP make sure that your carrier has the Internet Access Point Name (APN) enabled for your device Encryption options for Mobile Admin on Apple ios and Android devices You can choose to use Mobile Admin on Apple ios and Android devices with or without a Virtual Private Network (VPN). If you use a VPN, all your Mobile Admin data is sent over the VPN, and is, by default, automatically encrypted. By default, the Mobile Admin Server is configured to add a layer of encryption with HyperText Transport Protocol Secured (HTTPS). HTTPS is HTTP encrypted with Transport Layer Security (TLS). When Mobile Admin uses HTTPS, all data transmitted between the Mobile Admin Server and the wireless handheld is encrypted. If you are using Apple ios devices or Android devices with Mobile Admin, it is strongly recommended that you connect to your network through a VPN. If you cannot use a VPN, it is strongly recommended that Mobile Admin be configured to make HTTPS connections.
10 Architecture overview - Apple ios and Android devices Figure 1-3 shows how Mobile Admin connects your wireless handheld device to your network using a VPN and/or HTTPS. The Mobile Admin Server is connected to the servers and computers that you want to manage with Mobile Admin through a Virtual Private Network (VPN), which encrypts network data. The Mobile Admin Server encrypts the data with HTTPS and sends it over the Internet and the wireless network to the wireless handheld device. The Mobile Admin Client decrypts the data on the wireless handheld device so that it can be viewed. Similarly, Mobile Admin Client commands from the wireless handheld are encrypted by with HTTPS, and can be encrypted with a VPN, then sent over the wireless network and the Internet. The Mobile Admin Server decrypts the commands if required, and then performs the requested actions. Figure 1-3
11 Mobile Admin proxy The Mobile Admin proxy is a service that runs on the same computer as Mobile Admin and proxies SSH/Telnet and RDP/VNC traffic. The Mobile Admin clients authenticate transparently to the proxy if the appropriate rights and permissions have been configured. The Mobile Admin proxy enables access to SSH/Telnet and RDP/VNC servers through a central port, rather than having to configure access to each individual server. If the Mobile Admin proxy is not used, then all SSH/Telnet and RDP/VNC servers must have the appropriate firewall configuration. Other considerations A VPN client is provided by default on all Apple ios and Android devices. Port and firewall configurations Mobile Admin can use ports 4054 (the HTTP port), 4055 (the HTTPS port) or 4056 (the proxy port for SSH/Telnet and RDP/VNC connections) to communicate between the BlackBerry Enterprise Server and the Mobile Admin Server. If you use a BlackBerry Enterprise Server hosting company or use Mobile Admin without a BlackBerry Enterprise Server, you will have to make sure that the gateway you use is able to contact your Mobile Admin Server through these ports, which may require firewall configuration. You can also choose to configure the ports that Mobile Admin uses; if you change these ports used by Mobile Admin, you must make sure that your gateway is still able to contact your Mobile Admin Server.
12 Authentication As well as data encryption, Mobile Admin supports three different levels of authentication: primary login authentication (required), from a choice of: - Windows user name and password - Mobile Admin-specific username and password device-level password (optional) RSA SecurID/RADIUS (optional) Primary login authentication Mobile Admin requires that you choose a primary form of authentication that each user must enter to log in to the Mobile Admin application, no matter what other forms of authentication (such as device-level, or RSA SecurID) that you may have configured for the user. You can also configure how frequently the user is required to enter the primary login authentication. For example, you can configure Mobile Admin to require the primary login after time-out intervals that you specify. Windows user name and password authentication Administrative access to servers with Mobile Admin can be configured to use the Windows user settings for your network. With this option, users must always provide their Windows network user name and password to login to Mobile Admin. If you choose to use the Windows network settings, you can configure Mobile Admin users to have access to either: exactly the same servers and services in Mobile Admin as they do in your network; or a subset of the servers and services they have permissions to manage in your network.
13 Mobile Admin user name and password authentication Administrative access to servers with Mobile Admin can be configured to be specific to Mobile Admin, if you would rather not use Windows login data for Mobile Admin. Because Mobile Admin is fully integrated with Windows security, you must specify at least one Windows account for the Mobile Admin Server to use to authenticate Mobile Admin users when they login with their Mobile Adminspecific username and password. If you specify one Windows account, Mobile Admin will use that as the default Windows authentication for all Mobile Admin users when they enter their Mobile Admin-specific username password. However, for each user, you can choose to: use the default Windows account, or use any other Windows account further configure or limit access to specific network servers, as long as these servers are a subset of the servers that the associated Windows account has permission to manage Because of the many available choices, there are several ways to configure user access to your network if you choose to use Mobile Admin-specific passwords. The following three examples are provided to illustrate some of the possibilities. Sample configuration #1: In Mobile Admin, set up one existing Windows account as the default account for Mobile Admin with a wide range of permissions, such as a domain administrator or administrator account. In Mobile Admin, add users, and set up Mobile Admin specific passwords for each user. In Mobile Admin, configure access for each user to an appropriate subset of network servers.
