White Paper: A Technical Comparison of Mobile Management Solution Features and Functions

Size: px
Start display at page:

Download "White Paper: A Technical Comparison of Mobile Management Solution Features and Functions"

Transcription

1 White Paper: A Technical Comparison of Mobile Management Solution s and Functions

2 Contents Executive Summary... 1 About Microsoft System Center Mobile Device Management... 2 Comparison Matrix... 2 Managing Devices and Users... 4 Group Assignment Via Active Directory... 4 Device Membership in Active Directory... 5 Policy Based Management and Configuration... 6 OTA/Network Encryption and Mobile VPN... 7 On Device and File Encryption... 9 Lockdown Bluetooth Lockdown Application and Data Distribution/Management LOB Application Data Push/Alert Asset Tracking, Logging, and Reporting Firmware and Update Management Help Desk and Troubleshooting Self Service Appendix Methodology Ratings i

3 Executive Summary Managing a fleet of mobile devices while ensuring end-to-end data integrity is a difficult task. Users want their desktop at their fingertips, with reliable access not only to familiar productivity tools such as , calendar, and contact management, but critical line-of-business applications as well. For the IT team, fulfilling these expectations requires a delicate balancing act. Mobile devices not only transmit data over public networks but are also uniquely vulnerable to loss and theft. Security, both for the device and the critical data on it and for its connection to the corporate network, is paramount. But policy enforcement to protect corporate data should not come at the cost of user productivity, nor pose an undue burden to IT and the help desk. Achieving this balance demands a flexible, end-to-end mobile management solution that helps IT administrators more easily secure and manage mobile devices within a corporate network, while providing secure, single-point access for line-of-business (LOB) applications and corporate data. This requires an extensive set of features and capabilities that can make selecting the right solution for your organization s needs a complex task. But it s important to note that choosing a mobile management solution involves more than just checking off an extensive set of features, some of which may be of interest to only a small number of organizations or particular industries. If it doesn t fit gracefully into your existing management and server infrastructure, you re unlikely to achieve the full return on investment (ROI) and total cost of ownership (TCO) benefits possible. To aid technical decision makers in discerning the right mobile management solution for their organization, Microsoft commissioned an independent third-party systems integrator that specializes in the deployment and maintenance of enterprise mobility solutions to compare the capabilities of three leading mobile management solutions: Microsoft System Center Mobile Device Management ( ) Blackberry Enterprise Server Version Service Pack 4 ( ) Motorola Mobile Messaging ( ) This technical comparison summarizes the results in a comparison matrix chart (Page 2) followed by an explanation of each feature or capability and its significance in terms of the fundamental mobile device challenges faced by IT professionals: management, control, maintenance, device and communication security, scalability, and support. An appendix explains the methodology and ratings used to create the comparison matrix, and offers a suggestion for weighting the results to fit your organization s specific needs. 1 1 As noted in the appendix, the comparison was executed by exercising the management interface to check the availability of various functions; performance was not tested. 1

4 About Microsoft System Center Mobile Device Manager Microsoft System Center Mobile Device Manager () is a robust and cost-effective solution that can be seamlessly deployed into an enterprise s existing Microsoft infrastructure and addresses in a comprehensive fashion the three core requirements of IT professionals: security management, device management, and security-enhanced connectivity. 2 s ability to utilize Active Directory (AD) not only eases management by giving administrators a single point and common interface from which to manage both personal computers and mobile devices, but provides increased security by enabling them to more easily apply security capabilities such as Public Key Infrastructure and permissions-based access to resources. Administrators can use the familiar Windows Server Update Services (WSUS) platform to deploy software to mobile devices and easily monitor compliance, while AD s Group Policy Objects functionality greatly eases the task of creating, enforcing, and monitoring policies on mobile devices. s IPSec-based Mobile VPN helps protect sensitive data, and when transmitting already-encrypted SSL traffic, the resulting double-envelope security offers enhanced protection of critical corporate data. Comparison Matrix Legend Functionality Not Available Limited Functionality Average/ Functionality Extensive Functionality Managing Devices and Users Group Assignment via Active Directory Device Membership in Active Directory Policy Based Management and Configuration Number of Policies RSoP Data Encryption Services OTA/Network Encryption 2 For a detailed examination of the ROI and TCO benefits of System Center Mobile Device Manager, please refer to the ROI and TCO analysis tools at or the white papers available at 2

