SAS Mobile BI Security and the Mobile Device
|
|
- Dorothy Owens
- 8 years ago
- Views:
Transcription
1 SAS Mobile BI Security and the Mobile Device Version 1.0 April 24, 2015
2 Contents Introduction...1 Security Features Provided by SAS Mobile BI and SAS Visual Analytics...2 Introduction... 2 Lock the SAS Mobile BI App with a Passcode... 2 What Is It?... 2 The Lock Out and the Wipe Out... 2 How to Engage the Passcode Feature... 2 Use Whitelists and Blacklists to Enable or Prevent Access... 3 What Is It?... 3 How to Engage the Whitelist or Blacklist Features... 3 Keep Report Data Remote to Prevent Offline Access... 4 What Is It?... 4 How Does Remote Data Work?... 4 How to Engage the Remote Report Data Feature... 4 Use a Time-out Setting to Prevent Access... 4 What Is It?... 4 How to Engage the Offline Access Time-Out Feature... 4 Encrypt Reports and Data... 5 What Is It?... 5 ios Encryption... 5 Android Encryption... 5 Explore More Security Options...6 References...7
3 Introduction Viewing your organization s reports on a mobile device can be extremely powerful as well as convenient. However, mobile devices come with security concerns. By using features provided by SAS Mobile BI and SAS Visual Analytics, as well as features supplied by the mobile device, your organization can secure its reports and data and confidently use mobile devices.
4 Security Features Provided by SAS Mobile BI and SAS Visual Analytics Introduction To secure reports and data that you view on your mobile devices, you can implement the following features: Passcode: Use an app passcode to lock the SAS Mobile BI app. Whitelists and blacklists: Add your device to a list to enable or prevent access. Remote data: Prevent offline viewing of reports by requiring a network connection to access remote data. Time-out: Limit offline access by enforcing a time limit. Report encryption: Encrypt data that is stored on the device. Lock the SAS Mobile BI App with a Passcode What Is It? The passcode feature locks the SAS Mobile BI app. This feature is separate from and in addition to the passcode feature that is provided by mobile devices. There are two types of app passcodes: required and optional. A required passcode is a passcode that is required by a server connection. When the app first connects to the affected server, the app requires that you create a passcode. Then, whenever you open the app or view a report that is associated with that server, you must enter the passcode. An optional passcode is a passcode that you can choose to use to lock the app. The passcode is not required to access a server connection. You can disable the passcode at any time. Note that the Android version of SAS Mobile BI does not support the optional passcode. The Lock Out and the Wipe Out Your passcode should be known only to you. If you lose your mobile device, no one else should be able to guess your passcode and use it to open the app. If you (or another person) provide an incorrect passcode a specific number of times, the app locks itself for a length of time. You can enter your passcode again after the lock-out expires. If, after the lock-out expires, you provide an incorrect passcode a specific number of times again, the app removes all SAS BI reports, data, and server connections from your device. The app is reset to its default settings. If you forget your passcode, you must delete and reinstall the app on your device. Doing so deletes the reports and data. How to Engage the Passcode Feature Required passcodes are set by the SAS Visual Analytics administrator. Optional passcodes are set by the app user. For information about how to set an optional passcode, see the Help in the SAS Mobile BI app.
5 To set a required passcode, the SAS Visual Analytics administrator assigns users or groups to a role that has the Require Passcode on Mobile Devices capability. To customize the lock-out and wipe-out behavior, the administrator uses the following Transport Service properties: viewerservices.passcode.timeout: Specifies, in minutes, how frequently a user must re-enter his or her passcode in SAS Mobile BI. The default is 15. viewerservices.passcode.attempts: Limits the number of sequential, failed attempts to enter a passcode for SAS Mobile BI. The default is 5. If a user reaches the limit, the user is locked out of the app for 15 minutes. After the lockout interval, the user can again attempt to enter his or her passcode. If the user reaches the limit again, all custom content (data, reports, settings, and connection information) is removed from the mobile device. For more information about the capability and properties, see SAS 9.4 Intelligence Platform: Middle-Tier Administration Guide. Use Whitelists and Blacklists to Enable or Prevent Access What Is It? The whitelist manages the devices that can use the SAS Mobile BI app. A device must be on the whitelist in order to use SAS Mobile BI. The whitelist affects devices, not users. If a device is lost, a SAS Visual Analytics administrator can remove the device from the whitelist and therefore prevent access to the reports and data. The blacklist manages the devices that cannot use the SAS Mobile BI app. All devices can use SAS Mobile BI except those that are on the blacklist. The blacklist affects devices, not users. If a device is lost, a SAS Visual Analytics administrator can add the device to the blacklist and therefore prevent access to the reports and data. The whitelist manages by inclusion and the blacklist manages by exclusion. How to Engage the Whitelist or Blacklist Features In SAS Visual Analytics, an administrator can manage mobile devices. The administrator uses the mobile device ID to assign the device to the whitelist or blacklist. While an administrator can maintain both a whitelist and a blacklist, only one list can be enforced in a deployment at any time. The blacklist is the default. To enforce the whitelist instead, open SAS Visual Analytics Administrator. Select Tools > Manage Devices. The Mobile Devices page opens. At the top of the page, in the Enforced list, select Whitelist. To perform these tasks, the administrator must have the Manage Mobile Devices capability in addition to the Manage Environment capability. For more information about the managing mobile devices by using a blacklist or whitelist, see SAS 9.4 Intelligence Platform: Middle-Tier Administration Guide.
6 Keep Report Data Remote to Prevent Offline Access What Is It? When you subscribe to a report, it appears in the portfolio in SAS Mobile BI. However, depending on the security assigned to your user ID, the report data might not exist on your device. Report data can be local or remote: Local data is stored on your device. Remote data exists on your device only while the report is open and the device is connected to a Wi-Fi or cellular network. If a report uses remote data, the report thumbnail in the portfolio displays the cloud icon:. You might see this feature called tethering or live connection. How Does Remote Data Work? Each time you open a report with remote data, the app connects to the server. The Prepare Data notification is displayed while the data is downloaded. The report opens when the data is available on the device. The data is available only while you view the report. After you close the report, the data is removed from the device. The thumbnail image on the report in the portfolio no longer appears. If you are not connected to a network and you try to open the report, it does not open. How to Engage the Remote Report Data Feature To prevent offline access to mobile data on a server, the SAS Visual Analytics administrator assigns users or groups to a role that has the Purge Mobile Report Data capability. This capability affects the user ID that you use to access the server, not the server or its data. When this capability is set and you access the server via SAS Mobile BI using that user ID, all reports on that server use the remote report data feature. Use a Time-out Setting to Prevent Access What Is It? If a user has been offline for a specified number of days, he or she must sign in to the SAS Mobile BI app. For example, if the user attempts to browse reports in the library or open a report in the report viewer, the app requires that the user enter the password for the affected server connection. If the user fails to sign in, then the app no longer downloads reports, updates subscribed reports, or opens reports for viewing. This feature is not only useful when the device is missing. It also provides security when the employee leaves the organization but keeps the device. The blacklist and whitelist features require that the device access the server before the list can look up the device to deny or permit access. The offline access timeout feature denies access by checking the employee s credentials, which the IT organization revokes when the employee leaves the organization. How to Engage the Offline Access Time-Out Feature To enforce a time limit for offline access, the SAS Visual Analytics administrator assigns users or groups to a role that has the Limit Duration of Offline Access capability.
7 To customize the time limit, the administrator uses the Transport Service viewerservices.offline.limit.days property. The default is 15 days. For more information about the capability and property, see SAS 9.4 Intelligence Platform: Middle-Tier Administration Guide. Encrypt Reports and Data What Is It? The operating system on the mobile device encrypts the content on the device. SAS Mobile BI reports and data are encrypted with the rest of the contents on the device. ios Encryption The ios operating system uses AES 256 encryption. For more information, see the ios Security document available at: Android Encryption On Android devices, users can control whether their data is encrypted by using the device settings. The default encryption setting varies by manufacturer. On the Nexus 6 and Nexus 9 devices encryption is enabled by default. On other Android devices that are supported by the SAS Mobile BI app encryption is disabled by default. To enable the encryption, see the documentation for the device. The encryption used on Android devices is described in the article available at:
8 Explore More Security Options An organization and its IT department can require the use of the following technologies to increase mobile device security: Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. (SAS Mobile BI uses SSL to transfer data and reports.) Review the network configuration for your organization. Virtual Private Network (VPN) applications. Mobile Device Management (MDM) technology such as Good Technology and Mocana. See these companies web sites for more information. Mobile devices that use fingerprint recognition (Touch ID) or other biometric technology. See the specifications for the mobile devices that your organization supports. Device passcodes. See the specifications for the mobile devices that your organization supports.
9 References Park, Heesun Advanced Security Configuration Options for SAS 9.4 Web Applications and Mobile Devices. Proceedings of the SAS Global Forum 2014 Conference. Cary, NC: SAS Institute Inc. Available at: Redpath, Christopher, and Meera Venkataramani Secure Your Analytical Insights on the Plane, in the Café and on the Train with SAS Mobile BI. Proceedings of the SAS Global Forum 2014 Conference. Cary, NC: SAS Institute Inc. Available at: SAS 9.4 Intelligence Platform: Middle-Tier Administration Guide, Second Edition. Available at: SAS Mobile BI online Help. Available in the app. SAS Visual Analytics: Administration Guide. Available at: A user name and password is required to access this document. Contact SAS Technical Support.