14 Sample configuration #2: In Windows, create a specific Windows account that has the permissions that you want all Mobile Admin users to have. In Mobile Admin, set up the new Windows account as the default account for Mobile Admin. In Mobile Admin, add users, and set up Mobile Admin specific passwords for each. Sample configuration #3: In Windows, create a specific Windows account that has the permissions that you want most Mobile Admin users to have. In Mobile Admin, set up the new account as the default account for Mobile Admin. In Mobile Admin, add users and set up Mobile Admin specific passwords for each. For the small number of users who you want to have different permissions than the default Windows account, configure them to use different appropriate Windows accounts to authenticate with Mobile Admin. Device-level password authentication Most wireless handheld devices and phones provide optional device-level authentication. When the device password feature is enabled, you must enter a password before you can use the device and Mobile Admin.
15 Device-level passwords for BlackBerry smartphones The BlackBerry smartphone password provides device-level authentication on BlackBerry smartphones. After ten failed attempts to enter the handheld password, all information on the handheld is erased for security purposes. By default, the handheld password feature is not enabled. The handheld password can be enabled at the device level by each user. Alternatively, your BlackBerry Enterprise Server administrator can edit the IT Policy for the BlackBerry Enterprise Server to require a handheld password for some or all users. Security time-out settings define how long a handheld device must be inactive before a user is required to enter the handheld password. These settings can also be configured at the device level by individual users, or by modifying the IT Policy on the BlackBerry Enterprise Server for some or all users. For extra security, it is recommended that you enable the BlackBerry smartphone password for all Mobile Admin users. For more information about how to enable the handheld password and to configure the security time-out, please refer to the user documentation for your BlackBerry smartphone. Device-level passwords for Apple ios and Android devices By default, device-level passwords are not usually enabled, and must be enabled at the device level by each user. For extra security, it is recommended that all Mobile Admin users enable the device-level password. For more information about how to enable the device-level password for your device, please refer to the user documentation that was provided with your device.
16 RSA SecurID and RADIUS authentication Mobile Admin also supports the option of using RSA SecurID authentication, and has been officially approved as an RSA-Certified application. RSA SecurID provides twofactor authentication, which requires a user to enter a combination of a secret, personal identification number (PIN) and a code from a SecurID token. The token generates a new, unpredictable code every 60 seconds. These PIN and code combinations are synchronized with the RSA Authentication Manager, which is installed on your network and controls access to RSA-protected applications and devices. If you choose to use RSA SecurID authentication with Mobile Admin, users will have to enter their PIN and token code before they can log in to Mobile Admin. For more information about using RSA SecurID authentication, please see www. rsasecurity.com. Mobile Admin also supports RADIUS authentication, which means that Mobile Admin can act as a RADIUS client or RADIUS device for whatever type of RADIUS server and authentication system you are using, such as SafeWord.
17 Credential and Information Logging in Mobile Admin Client(Mobile User) If a login to the network is required, the user is prompted for authentication information. This authentication information takes the form of (optionally) RADIUS or RSA SecurID 2-factor authentication (optionally) device-level authentication (required) Windows credentials If the authentication is successful, the server passes back a token to the client that is required in subsequent transactions between the client and server. This token is not stored on the mobile device between sessions. The sessions can be configured from the server the server can be configured to ensure that the token expires after a period of time. The default token length is 10 minutes. When overriding credentials are used for individual managed servers, this information is sent directly to the Mobile Admin server (within your data center) and stored securely on it. This information is not used in a token, nor is it stored on the mobile device in any way. As well, on all mobile platforms, any state information stored by the Mobile Admin client is stored in common persistent storage areas if a device for any reason becomes compromised, wiping the devices will remove all of this state information. The only state information stored persistently is configuration and preference information not credentials.