5 Mobile VPN GMC 3 On-Device Encryption Encrypt Specific Files/Locations Storage Card (SDIO) Encryption Lockdown Wi-Fi Infrared Camera SMS/MMS Storage Card (SDIO) Phone Disable IP Modem/Tether Disable IMAP/POP Restrict Cable Sync Bluetooth Lockdown Restrict Radio Restrict Profiles Restrict Pairing/Discoverable Application and Data Distribution/Management Restrict to device features set Time based distribution Reporting of deployment Create custom action scripts Application Allow/Deny Block Unsigned Application Install Block Third-party Downloads LOB Application Data Push/Alert GMC 4 3 Available only with the additional Mobile Connection (GMC) module and licensing (See page 1). 4 Available only with the additional Mobile Connection (GMC) module and licensing (See page 1). 3

6 Asset Tracking, Logging, and Reporting Software and Hardware Inventory Via log files Via Administration UI Collect log information from device MOM/SNMP Firmware Update Management OTA OS Update Push Cable Firmware Update Update Targeting Help Desk and Troubleshooting Help Desk and Administrative Console Role-Based Administration Device remote control OTA Provisioning and Bootstrapping Bulk Provisioning Self Service Self Enrollment Self Service Portal Server Management Breadth of Device Platform Support Hostability Managing Devices and Users Provisioning devices and enforcing policies are fundamental activities for mobile device management. How a mobile management solution handles user and device groups, and the extent of the policies it offers, can have a big impact on manageability, scalability, and security. Group Assignment via Active Directory Many mobile management solutions offer group management; however these groups are created and managed within the middleware platform themselves, so that in organizations using Microsoft Active Directory or another enterprise directory, membership must be maintained in two locations, resulting in an increased management burden. An mobile management solution whose policies and provisioning are based on Active Directory (AD) groups gives administrators the ability to target groups of devices based on AD Group Policy Objects (GPOs), using the same 4

7 interface and procedures as for desktop management. This not only simplifies management but improves scalability. Managing Devices and Users Group Assignment via Active Directory allows targeting of policies through Active Directory using a common interface, Group Policy Objects (GPO). Through GPO, administrators can assign customized policies for groups of mobile phones and assign those policies to an organization unit (OU) within Active Directory. This provides an easier transition between desktop computer and mobile device management. Rather than use existing groups in AD, uses its own group hierarchy for policy, software deployment, and device management. These groups are created using the Blackberry Manager console and stored in the configuration database native to. While this allows for simple bulk provisioning and management, it is a separate group that must be created, managed, and documented. Rather than use existing groups in AD, uses its own group hierarchy for policy, software deployment, and device management. These groups are created in the Management Console and stored on the server. Groups used in are designed for software deployment and device management. While these groups are easy to assign and manage policy for, they also present extra administrative effort to maintain and create groups outside of AD. Device Membership in Active Directory Device membership in Active Directory allows for device targeting in addition to user targeting. This allows administrators to assign policy based on either the user s membership or the device membership within Active Directory. Other device management products maintain a separate user database and only allow for user based targeting. Managing Devices and Users Device Membership in Active Directory Device membership in Active Directory allows targeting and management of the device as if it was a computer object on the domain. This helps IT professionals manage devices with common interfaces such as Group Policy Objects and the Active Directory Users and Computers console with little additional training. 5

8 enables management of mobile devices using Active Directory In addition, device membership in Active Directory enables administrators to improve mobile device security using several security capabilities, including Public Key Infrastructure (PKI), GPO assignment, and permissions-based access to resources and internal websites. This promotes communications security, protects corporate resources, and simplifies security management. When adding users to initially, the Global Address List (GAL) is displayed to allow administrators to select users who have mailboxes accessible by the server. After adding a user, the entry is made in the configuration database but is not housed in Active Directory. Only limited information regarding BlackBerry service is stored in the user s Exchange mailbox (e.g., PIN number, encryption key, and hosting server name). also uses the GAL to initially find user mailboxes for account association. However, like, will only create an account locally on the server. Information is not associated to AD accounts outside of mailbox access. Policy Based Management and Configuration Device management and software configurations may be assigned and managed via policies. These policies, in many cases, can be assigned to either individuals or groups. Policies are an effective way to lock down a mobile environment, but figuring out the effect of those policies on a specific user or device can be difficult. While many mobile management solutions can report a policy that is effective for a user, the settings for that policy may not be easily viewable. Managing Devices and Users Policy Based Management and Configuration Number of Policies RSoP Data Policies used in are assigned using Group Policy Objects (GPO). Because GPO is the underlying mechanism of device management, administrators can quickly determine the effect of 6

9 policies on a specific user or device (or groups of them) using Resultant Set of Policies (RSoP). While does not have as many policies as, key policies are furnished to help alleviate the mobile security concerns of many organizations. Active Directory furnishes powerful tools for managing mobile device policies RIM has an extensive set of policies for device management and PIM synchronization, which are managed via the BlackBerry Domain, a collection of servers that share a common database. These policies may be created for either groups or individuals, but reporting of the policies in effect per user is not available. While its policy set is not as extensive as that of, does offer some of the more widelydesired device management policies. These policies are managed by user groups and can be assigned to a group with only one individual member if necessary. Policies available for groups are divided into six categories: Password, Options, Sync Control, OTA, Applications, and Data. OTA/Network Encryption and Mobile VPN The type and strength of over-the-air (OTA) encryption offered by a mobile management solution is an important factor in its ability to provide secure remote access. While some platforms allow administrators to choose an encryption method or key size, others simply enforce a standard level of encryption or none at all. In addition, when considering mobile VPN, it is important to distinguish between two kinds of VPN connectivity offered by mobile management solutions. VPN that grants devices membership in the corporate network (like desktops and laptops) offers 7

10 greater access to internal resources. By comparison, the more usual proxied VPN tunnel limits the range of internal resources mobile devices can access. Encryption Services OTA/Network Encryption Mobile VPN GMC uses Active Directory to grant devices membership in the corporate network domain, with connectivity over a mobile VPN. This helps to protect sensitive data and gives secured access to the intranet, , PIM, and line of business applications. Devices enrolled with negotiate a unique key for security-enhanced communications using an IPSec tunnel. All communications, including intranet, , PIM, and line of business application data must travel through this IPSec tunnel between the corporate network and the device. There are no points of decryption between the mobile device and the Gateway Server (corporate network). By encapsulating Microsoft Exchange already encrypted via SSL, s Mobile VPN IPSec tunnel offers the additional protection of double-envelope security. Developers can use the.net Framework to create applications that run securely on the handheld, or to integrate existing back-end applications into a mobile environment. Many applications, such as Microsoft Dynamics CRM, already possess such integration. offers the choice of 3DES or AES at 128, 192 and 256-bit key length for data encryption. offers only proxied VPN. The Blackberry Enterprise Server acts as a secure proxy to mobile devices, so they are not part of the corporate network and have limited access to the corporate intranet and applications. Users can access , PIM data, and web-services based application via the Blackberry Browser. Developers may use the Blackberry Mobile Data System (MDS) application development framework to create or integrate applications to communicate with devices through the proxy service, which creates an outbound-initiated secure connection. To create the encrypted tunnel between the proxy server and devices, can use either of two encryption methods: 3DES and AES. Devices with software version 4.0 or higher can communicate with AES encryption, while older devices can only encrypt and decrypt using 3DES. By design, uses two-key 112-bit 3DES encryption and 256-bit AES encryption. If both 3DES and AES are selected, the will negotiate the highest available encryption method (AES) based on device compatibility. offers only proxied VPN. Like, all communications from devices are proxied through servers via an encrypted tunnel using a 192-bit AES encryption key. The encryption method cannot be changed, and is universal for all handhelds. The key is generated based on the OTA activation pin assigned to a user account. Once the software is installed on a handheld, the PIN is entered by a user to initiate activation. The first step in this activation process is the generation of the AES key by the Management Console, which is sent to the device via SSL. 8

11 The offering compared here, Mobile Messaging, does not offer any access to internal resources other than and PIM data. However, an optional module requiring additional licenses, called Mobile Connection (GMC), will allow the client to access intranet sites and other back-end data through a proxy. Developers can use Java or.net for integration and application development. On Device and File Encryption Even if communications between a mobile device and corporate servers are protected by encryption, important data stored on the device can be compromised if it is lost or stolen. To help alleviate this concern, many newer mobile management solutions offer the option for administrators to enforce on-device encryption to help safeguard files and data stored on mobile devices. While this improves security, it can adversely affect device performance. Some solutions require the entire device to be encrypted; others permit encryption of individual files, directories, or databases. The latter capability is important if the encryption methods available have a performance impact. It is also important that administrators be able to enforce encryption on files stored on expansion memory (storage) such as SD Cards, Micro SD cards, and compact flash. This avoids the possibility that an unauthorized or unintended user might bypass the device password by removing the card. Encryption Services On-Device Encryption Encrypt Specific Files/Locations Storage Card (SDIO) Encryption On-device encryption can be easily handled for Windows Mobile devices enrolled with a device management server by enabling AES encryption for all data stored on the device. Using AES encryption provides maximum protection, but unlike ECC encryption used on newer RIM devices, AES encryption may degrade performance of the device slightly while data is being decrypted for access. This can be alleviated by encrypting only critical files or locations as specified by an administrator. Storage cards may also be encrypted using AES encryption to further safeguard sensitive data. When users add files to an encrypted storage card with, the files are not decrypted when encryption is turned off. Users must individually open each file after encryption is turned off in order to decrypt them. Files may still be written to the card by other devices but will not be encrypted. While allows the entire device to be encrypted, it does not allow administrators to choose individual files or locations to encrypt while the remainder of the device remains unprotected. Devices with 4.1 device software and earlier used a 256-bit AES key to encrypt data. While this key offers strong protection for data, it increased access times to stored data and degraded device 9

12 performance. In device software version 4.2, RIM changed the encryption key to a selectable 160- bit, 283-bit, or 571-bit elliptical curve cryptology (ECC) key, which offers better performance. Users are prompted with Strong, Stronger, and Strongest to select the key size. Administrators may also force one of these 3 key sizes via policy. Administrators may also enforce encryption for data stored on external memory cards, protected by a user password, the BlackBerry device key, or both. This setting determines the key used to encrypt data on the card. Files may still be written to the card by other devices but will not be encrypted. The client application can enforce 256-bit AES encryption on both specific folders and databases on the device, which may be specified from the server administration console. While this adds additional security, it does not provide protection for all data located on the device, since there are other locations for data that cannot be protected using the management interface. Administrators may also require data stored on external memory to be encrypted as well, using a user-specified password. Any existing data on the card must be erased before applying encryption. creates a file on the memory card and mounts it as a separate disk volume on the handheld. The file created consumes the entire amount of storage space on the card; thus, the card cannot be used to store unencrypted data from another device. Lockdown Most mobile devices have features, such as tethering, third-party services, and cameras that may not be desirable to an organization. Rather than force employees onto different devices, at a potential loss of other capabilities, lockdown polices can restrict the use of these features. This can improve security and reduce the help desk burden, as well as simplifying maintenance and management. Lockdown Wi-Fi Infrared Camera SMS/MMS Storage Card (SDIO) Phone Disable IP Modem/Tether Disable IMAP/POP Restrict Cable Sync 10

13 Bluetooth Lockdown Bluetooth s short range communications services allow mobile devices to extend the office experience. Devices such as printers, keyboards, headsets, and even automobiles can connect to mobile devices for services, raising additional concerns about security. Mobile management solutions help to alleviate this concern by offering lockdown policies for the Bluetooth radio and/or profiles related to Bluetooth services. Bluetooth Restrict Radio Restrict Profiles Restrict Pairing/Discoverable Policies may be enabled on to completely disable the Bluetooth radio, or block specific profiles. However, to block a profile, administrators must know the Universal Unique Identifier (UUID) of that specific profile. In other device management platforms, the profiles are given in a dropdown list. While the use of UUID s allows administrators to be more flexible in blocking Bluetooth profiles, it can be more difficult to set up the policy initially. It is not possible to restrict discovery or pairing. The most robust middleware platform for Bluetooth security, allows administrators to restrict specific service profiles such as serial, hands-free, or headset. also allows disabling discoverability or pairing with devices, and can even require a password to enable Bluetooth on the device. Newer BlackBerry devices are capable of Bluetooth tethering for IP modem connections; this feature can be disabled using a policy. will allow administrators to disable Bluetooth completely. Alternatively, administrators may restrict discoverability on devices to allow the pairing of a headset with the phone while ensuring that other devices will not be able to pair unless the device detects them first. Application and Data Distribution/Management Many mobile applications on the market can be deployed wirelessly to devices. This includes third-party applications and custom applications developed in-house by organizations. Users may also install applications via cable or connection to a website. The ability to manage deployments efficiently, as well as to block user installation of undesirable applications, are important for lowering the IT and help desk burden of mobile device management. 11

