Mobile Device Management

Size: px
Start display at page:

Download "Mobile Device Management"

Transcription

1 Mobile Device Management The objective of this document is to provide you with context about mobile device management, for both ipad and Mac, to enable you to have a relevant conversation with your customer around the benefits of an organisation utilising your MDM solutions. The Top Considerations Management or no management. Administrators have a choice: management or no management. There are many variant degrees and methods to manage ipad and Mac. In most enterprise solutions, the devices will have security and management requirement that will require the devices to be constantly managed over the air wherever they are. Also, data protection is a major concern, so passcode, particular wifi confirmation and remote wipe options are usually required. This scenario is very different to Education where the devices may remain in the classroom but will need to be reset up for a different user or class at the end of the day. This solution does not need to be over the air. A major consideration is personally owned devices being introduced to an educational or enterprise network. This is a source of frustration for IT administrators as they will require some features on the network, but there will be a lack of con roll of the devices. Alternatively, corporate/education owned but personally enabled devices are purchased via the organisation and provided to the end user and this enables the organisation to achieve the initial setup, increased control, reduce security risk and but ongoing management might not be required. Mobile Strategy. Organisations are beginning to truly embrace Mobility as a strategy and there are numerous ways this is can be achieved. Mobile Device Management (MDM) software configures, monitors, manages and secures mobile devices deployed across educational institutions and enterprises. In order to have a successful MDM deployment, the organisation must have a mobile strategy and have a clear plan of what permissions and profiles the end users will require from a security perspective. A few examples of these include: Enforcing a Passcode Setting up , VPN and WiFi remotely Managed App Deployment Web Restrictions Removing applications off the device - Eg Removal of Camera

2 This is key to a successful role out of mobile devices is that the organisation will address security and control while enabling the user to be more productive, efficient by using these devices. Security. Network administrators need to carefully evaluate several aspects of security, access, and performance when considering deployment of ipad and Mac into enterprise networks. The Scenarios Education Educational institutions have a different requirements when it comes to actual deployment and management of mobile devices along with different budget restraints. With that in mind, a couple of ways these organisations deploy devices and make sure the devices are configured to gain access to corporate networks and data, deploy specific Apps etc. Apple Configurator This is a free software downloadable from the Mac App Store for Mac and allowed for further security controls/configuration profiles and even restrictions that at present, MDM vendors were unable to meet for ipad. Apple Configurator is typically used in Education or when a single device is shared across many users. Apple Configurator is not an over the air solution. It requires devices to be plugged in a USB charge trolley. On top of the trolly, will be a Mac running Apple Configurator to confiture the ipads. Apple Configurator enables IT departments to mass configure devices (up to 30 at a time) prior to them being handed to the end use. This is ideal of the following situations: A single device will be used by many people on a day to day basis but utilising the same set up such as Apps and restrictions (although ideal for education, this could be used for a shop assistant in a supermarket for example) It could be that the device is set up in single App mode (also useful for restaurant menus or kiosks) It could be that a single device will be used by numerous people on different days, however, at the end of each day, their data is required to be backed up and then no matter which one they are provided the following day, their data is restored to that device (Education for Example) Apple Configurator has three different settings. 2 of 5

3 Prepare Allows organisations to install multiple corporate owned devices with a single configuration profile such as ios version, Exchange, VPN, WiFi settings and Apps. Also, devices can be updated to the latest version of ios and settings and App data can be backed up and restored. This can also be used to enrol them with an MDM vendor so that moving forward they can be managed remotely (over the air) and even enrol Apple TV so that this can be remotely managed by an MDM vendor. Supervise Supervising devices (these will have to be prepared prior to been supervised) allow the devices to be configured how an organisation wishes whilst constantly being in direct control and typically, these devices are be handed back and this profile will be re-applied when the devices are plugged back into Apple Configurator providing consistency and control to IT. This set up works perfectly in deployment scenario s whereby the device is shared amongst users across such as; retail, hotel or even education. Assign This is where a supervised device can be allocated to a user. This could be particularly ideal if the deployment of such device be for a longer term or that the user in question needs certain Apps or even requires data being saved. Using an Assign deployment via Apple Configurator when the device is plugged into the cart, this will back up all the users data. The benefit here is that no matter which device the user is given the next time, their data can be restored to that device and so can continue where they left off. A USB charging trolley with 30 cables, a MacBook Pro, Apple Configurator and of course cases for all the ipads is a great solution for Education (with great margin!). However, if true mobility is required, so perhaps the ipads need to be taken home by students, so they need to be managed over-the-air, there are a few MDM solutions that can be considered. Enterprise Mobile Device Management Choosing an MDM vendor is no longer just down to IT making sure it aligns with business security and infrastructure requirements but it is to improve productivity and gain adoption by understanding how these devices are going to be used by the end user. MDM is ideal for vast amounts of remote users where the business is required to apply control, security and get business applications on to these devices over-the-air (no touch required!) In the first instance of setting up an MDM solution, the first thing is to get a profile from the MDM server onto the devices. This can be accomplished in a couple of ways. The profiles can be sent to the end user and installed by them, Apple Configurator can install the profile or they can enrol their own devices through a web portal. Once this profile has been installed on the device all the settings, permissions, restrictions, Apps will all take place without the user having to do anything else. 3 of 5