10 SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. indicates USA registration. Other brand and product names are trademarks of their respective companies.
Secure Your Analytical Insights on the Plane, in the Café and on the Train with SAS Mobile BI
Paper SAS299-2014 Secure Your Analytical Insights on the Plane, in the Café and on the Train with SAS Mobile BI ABSTRACT Christopher Redpath and Meera Venkataramani, SAS Institute Inc., Cary, NC Security-conscious
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationIBM Cognos Mobile Overview
IBM Cognos Business Intelligence 10.2.1 IBM Cognos Mobile Overview Agenda IBM Cognos Mobile Overview Analysis on Mobile Security + Configuration Deploying Good Technology Latest Updates IBM Confidential
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationDeploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
More informationBYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
More informationEgnyte App for Android Quick Start Guide
Egnyte App for Android Quick Start Guide Introduction Welcome to the Quick Start Guide for the Egnyte App for Android. This guide will explain how to: Access files. Download content for offline access.
More informationWindows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
More informationMobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationSharePlus Enterprise: Security White Paper
INFRAGISTICS, INC. SharePlus Enterprise: Security White Paper Security Overview Anand Raja, Gustavo Degeronimi 6/29/2012 SharePlus ensures Enterprise data security by implementing and interoperating with
More informationAirWatch for ios Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
More informationMobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
More informationSalesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationBell Mobile Device Management (MDM)
Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool
More informationAndroid support for Microsoft Exchange in pure Google devices
Android support for Microsoft Exchange in pure Google devices Note: The information presented here is intended for Microsoft Exchange administrators who are planning and implementing support for any of
More informationMDM Mobile Device Management
Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,
More informationXperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia
More informationMobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
More informationMobile Secure Cloud Edition Document Version: 2.0-2014-07-07. Mobile Application Management
Mobile Secure Cloud Edition Document Version: 2.0-2014-07-07 Table of Contents 1 Important Disclaimers on Legal Aspects....3 2 Introduction....4 3 Application Catalog....5 3.1 Application Catalog Icons....5
More informationMaaS360 Mobile Device Management (MDM) Administrators Guide
MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationSophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
More informationSoonr Workplace Enterprise Plan Overview
This document is an overview of the features that are included in the Soonr Workplace Enterprise Plan. The Enterprise Plan is designed for the specific needs of IT departments in larger companies where
More informationWorkplace-as-a-Service BYOD Management
For companies with people in them Workplace-as-a-Service BYOD Management Solution Overview The BYOD Management solution provides customers with IT tools and services to deploy a Workplace-as-a-Service
More informationAndroid 4.0.4 Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies
Android 4.0.4 Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies Overview Requirements Supported Information Services Supported Security Policies Require password Require
More informationNorton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
More informationResco Mobile CRM Security
Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web
More informationSAS Visual Analytics 7.1 for SAS Cloud. Quick-Start Guide
SAS Visual Analytics 7.1 for SAS Cloud Quick-Start Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Visual Analytics 7.1 for SAS Cloud: Quick-Start Guide.
More informationYour World Made Simple.
Your World Made Simple. In g! 6.0 ELAN introduced customer based lock code and user access management through a new User Settings Interface. The interface is a pass-code protected area that allows you
More informationSAS REPORTS ON YOUR FINGERTIPS? SAS BI IS THE ANSWER FOR CREATING IMMERSIVE MOBILE REPORTS
PharmaSUG 2015 - Paper AD10 SAS REPORTS ON YOUR FINGERTIPS? SAS BI IS THE ANSWER FOR CREATING IMMERSIVE MOBILE REPORTS Swapnil Udasi, inventiv Health, Hyderabad, India ABSTRACT The widespread use of smartphone
More informationMicrosoft Exchange Information Services and Security Policies Supported by Android 2.2
Microsoft Exchange Information Services and Security Policies Supported by Android 2.2 Overview Requirements Supported Information Services Supported Security Policies Require password Require alphanumeric
More informationCompliance Rule Sets in MaaS360
Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in
More informationiphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationQuick Start and Trial Guide (Mail) Version 3 For ios Devices
Quick Start and Trial Guide (Mail) Version 3 For ios Devices Information in this document is subject to change without notice. Complying with all applicable copyright laws is the responsibility of the
More informationMobile Device Management ios Policies
Mobile Device Management ios Policies Introduction ios policies allow administrators to use mobile device management features of CentraStage and push them, over the air (OTA), to ios devices (in other
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationBuilding a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationSysAid MDM User Guide for Android
SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction
More informationSecurely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationTelstra Mobile Device Management (T MDM) Getting Started Guide
Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device
More informationMobile App User's Guide
Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure
More informationCOMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE
COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE Mobile Device Management, User Guide Copyright 2013, CommuniTake Technologies Ltd., Yokneam, Israel. All rights reserved. For a hard-copy
More informationMDM User Guide June 2012
June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App
More informationHow To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device
Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...