14 Application and Data Distribution/Management Restrict to device features set Time-based distribution Reporting of deployment Create custom action scripts Application Allow/Deny Block Unsigned Application Install Block Third-party Downloads Using enables administrators to create custom software deployment packages for mobile devices. Once these packages are created, administrators may deploy them by targeting the device group, or target based on existing hardware on the device. WSUS offers extensive reporting capabilities that allow administrators to monitor deployment to devices using filters to specify the range of devices and updates desired. WSUS allows extensive update report customization can prevent users from using applications supplied with the mobile device, or the installation of unsigned applications. It cannot prevent the installation of signed third-party applications. Applications can be pushed from the using software configurations. These software configurations require the installation files be copied and indexed on the directly. After indexing the files, administrators can build software configurations and apply custom software policies to the configuration. These policies can override handset settings to give applications access to GPS radios, keyboard application programming interfaces (API), or the phone. Once assigned, applications are deployed to devices every four hours (time-based distribution). This application polling interval can be overridden in the registry as a static entry if desired. However, changing this registry setting will affect all users on the server. Service Pack 4 for version 4.1 allows administrators to deploy applications immediately and bypass the four-hour timer. 12

15 Reporting on application deployment is provided via a status block in the user status pane of the administration console, but does not offer the extensive filtering capabilities found in. can also disallow specific applications from being installed on the device. However in order to achieve this, administrators must first copy and index the installation files on the directly and create a software configuration with a policy set to disallow the installation. A policy also exists to block third-party application downloads. Applications may be pushed from the server by administrators, with deployment managed through user groups. Applications can be inherited from the default All Users group or applied directly to a group. If an administrator wishes to deploy custom software to mobile devices, the software is uploaded to the NOC for hosting. A URL and GUID are then assigned to the software to identify it back to the server it was uploaded from, and made available to handhelds. By default, users are reminded to install software three times in a 24 hour period. Administrators can override this to a custom setting or force mandatory installations. Administrators may also disallow applications from being run on the handheld. However, in version 5, administrators may only disallow native applications. These native applications include pictures & video, solitaire, and ActiveSync on Windows Mobile devices. LOB Application Data Push/Alert In addition to deploying software, some platforms have the capability to automatically push application data to handhelds. This gives mobile devices access to up-to-date information from back-end systems such as SAP, CRM, or other database or web service-driven applications in the organization, simplifying management and improving scalability. LOB Application Data Push/Alert GMC does not support push data alerts for internal applications. supports push alerts for application data using a listener port on that will send data to the mobile application when data is updated. also supports the ability to create web-based application alerts using a browser push channel. This alert changes the appearance of the deviceside icon when information on the web site is updated. Applications developed using the Blackberry Mobile Device System (MDS) framework can also push data to devices. With the addition of Mobile Connection (GMC), the platform can send push alerts to users as internal application data changes. Asset Tracking, Logging, and Reporting Asset tracking can be difficult with a mobile infrastructure. Being able to log and report on deployed hardware and software configurations is fundamental to mobile device management, 13

16 especially when planning upgrades or future deployments. Keeping track of device upgrades, swaps, mobile phone numbers, and serial numbers/unique identifiers simplifies management and maintenance and improves scalability. Logging of user activities can also be useful for improving security. Asset Tracking, Logging, and Reporting Software and Hardware Inventory Via log files Via Administration UI Collect log information from device MOM/SNMP offers a robust set of data reported back from mobile devices that can enable administrators to plan future deployments. This data includes platform version, installed software, and installed hardware. may also be coupled with Microsoft Operations Manager (MOM) to capture Simple Network Monitoring Protocol (SNMP) traps from the servers to provide proactive troubleshooting of server issues. Device management data is stored entirely in SQL, enabling the generation of custom reports using any SQL reporting tools. Reports exported from show some data exported into a comma separated value (CSV) format: user name, mailbox path, mobile phone number, PIN number, handheld model, and software version. Data extracted from this export can be used to reconcile wireless bills or track assets. Additional data may be shown in the administration console. This data includes a detailed list of applications, ESN/IMEI serial numbers, hardware capabilities, free/available memory, and active carrier, which may be extracted from the configuration database using custom SQL scripts. Logging for is also available through log files located in the installation directory (by default) and named according to the service related to the log. Although they are cryptic, the log files provide very detailed information on user activity. Log levels and location may be changed by administrators. Support for MOM/SNMP is available via third-party applications. s reports, exported as a CSV file, show data similar to that available from, including user name, device serial number, handheld ID/platform, mobile phone number, network ID/carrier, and mailbox path. The data can also be viewed in the administration console, where additional information may be displayed, such as handheld state and software version numbers. No software inventory is available on outside of reporting software assignment groups. Log files for are housed in the installation directory. These log files are very cryptic and in a proprietary format. Logs can be easily uploaded to technical support from the administration UI. 14