18 Server During the authentication process, once the server securely receives the credentials, they are passed onto the relevant subsystems for validation. The server stores two types of data: Configuration data (user and server preferences, Mobile Admin policy information, etc) Server characteristics (port settings, etc) Any sensitive data related to credentials (usernames and passwords) are encrypted using Triple-DES encryption before being placed in a SQLite backend that is embedded in the Mobile Admin server. Strong key management is handled by the OS and.net APIs, not Mobile Admin. Users on the Mobile Admin server that have file access rights to the Mobile Admin installation folder can access the back-end data. This data is extremely well protected, as long as routine and prudent measures are taken to secure the Mobile Admin server from unauthorized entry (as with any other server host). Audit and Debug Logging There are two categories of information stored by the Mobile Admin server: Audit Logs Debug Logs Audit log information is maintained inside the database, but this information does not contain any identifying data other than the user login name that performed the action. This information is kept indefinitely to satisfy compliance and regulation-related requirements of our users. It can be browsed and searched from within the administration interface of the Mobile Admin server.
19 Debugging and diagnostic information is stored on the server in a text file in the Mobile Admin directory by default, the server only logs for debugging purposes information related to server activity and events. This information can be configured to be more detailed, but this is usually only done to diagnose a support issue. Great care and testing have taken place to ensure no sensitive information enters debug logs. These logs are not rotated or deleted unless the user removes them manually.
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
Mobile Admin Server Installation and Configuration Guide Version 8.1 Copyright 1995-2013 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means
Feature Summary Manage Microsoft Windows, Active Directory, Exchange, ActiveSync IIS, SQL Server, DHCP, DNS, Cluster Server, System Center Operations Manager and System Center Mobile Device Manager, RSA,
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist This document lists the preinstallation requirements that must be met before you install the BlackBerry Enterprise Server
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
BlackBerry Enterprise Solution v4.1 For Microsoft Exchange Life is now EXTENDING EXCHANGE WITH SECURE WIRELESS SOLUTIONS BlackBerry Enterprise Server software integrates with Microsoft Exchange and your
What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise Upgrade paths Enhancements to the setup application Administrators can upgrade to BlackBerry Enterprise Server 5.0 SP4 for Novell
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Reference Guide What's New in BES12 Cloud 711-60712-123 Published: 2016-06-20 SWD-20160620151902701 Contents What's new in BES12 Cloud...5 Supported features by device type... 5 Compatibility and requirements...11
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
Access Corporate Outlook E-mail & Data on the World s Most Popular Smartphones via Secure, Wireless & Direct Synchronization with Microsoft Exchange 2003 RoadSync Administrator s Guide Mobilizing Microsoft
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web
Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Hardware Selection Mobile Admin Deployment Guide This document is provided to help you best deploy Mobile Admin within your network infrastructure. The diagram below represents a possible deployment of
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
Foundation IT Written approximately Dec 2010 1 Outlook Web Access With the new version of Exchange 2010 Outlook Anywhere has been enabled and configured with a secure socket layer (SSL) certificate from
Cloud Store & Share Frequently Ask Questions Where can I find information about the offer, e.g. the price list? How can I order the service? What is the Cloud Store & Share Client? Where can I download
Disaster Recovery Planning BlackBerry Enterprise Server v4.0 for IBM Lotus Domino About Disaster Recovery Disaster recovery is a broad term which can vary amongst different organizations Three main concepts
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Introduction to the Secure Email Gateway (SEG) Overview The Secure Email Gateway (SEG) Proxy server is a separate server installed in-line with your existing email server to proxy all email traffic going
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
Introduction to the AirWatch Cloud Connector (ACC) Guide The AirWatch Cloud Connector (ACC) provides organizations the ability to integrate AirWatch with their back-end enterprise systems. This document
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: email@example.com Information in this document is subject to change without notice. Companies names
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
ManageEngine Password Manager Pro Vs Thycotic Secret Server Features Comparison Sheet (As per the information available in Thycotic Secret Server s website on August 19, 2015) Feature ManageEngine Password
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: firstname.lastname@example.org Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview
MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
2 Table of Contents Foreword 0 Part I Introduction 3 Part II User Preferences 3 Part III System Settings 4 Part IV Mobile Client Permissions 6 Part V Mobile Client Usage 8 Introduction 1 3 Introduction
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
BlackBerry Enterprise Server for Microsoft Exchange Version: 4.1 Service Pack: 7 Installation Guide Published: 2009-10-18 SWD-906136-1018091037-001 Contents 1 Planning a BlackBerry Enterprise Server installation...
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...
GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel