IT Best Practices: Mobile Policies and Processes for Employeeowned
|
|
|
- Andra Berry
- 10 years ago
- Views:
Transcription
1 IT Best Practices: Mobile Policies and Processes for Employeeowned Smartphones By: Maribel Lopez, Principal Analyst April 2010 Lopez Research 9793 S. Burberry Way Littleton, Colorado T E [email protected] W
2 Mobile Growth Will Lead to Employee-Owned Smartphones In The Enterprise Mobility has moved from a luxury to mainstream globally with worldwide subscribers reaching over 4.5 billion at the end of The availability of unlimited data and text messaging plans has pushed consumer mobile usage beyond voice to text messaging, multimedia applications and Internet access. Today s smartphones offer a wide range of functionality, device types, as well as prices to fit every budget. Sleeker designs, richer multimedia applications and compelling carrier promotions are encouraging consumers to buy smartphones as they upgrade. As a result, over 165 million smartphones were shipped worldwide in Today s smartphones aren t just for business users. Consumers are using smartphones for entertainment as well as productivity tools such as and calendar. Employees are buying smartphones and asking IT to connect these personal devices to the network. This is creating a new category of endpoints that IT needs to manage and secure. These devices may be called one of several names including employee-liable, employee-owned, personal-liable, individually-liable, as well as individually-owned smartphones. For this report, we will refer to this category of user as employee-owned smartphones. Lopez Research defines employee-owned smartphones as: Mobile devices that are used for both personal and corporate voice, data and messaging use that are purchased and owned by an employee. These devices have a monthly plan that is paid for by the individual, but may or may not be expensed back to the company. Traditionally, IT only supported corporate-liable devices, which are mobile devices where the company pays for the device and its associated monthly plan. To manage support costs and telecom expense, corporate-liable devices were only given to a small percentage of the workforce. Companies also prohibited the use of personal devices to minimize security risks. While many companies have a policy prohibiting access to company data on personal devices, employee-owned smartphones are making inroads into the company regardless of IT s policy. There are many reasons why employees want to use personal devices. In some cases, employees are bringing in their own devices as a response to a strict corporate lock down. In other cases, employees may want access to mobility and the corporation won t fund it. Even employees that have a corporate-liable smartphone may only want to carry a single device their personal smartphone. If IT diligently secures access to and business applications, employees are working around these restrictions by forwarding to their personal accounts. The growing popularity of smartphones means IT can t ignore the issue any longer. A company can either choose a restrictive policy that creates opportunity for a security breach or it can put in place policies and controls that allow IT to embrace employee-owned smartphones. IT Needs To Revise Policy and Processes For Employee-owned Mobility Many firms already have policies and management procedures to support corporate-liable devices, however these policies need to be revised to account for employee-owned smartphones. While there are numerous areas in a mobile policy, the inclusion of employee-owned devices changes at least 10 sections of a company s security and management policy (see Figure 1). Other policy categories may also need to be changed depending on the industry. IT should review these areas and create new guidelines within each of these sections. The following sections offer guidelines for enabling the use of employee-owned devices. Who is eligible and what data can be accessed? How will applications be delivered? The policy should define the criteria for what types of employee can access the network with a personal device. Examples of criteria that companies are using include job title, job function and the number of hours worked. The policy should also define what applications and services can be accessed over what type of device. For example, a firm may allow employeeowned smartphones to access only while corporate-liable smartphones can access as well as other business applications such as CRM and sales automation. In the corporate-liable world, IT selected which applications had access to the network. Many firms take a similar approach April 2010 IT Best Practices: Mobile Policies and Processes to Support Employee-owned Smartphones 2
3 with employee-owned devices and forbid any application downloads. In the case of employee-owned phones, IT should expect and accept that users will want to use applications like games and social networks on their handhelds. To deliver this flexibility while maintaining a secure environment, IT should embrace platforms and/or security solutions that will limit the resources that applications can access. It should also consider adding a white-list/blacklist content-filtering approach for mobile browsers. Figure 1. Guidelines for Policy Changes to Support Employee-owned Devices Policy Guideline Areas to address 1 Who is eligible? What type of employees can access the company s network (e.g., certain job titles, roles, etc.)? 2 What data and services can be accessed? 3 How will applications and services be delivered? Should the company allow employee-owned devices to access , a subset of business applications, all available mobile applications or only business applications that are web-enabled? Does the solution require a desktop client to deliver applications or will applications be downloaded from a site? Can IT push applications to the device over the air? 4 What does the company pay for? Will the company reimburse the entire monthly cost, a fixed stipend, the cost of the data plan or a percentage of the voice and data plan? 5 Which operating systems and devices? How many platforms will IT support (e.g., Android, BlackBerry, iphone OS, Linux, Symbian, Windows Mobile, etc.)? 6 How is the device secured? What security measures will be enforced on employee-owned devices (i.e., passwords, device encryption, remote lock, wipe, etc.)? 7 How is the device managed? Will the device be maintained over the air or through syncing with a desktop or web application? 8 What support is provided? Will IT assist in the first time device set-up? Will IT provide first or second tier support? 9 What are the privacy issues? Is the employee s data private? What is the treatment of an employee s data (i.e., is it stored? How can it be used? etc.)? 10 What are the legal concerns? Is use of a personal phone by non-exempt employees considered overtime? What is my responsibility as a corporation if I discover the employee is involved in illegal activity that isn t related to the corporation? Once IT has defined who can access the network and what applications a user can access, IT must define the process for how users will access business applications. Will employees go to a secure web portal to download an application? Will the application link be delivered to the user s device over the air? Or will IT need to deploy a desktop application to support application downloads? The procedure for accessing applications may also differ from one type of mobile smartphone to another. For example, RIM s BES allows over the air activation and push of applications while the iphone requires Active- April 2010 IT Best Practices: Mobile Policies and Processes to Support Employee-owned Smartphones 3
4 Sync. IT may decide it will only support certain handhelds based on the process of downloading applications to a specific device type. What does the company pay for? Unlike corporate-liable devices, the employee purchases and owns the device. If the employee wishes to use their personal device for work-related activities, IT must have a policy that outlines what, if any, portion of the monthly fees that the firm will pay. The greater the business need for mobile voice and data, the more likely the firm is to pay at least part of the monthly fees. A fixed stipend approach is often considered for reimbursement. The move to flat rate voice and data plans has made it easier to set stipend limits. Many companies choose a stipend amount that pays for the data portion of the bill. When determining a stipend, firms must adjust the amounts to equal the variances in data rates across the globe. If the employee has no need to access corporate data, the firm may choose to provide access to the network without any reimbursement. Policies should minimize the amount of time accounting must spend to process reimbursements by setting fixed dollar amounts or tiers of reimbursement expenses. What mobile operating systems and devices will the company support? Traditionally, a company would standardize on a small number of smartphones and usually no more than two operating systems to minimize support issues within corporate-liable device programs. But employees want to use whatever device they own. The company needs a strategy that enables choice while minimizing chaos. IT must design a policy that addresses what types of operating systems IT will support (e.g., Android, iphone OS, Linux, RIM s BlackBerry, Symbian, Windows Mobile, etc.). Given the rapidly changing mobile environment, the policy must also specify what version of the operating system IT will support. For example, Google has released four versions of its Android OS within the past year. This is particularly important as certain corporate applications may only work with certain versions of an operating system. IT should also define what device characteristics are required and restricted. For example, certain companies restrict the use of camera phones in the building while other firms have applications that may require a certain processing capability and/or removable media for data storage. Also, IT should set a standard for how much free memory must be on the device to support software updates. Firms that want to run mobile voice and data over the wireless LAN may encourage employees to get a device that has Wi-Fi. How is the device secured and managed? Businesses are losing control of customer and corporate data as employee-owned smartphones enter the enterprise. Employees accept a predefined set of security and management policies when they are given a corporate-liable smartphone, but employees don t expect the same level of security to be applied when they own the device. IT must create a new policy that states employee-owned smartphones need to be treated the same as any other endpoint on the corporate network. Firms need a comprehensive mobile policy that leverages existing security standards to limit data loss and theft from malicious code that exploits vulnerabilities in mobile technologies such as Bluetooth, SMS, and mobile operating systems (OSs). Employees must be willing to allow IT to add additional security and management software to the device if necessary. If an employee wants to connect their own device to the network, the employee must be willing to accept the corporate policy and understand it consequences. For example, if the employee loses the device, IT will wipe all data from the device. During the data wipe, the employee could lose personal data such as address book contacts, photos and applications. Employees that want network access must be willing to accept that they could lose personal data and that the company won t be held liable for any lost data. With this knowledge the employee also must agree to report the loss or theft of device as soon as possible. Additionally, employees should be aware that IT may choose to limit access to certain applications. Most employees will agree to whatever terms they are provided, without reading or understanding the consequences of accepting the policy. IT and the company must dedicate resources to educate employees about the potential issues associated with connecting a personal device to a corporate network. April 2010 IT Best Practices: Mobile Policies and Processes to Support Employee-owned Smartphones 4
5 At a minimum IT should require password protection on all devices. While password strength is important, the type of password required should be less cumbersome than the typical PC passwords, which may require 8 characters including numbers and symbols. Besides password protection, IT should be able to remotely lock or remove data from lost or stolen devices. Other types of security policies could include corporate control of what applications reside on the device as well as control over what can be downloaded onto the device (see Figure 2). IT may also choose to encrypt the data on the device as well as the data on any removable media cards. In doing so, IT should be aware that this encryption could slow device responsiveness. To ensure ease of management, IT should consider solutions that enable over the air updates for provisioning and security. Figure 2. Types of Security Policies Security Category Password Protection Encryption Remote device lock and remote data removal Application use Hardware use Auditing Description The software should be able to enforce a password, define the maximum password length, set maximum time before a security timeout and the maximum number of password attempts as well as set the password length. The software should be able to encrypt data on the device, data on a removable media card and data as it transits the network. This is the ability to send a command to a device which will remotely lock the device and/ or erase all data from a device. Application controls can disable features, like SMS and application viewing, as well as control what application can be downloaded to the device and what resources an application can use. Hardware controls enable or disable hardware features such as the camera, GPS, Wi-Fi and Bluetooth connections To adhere to compliance and industry standards, firms need the ability to audit and archive phone records, messaging records such as MMS and SMS, as well as s and voice mails. Firms may also use software to reroute incoming and outgoing cellular calls through the PBX for auditing. What type of support? Today, corporate-liable devices are fully supported by IT. Many management features are lost once an employee moves to an individual-liable plan including information on the carrier connection for troubleshooting. The new policy should define what support, if any, IT will provide for employee-owned devices. Today, many corporations are claiming they won t support any employee-owned device or IT is electing to only support -related issues. The policy should state that IT will not support personal applications and that these applications will be removed if they interfere with device performance. IT should also have a wiki, knowledge base or extranet site that provides a troubleshooting FAQ. While the policy might state IT won t support personal smartphones, the IT staff should plan for a short-term spike in call volume as the policy takes effect. April 2010 IT Best Practices: Mobile Policies and Processes to Support Employee-owned Smartphones 5
6 What are the privacy and legal concerns? Employee-owned devices blend a mix of personal and corporate data. Unfortunately, IT doesn t have the tools today to effectively partition personal data from corporate data and regulations may require corporations to archive data for auditing purposes. Along with informing employees of the risks of data loss, IT must also alert employees that the company has access to their personal records such as SMS, , MMS, and phone logs. The policy should clearly state that the company has access to all records on the device and that they may be required to archive this data. The corporation should also consult its legal department for guidance on what actions to pursue if illegal activity is discovered in the process of auditing a device s records. If the employee doesn t agree to these terms, IT should not allow the device to access corporate data. Can IT accommodate employees personal needs with existing devices? Many IT departments have used application control features to restrict the use of entertainment features and application downloads for the company s existing corporate-liable smartphone portfolio. As part of the overall management of a mixedliability environment, IT departments could appease the broader needs of the employees by loosening several IT policies on the company s standardized devices. For example, a corporate BlackBerry which previously was locked down to provide only , phone, and PIM information, might be opened to allow white-list applications such as a music player and a camera but not generic application downloads. In this way IT departments may be able to stave off end-users demands for the latest device by allowing the organization s standard issue smartphones to act more like consumer smartphones. Review Smartphone Vendors Security and Management Features Once IT has defined what type of security and manageability is required, IT should evaluate each of the mobile operating system platforms against this set of criteria. Specifically, IT should review each smartphone device in three areas: 1. Provisioning and management. How simple is the process for on-boarding and off-boarding a user? Does the vendor provide management tools that help you identify what is happening, where it is happening and why? Can you assess if the problem is a device issue or a carrier issue? Do knowledge bases or community resources exist on how to troubleshoot issues in a corporate setting? For example, the more consumer-oriented phones such as Android and iphone provide minimal resources to help a firm minimize escalation to tier 2-3 support. IT should also review the process for updates. For example, does the management software offer features like over the air updates? 2. Security. Mobile device platforms must offer controls that minimize the devastating affect of device loss that exposes customer or corporate information. However, IT s ability to secure devices varies dramatically across platforms. IT must review each platforms ability to support essential and advanced features. For example, can you enforce passwords? Can IT remotely lock and remove data from a device? Can IT encrypt data at rest and in transit? How many IT policies does the platform support? Are these the policies that you would use? 3. Current and planned business-grade application support. Applications will provide the foundation for new growth. IT should review the different mobile smartphone OS and device vendors approaches to application support. For example, who are their current partners? Does it have a developer program for business applications? Does the vendor already have a path to support emerging communications scenarios such as fixed mobile convergence? While these platforms may support thousands of applications, IT must review which business applications the platforms currently support and plan to support in the future. Evaluate Mobile Management Software Solutions and Services In our discussions with IT managers, they listed increased support costs as a key concern with enabling employee-owned mobility. IT leaders told us it wasn t the increase in the volume of users that troubled the staff but it was the variety of platforms that need to be supported which worries IT. Once IT has an understanding of the strengths and weaknesses of the mo- April 2010 IT Best Practices: Mobile Policies and Processes to Support Employee-owned Smartphones 6
7 bile platforms, it can build a matrix of the security and manageability gaps across the various vendors platforms. In some platforms, the vendor offers a full suite of security and management features (e.g., Research In Motion s BlackBerry) while in other cases the vendor will provide minimal support (e.g., Google s Android). The level of support may also vary by the version of the operating system. Due to the extreme variation across the platforms, IT managers are selecting one of two strategies. Depending on the firm s security and compliance requirements, IT will either select a device platform that it feels offers the proper security and standardize on this platform or it will look for ways to support multiple device platforms. For example, in many cases, IT will only allow employee-owned BlackBerry devices to connect to the network. Companies that want to support multiple mobile operating systems must add third-party security and management software to create a consistent baseline across the various device platforms. Several years ago, the functionality needed to support employee-owned mobility was a set of discrete software packages in areas such as mobile security, mobile middleware and mobile device management. However, vendors such as Boxtone, Sybase, Trust Digital and others have entered the space to offer more comprehensive mobility management solutions to bridge multi-device environments. While the multi-vendor offerings are new for many of the vendors, firms should still evaluate how these packages could ease the support issues associated with a multi-platform environment. Summary To take advantage of an employee s desire to bring their own smartphones into the office, IT should revise its mobile policy, assess the strengths and weaknesses of each mobile operating system and define a set of approved smartphones. IT must also secure and manage employee-owned devices in the same manner that it would a corporate-liable device. This may require the addition of third-party software or working with a VAR or managed service provider for support. The good news is that the rise of employee-owned phones will help firms expand mobility beyond the top 10% of users to over half of the firms employees in several years. Embracing employee-owned mobility provides the opportunity to offload the device purchase and a portion of the mobile expense onto the employee. Increased mobility will improve employee productivity and strategically position a company to improve business processes by using applications on smartphones. To reap these rewards, IT must effectively manage the transition with appropriate policies and systems. April 2010 IT Best Practices: Mobile Policies and Processes to Support Employee-owned Smartphones 7
8 About Lopez Research Quality research, strategic insight and intelligent commentary on the communications environment with a focus on the technology and service trends, issues, processes and players that drive innovation, influence decisions, and impact consumer, SMB and enterprise users. The Lopez Research syndicated research program in 2010 evaluates two key themes: pervasive communications and connected devices, and how they will evolve and change the existing landscape for the consumer, SMB and enterprise markets. We will consider, review and report on the development of converging, ubiquitous, multi-platform, multimedia communications experiences that are deliverable through an ever-widening range of devices. We also offer primary market research and customized reporting for our clients on issues, trends, technology and processes relevant to the communications industry and your business. Offices 9793 S. Burberry Way 2269 Chestnut Street, Suite 202 Littleton, Colorado San Francisco, CA Call us: Visit us at: April 2010 IT Best Practices: Mobile Policies and Processes to Support Employee-owned Smartphones 8
Trust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
THE ENTERPRISE MOBILITY POLICY GUIDEBOOK
THE ENTERPRISE MOBILITY POLICY GUIDEBOOK October 2010 Edition 2 About This Guidebook Research from Strategy Analytics shows that over 90% of organizations now have employees using smartphones within their
Bring Your Own Device. Individual Liable User Policy Considerations
Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy
Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are
Corporate Mobile Policy Template
Updated July 2011 Three major changes have occurred over the past 18 months that require updates to your organization s mobile policy. These changes include widespread adoption of tablet devices, changes
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker
QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A BYOD PARTNER 2013 T-Mobile USA, Inc. TABLE OF CONTENTS Which BYOD model is right for your organization? Have you identified the pros and cons?... 3 Other factors
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
11 Best Practices for Mobile Device Management (MDM)
MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
A CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Bell Mobile Device Management (MDM)
Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
The Enterprise Mobility Policy Guidebook
+ 1 The Enterprise Mobility Policy Guidebook April 2012 Edition + About This Guidebook 2 Research from market research firm Strategy Analytics shows that over 90% of organizations now have employees using
How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
A Mobile Architecture, Not Just a Mobile App
A Mobile Architecture, Not Just a Mobile App Gary Audin Delphi, Inc. May 2013 CONTENTS 2 Meeting the Mobility Challenge 2 The Impact of BYOD 3 What to Gain with Mobile Communications 4 The Right Mobile
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
A guide to enterprise mobile device management.
WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an
ONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
Smartphone Enterprise Application Integration
WHITE PAPER MARCH 2011 Smartphone Enterprise Application Integration Rhomobile - Mobilize Your Enterprise Overview For more information on optimal smartphone development please see the Rhomobile White
HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
The flexible workplace: Unlocking value in the bring your own device era
IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring
Bring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE Michael CLICK TO Albek EDIT MASTER - SecureDevice SUBTITLE STYLE 2011 Driven by changing trends and increasing globalization, the needs of
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
Bell Mobile Device Management (MDM)
Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
M a as3 6 0 fo r M o bile D evice s
by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Comparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. [email protected] CALL US EMAIL US ON THE WEB
for -Grade CALL US EMAIL US ON THE WEB 1.800.379.7729 [email protected] intermedia.net for -Grade Goal of this report This report compares and contrasts various alternatives for file sharing in a business
Five Steps to Android Readiness
Five Steps to Android Readiness Android State of the Union Ready or not, Android is coming to the enterprise. The rise of Google s Android operating system has ushered a new wave of mobile devices and
Android for Work powered by SOTI
Android for Work powered by SOTI Work The Way You Live Secure Enterprise Mobility Management Android for Work powered by SOTI transforms workplace mobility with enhanced security, consistent management
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
BYOD Policy for [AGENCY]
BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
Quick Start Guide: NotifyLink for Symbian Series 60, 3 rd Edition
Quick Start Guide: NotifyLink for Symbian Series 60, 3 rd Edition Service Requirements Your device will require one of the following: Cellular connection supporting data transmission through your mobile
BRING YOUR OWN DEVICE
WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy.
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
BLACKBERRY COBO: ULTIMATE MOBILE SECURITY AND CONTROL
WHITEPAPER BLACKBERRY COBO: ULTIMATE MOBILE SECURITY AND CONTROL Corporate-Owned, Business-Only Enterprise Mobility Option for Regulated and High-Security Environments 2 BLACKBERRY COBO: ENTERPRISE MOBILITY
Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )
Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing
BENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT
WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT Executive Summary The explosive growth of worker mobility is driving the rapid adoption of mobile devices
BlackBerry Enterprise Solution and RSA SecurID
Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
Windows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected] Introduction 3 Why Windows
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
2011 Forrester Research, Inc. Reproduction Prohibited
1 Developing A Successful Mobile Strategy Christian Kane Analyst Forrester Research May 31, 2012 2 2011 2009 Forrester Research, Inc. Reproduction Prohibited Agenda Workforce trends for supporting mobile
Codeproof Mobile Security & SaaS MDM Platform
Codeproof Mobile Security & SaaS MDM Platform [email protected] https://codeproof.com Mobile devices have been transformed into multi-faceted, multi-tasking, multimedia tools for personal expression,
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)
perspective The battle between MDM and MAM: Where MAM fills the gap? - Payal Patel, Jagdish Vasishtha (Jags) Abstract MDM Mobile Device Management and MAM Mobile Application Management are main Enterprise
Enterprise Mobility. Bring Your Own Device (BYOD) Policy Guidebook Questions to Ask and Best Practices to Consider
Enterprise Mobility Bring Your Own Device (BYOD) Policy Guidebook Questions to Ask and Best Practices to Consider Bring Your Own Device (BYOD) Policy Guidebook Table of Contents 3 Introduction: How to
Special Report. Choosing the right mobile device platform for your business
Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation
HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
DATASHEET HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY Gold level EMM for BlackBerry Regulated-level security for BlackBerry 10 devices Ultimate security. BlackBerry 10 devices managed by BES10 with
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