17 Firmware and Update Management Firmware and operating system updates are an important part of mobile device management. Just as with desktop and laptop computers, updates can improve security by protecting against the latest virus threats, which are increasingly a concern for mobile devices. As well, such updates may be able to add new features to existing mobile devices, such as direct push , wireless reconciliation, PIM synchronization, and IP modem support. This simplifies maintenance and preserves an organization s investment in their mobile infrastructure. Firmware Update Management OTA OS Update Push Cable Firmware Update Update Targeting itself does not offer over-the-air firmware or OS updates. Critical security fixes related to Microsoft software are provided by Windows Update for Windows Mobile in coordination with the device manufacturers and the Microsoft Security Response Center. Patches not related to security issues are provided by the mobile operator, and can be delivered to a Windows Mobile 6 device via the mobile operator s device management server. Windows Mobile fully supports the Firmware Over-The-Air OMA-DM standard. does not support over-the-air firmware updates, but does offer device updates via USB cable from either the BlackBerry Desktop Manager or the BlackBerry Manager administration console. While does not offer over-the-air device firmware or OS updates, it can keep the client software updated via the administration console. When a new client software version becomes available, administrators may select the new version for automatic deployment. New client software may also be targeted based on device platform. Help Desk and Troubleshooting Not just users but administrators are becoming more mobile, so remote management of mobile devices is a desirable feature, and can improve scalability. Many mobile management solutions offer the ability to lock down the administration console with a password (other than that of a user login) and assign role-based administrative control. This enables help desk personnel to install the administration console on remote computers for decentralized administration. Some mobile management solutions may also offer web-based administration to overcome concerns about security and limited administrative access. 15

18 Robust Helpdesk and Troubleshooting Functionality Helpdesk and Administrative Console Role-Based Administration Device remote control OTA Provisioning and Bootstrapping Bulk Provisioning Role-based administration for is controlled via groups in Active Directory. This allows administrators to use the same interface for administrator permissions as found in device policy, thus simplifying management. By contrast, in and IMS, roles are defined and customized directly from the administration console. Administrators or help desk personnel requiring access to a can do so by using a local installation of BlackBerry Manager. This installation connects to the configuration database used to host the environment and uses the login account of the administrator or help desk representative to determine the amount of administrative access. Security administrators can set several pre-defined levels of access based on role. The lowest role available has access to troubleshooting features, but cannot add or remove users and licensing. Using groups, junior and senior administrators can provision activation passwords for users in bulk. This allows for deployment of devices to entire teams with minimal administrative effort. allows service administrators to assign custom or pre-set roles to help desk or audit administrators, who can install the administrative console on their desktop to access the system. Windows logon credentials are passed to the server to authenticate roles for administrators. Users can be added to the administration console in bulk, automatically generating an activation for each user. Self Service Allowing users to provision themselves can help reduce the call volume to help desk personnel. Mobile management solutions can extend this level of self service with a web portal that allows users to provision devices without IT involvement. Self Service Capabilities Self Enrollment Self Service Portal 16

19 The self service portal that may be optionally installed with allows users to enroll their own devices, perform remote wipes if the device is lost or stolen, and even reset their PIN. This helps users quickly disable a device when they believe it to be lost or stolen, and reactivate a device they receive from IT without an additional support call. With BlackBerry Administration Server, administrators may install the Web Desktop Manager to allow users to set their own Enterprise Activation password for provisioning. This web portal also allows users to access all of the features of BlackBerry Desktop Manager software, providing they have installed the required files as prompted on their first visit to the site. Users must first be added to a before they are able to log in to the Web Desktop Manager site. does not offer a self-service portal. 17