More informationCloud Services MDM. Telecom Management Admin Guide
Cloud Services MDM Telecom Management Admin Guide 10/24/2014 CONTENTS Telecom Management... 2 Enabling Telecom Setting... 2 Creating and Managing Telecom Plans... 3 Dynamic Assignment... 4 Dashboard Usage...
More informationManaging Mobility. 10 top tips for Enterprise Mobility Management
Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationTALLAN INC. MDM STRATEGY GUIDE 4/10/2014 WE BUILD SOFTWARE THAT HELPS OUR CLIENTS GROW DOCUMENT CREATED BY: Matt Kruczek Mobile Practice Lead
TALLAN INC. MDM STRATEGY GUIDE 4/10/2014 DOCUMENT CREATED BY: Matt Kruczek Mobile Practice Lead Brian Sampson Mobile Practice Lead Adam Worobec Senior Director WE BUILD SOFTWARE THAT HELPS OUR CLIENTS
More informationSYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
More informationSecure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
More informationOracle Mobile Security
Oracle Mobile Security What s New in OMSS 11gR2 Patch Set 3 ORACLE WHITE PAPER MAY 2015 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes
More informationHow can I protect against the loss of my ID if my device is lost or stolen?
How can I protect against the loss of my if my device is lost or stolen? If your mobile device is stolen or lost, you can reactivate your user on a new device and deactivate it on your stolen or lost device.
More informationSysAid MDM User Guide for ios
SysAid MDM User Guide for ios Table of Contents Introduction Enrolling Your ios Mobile Device in SysAid MDM Unenrolling Your ios Mobile Device from SysAid MDM Have Any Questions? Introduction SysAid Mobile
More informationGO!Enterprise Mobile Device Management Android Release Notes
GO!Enterprise Mobile Device Management Android Release Notes GO!Enterprise MDM Version 3.9.0 Release Notes 1 GO!Enterprise MDM for Android Table of Contents GO!Enterprise MDM Version 3.9.0 Release Notes
More informationWHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices MicroStrategy Mobile App Platform Copyright Information All Contents Copyright 2014 MicroStrategy Incorporated.
More informationTechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security
Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring
More informationiphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
More informationMobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition
Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the
More informationProtecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More informationAirWatch for Android Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
More informationMobile Security: Threats and Countermeasures
Mobile Security: Threats and Countermeasures Introduction Mobile devices are rapidly becoming the primary end-user computing platform in enterprises. The intuitive user-experience, robust computing capabilities,
More informationMobile Device Management Version 8. Last updated: 16-09-14
Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationSecure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
More informationSmartwatch Security Research
Smartwatch Security Research Overview This report commissioned by Trend Micro in partnership with First Base Technologies reveals the security flaws of six popular smartwatches. The research involved stress
More informationSecure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst
ESG Lab Spotlight Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst Abstract: This ESG Lab Spotlight provides a high level look at the Acronis Access
More informationQuick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationS ven. Tips to Keep Financial Apps Safe & Secure
S ven Tips to Keep Financial Apps Safe & Secure Mobile applications provide users with access to critical information while on the go. In order to quickly empower users with immediate access to their financial
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationAdministration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationUser Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual
User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...
More informationMOBILE BANKING USER GUIDE
MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationActive Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
More informationEnsuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationSOTI Inc. Presents. Andrew Aldis - Presale and professional service engineer jayp@soti.net. www.soti.net
SOTI Inc. Presents Andrew Aldis - Presale and professional service engineer jayp@soti.net www.soti.net World s Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide Since 1995,
More informationMobile App User's Guide
Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure
More informationNovell Filr 1.0.x Mobile App Quick Start
Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,
More informationQsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080
Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.
More information1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
More informationDell OpenManage Mobile Version 1.4 User s Guide (Android)
Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationConfiguring an Android device to access Staff Wi-Fi and Email.
Information Services Revised 15.10.15 ISD Customer Services Configuring an Android device to access Staff Wi-Fi and Email. Screenshots provided from Google Nexus, Android version 4.2.1 Jelly Bean. Important
More informationSystem Configuration and Deployment Guide
System Configuration and Deployment Guide This guide provides information on...... Configuring an Organization using the Organization Wizard... Setting a default Policy Suite using the Organization Wizard...
More information