20 Appendix Methodology The products were installed on servers in accordance with their specified system requirements, so that the management interface could be fully exercised. Performance was not tested; the goal was to understand the functionality of each product s feature set in the following nine important areas of mobile device management: Managing Devices and Users Provisioning devices and enforcing policies are fundamental activities for mobile device management. How a mobile management solution handles user and device groups, and the extent of the policies it offers, can have a big impact on manageability, scalability, and security. Encryption Services Encryption is necessary both for secure remote access to corporate data and applications (mobile VPN) and to protect data on the device itself in case of loss or theft. The type of encryption used can have an impact on performance. Mobile VPN This may not be necessary (may be included in Encryption Services above, TBD) Lockdown The ability to disable various features on mobile devices (e.g., Bluetooth, tethering, or third-party services) improves security, expands the range of devices that can be supported, and eases management and maintenance. Application and Data Distribution It is important for a mobile management solution to make the process of pushing applications or data out to mobile devices as easy and flexible as possible. In addition, the ability to control what applications users may install on a mobile device improves security, reduces the help desk burden, and eases management and maintenance. Asset Tracking, Logging, and Reporting Being able to log and report on deployed hardware and software configurations is fundamental to mobile device management, especially when planning upgrades or future deployments. Logging of user activities can also be useful for improving security. Firmware Update Management The ability to update a mobile device s operating system and feature set is not only critical for security, but helps preserve an organization s hardware investment. Helpdesk and Troubleshooting Not just users but administrators are becoming more mobile, so remote management of mobile devices is a desirable feature, and can improve scalability. Role-based administration adds flexibility. 18

21 Self Service Allowing users to perform a limited set of provisioning operations can reduce the IT management and helpdesk burden. Ratings For each product, its functionality for each capability was rated with one of four ratings. Functionality Not Available: the product does not offer the functionality needed to support this feature or capability Limited Functionality: the product supplies some of the functionality needed to support this capability Average/ Functionality: the product supplies most of the functionality needed to support this capability Extensive Functionality: the product supplies extensive functionality in support of this capability Although a weighted-average weighting method is generally more useful, the weightings depend on the specific needs of an organization, so these un-weighted ratings are offered as a starting point. By assigning a point value to each rating level, and then weighting each feature within a set of features (e.g., Lockdown) in accordance with its importance to your organization, you may obtain a clearer sense of how each of the solutions review here matches your needs. 19

22 The information contained in this white paper represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property of Microsoft. Unless otherwise noted, the example companies, organizations, products, domain names, addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place or event is intended or should be inferred Microsoft Corporation. All rights reserved. Microsoft Active Directory, Operations Manager, System Center Mobile Device Management, and Windows System Update Services are trademarks of the Microsoft group of companies. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. 20

A Technical White Paper

A Technical White Paper A Technical White Paper An Introduction for Technical Audiences Abstract This white paper provides an overview of Microsoft System Center Mobile Device Manager 2008, an end-to-end solution for provisioning,

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

User Self-Service Configuration Overview

User Self-Service Configuration Overview User Self-Service Configuration Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation

More information

An Introduction for Business Audiences

An Introduction for Business Audiences An Introduction for Business Audiences An Introduction for Business Audiences Executive Summary A growing number of companies are making mobile workforce enablement a business priority. Yet giving mobile

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Feature and Technical

Feature and Technical BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

The Encryption Anywhere Data Protection Platform

The Encryption Anywhere Data Protection Platform The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,

More information

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

BlackBerry Enterprise Solution v4.1 For Microsoft Exchange Life is now

BlackBerry Enterprise Solution v4.1 For Microsoft Exchange Life is now BlackBerry Enterprise Solution v4.1 For Microsoft Exchange Life is now EXTENDING EXCHANGE WITH SECURE WIRELESS SOLUTIONS BlackBerry Enterprise Server software integrates with Microsoft Exchange and your

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson

How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

Administration Guide. Wireless software upgrades

Administration Guide. Wireless software upgrades Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents

More information

Good for Enterprise Good Dynamics

Good for Enterprise Good Dynamics Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

ø Mobile E-mail Solutions

ø Mobile E-mail Solutions ø Mobile E-mail Solutions An O2 White Paper Contents 1. Executive Summary.................................................4 2. Introduction........................................................5 3.

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Desktop Authority vs. Group Policy Preferences

Desktop Authority vs. Group Policy Preferences Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft

More information

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International

More information

CA Mobile Device Management 2014 Q1 Getting Started

CA Mobile Device Management 2014 Q1 Getting Started CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Administration Guide Published: 2010-06-16 SWDT487521-1041691-0616023638-001 Contents 1 Overview: BlackBerry Enterprise

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P: 222.333.4444 Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444 Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication...

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0

Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Step-by-Step Guide for Microsoft Advanced Group Policy Management 4.0 Microsoft Corporation Published: September 2009 Abstract This step-by-step guide describes a sample scenario for installing Microsoft

More information

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner

More information

Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS

Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS Lab Manual Expediting WSUS Service for XP Embedded OS Summary In this lab, you will learn how to deploy the security update to your XP Pro or XP embedded images. You will also learn how to prepare the

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

White Paper. Software version: 5.0 www.wmsoftware.com

White Paper. Software version: 5.0 www.wmsoftware.com Safe AutoLogon Password Server Using Safe AutoLogon Password Server to manage Safe AutoLogon clients for seamless and centrally managed automatic logons White Paper Software version: 5.0 www.wmsoftware.com

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

McAfee Enterprise Mobility Management

McAfee Enterprise Mobility Management McAfee Enterprise Mobility Management Providing mobile application enablement and HIPAA security compliance Table of Contents HIPAA and ephi 3 Overview of 3 HIPAA Compliance for Remote Access 4 Table 1.

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

WINDOWS 7 & HOMEGROUP

WINDOWS 7 & HOMEGROUP WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager. Published: 07 March 2013

Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager. Published: 07 March 2013 Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager Published: 07 March 2013 Copyright Information in this document, including URL and other Internet Web site references,

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Security White Paper The Goverlan Solution

Security White Paper The Goverlan Solution Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful

More information

Enterprise Reporter Report Library

Enterprise Reporter Report Library Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports

More information

Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook 205 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook Learn how to use sales lead management with Pipeliner MS Outlook Add-In. CONTENT. Setting up Pipeliner Add-In

More information

Technical Overview of Terminal Services

Technical Overview of Terminal Services Technical Overview of Terminal Services Microsoft Corporation Updated: January 2005 Abstract Windows Server 2003 includes the Terminal Services features of Windows 2000, the client and protocol enhancements

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

PMDP is simple to set up, start using, and maintain

PMDP is simple to set up, start using, and maintain Product Datasheet IBELEM, SA ITS Group - 5, boulevard des Bouvets 92741 Nanterre Cedex - FRANCE Tel: +33(0)1.55.17.45.75 Fax: +33(0)1.73.72.34.08 - www.ibelem.com - info@ibelem.com PMDP is simple to set

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

Pipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking 05 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking Learn how to set up Sales Target with Pipeliner Sales CRM Application. CONTENT. Setting up Sales Dynamic Target

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Technical Brief for Windows Home Server Remote Access

Technical Brief for Windows Home Server Remote Access Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality

More information

White Paper. Security: Cortado Corporate Server for BlackBerry. Information on the Cortado infrastructure and Bluetooth printing

White Paper. Security: Cortado Corporate Server for BlackBerry. Information on the Cortado infrastructure and Bluetooth printing White Paper Security: Cortado Corporate Server for BlackBerry Information on the Cortado infrastructure and Bluetooth printing This white paper provides information about the security of BlackBerry and

More information

iphone in Business How-To Setup Guide for Users

iphone in Business How-To Setup Guide for Users iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

User Self-Administration

User Self-Administration www.novell.com/documentation User Self-Administration ZENworks Mobile Management 2.6.x January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use

More information

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Avalanche Enabler 5.3 User Guide

Avalanche Enabler 5.3 User Guide Avalanche Enabler 5.3 User Guide 30/05/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095 Telephone:

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment peria TM in Business Mobile Device Management Read about how peria TM devices can be administered in a corporate IT environment Device management clients March 2015 Exchange ActiveSync The my peria service

More information

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

Windows Phone 8.1 Mobile Device Management Overview

Windows Phone 8.1 Mobile Device Management Overview Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Microsoft Windows Server System White Paper

Microsoft Windows Server System White Paper Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta

More information

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...

More information

Zenprise Device Manager 6.1.5

Zenprise Device Manager 6.1.5 Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in

More information