4 Profile Manager is Apple s Mobile Device Management (MDM) Solution included in Mac OS X Server. It comes preinstalls on the Mac mini Server. Like running any other service in-house, this gives more control to the business. Another benefit is that the business does not need to pay per device or user for MDM. This can be a cost-effective, scalable solution. It can be used to manage Macs and ios devices in an Education or Enterprise environment. The Specifics Security. An administrator is responsible for the health and integrity of an organisation s network has many responsibilities, often including the integration of new devices into the network environment. Traditionally, this involved corporate owned or issued devices. In the corporate-issued case, the network administrator can deploy the ipad and impose a number of restrictions, such as blocking user access to the itunes store and app store, or limit access to certain built-in applications, such as YouTube or even the built-in camera. However, these policies may not be well received by users and also require the administrator to review, approve, and deploy any applications deemed to be desirable and allowed for users to access. Some organisations may deploy corporate-owned ipads and issue them to employees, but others may consider how to integrate user-owned ipads. In either case, prudent network administration considers several aspects of device and network security and access. These can be categorised into the following topics: Device security Data security Network security Application security Apple integrates security measures into the ipad that directly address each of these areas, so it s worthwhile to understand the device s capabilities and options for deployment so that the administrator can best decide how to integrate the device into the network. Once the device is on the network, data and network resources should not be compromised. The use and load on the network also need to be considered, especially with emerging applications and enterprise usecases. For more information, please see the security document. Network. Access to the corporate network via the ipad is normally via WiFi - there are no wired ports at all. While the ipad is available with a 3G cellular connection, the connection is slower than WiFi, its use requires a data plan, and the quality of cellular service is not under the control of the network administrator. Therefore, it is imperative that the wireless infrastructure be ready for the ipad. These can be categorised into the following main topics: Preparing the wireless infrastructure Considering network traffic types 4 of 5

5 Enabling the proper network experience Infrastructure Security and authentication Traffic shaping and analysis Reporting and monitoring tools For more information, please see the ipad Networking Deployment document. What Questions Should I Be Asking My Customers? Will the devices be for Education or Enterprise? How are devices currently managed? Will the devices be truly mobile? How will they ensure the devices are secure? What happens if a user s device is lost or stolen? Will users share the devices? Will the institution want to enforce certain restrictions i.e. removal of applications, passcode etc? Is scalability and cost a concern? Has the institution considered Apple Profile Manager? Did you know that you will need a Mac to use with the USB charge trolley? 5 of 5

Deploying iphone and ipad Apple Configurator

Deploying iphone and ipad Apple Configurator Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions

More information

ipad Classroom Installation & Deployment Important information

ipad Classroom Installation & Deployment Important information ipad Classroom Installation & Deployment Important information Our aim is to carry out your installation as quickly and efficiently as possible whilst utilising Apple s recommended procedures for the deployment

More information

ios Enterprise Deployment Overview

ios Enterprise Deployment Overview ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work

More information

ipad Deployment Guide

ipad Deployment Guide ipad Deployment Guide Prepared by Taaleem Central Office ITSS ipad Deployment Guide Deployment Considerations Wi-Fi and Networking The network infrastructure must set up to work correctly with Bonjour,

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

CentraStage & Apple Configurator

CentraStage & Apple Configurator CentraStage & Apple Configurator The benefits of integrating Apple Configurator into your CentraStage MDM solution January 2014 Mobile Device Management Page 1 Introduction Apple Configurator makes it

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

ios Education Deployment Overview

ios Education Deployment Overview ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay

More information

iphone in Business Mobile Device Management

iphone in Business Mobile Device Management 19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device

More information

Absolute Manage MDM. John Wu Systems Engineer [email protected]

Absolute Manage MDM. John Wu Systems Engineer jcwu@absolute.com Absolute Manage MDM John Wu Systems Engineer [email protected] Saving Time and Money Comprehensive IT Automation Patch Management Software Distribution Software License Management Power Management Asset

More information

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years

More information

Using the Apple Configurator and MaaS3360

Using the Apple Configurator and MaaS3360 Using the Apple Configurator and MaaS3360 Overview Apple Configurator Utility (ACU) is a free Apple tool that enables a Mac to configure up to 30 ios devices simultaneously via a USB. There are two modes

More information

The software and tools we use to deploy our ipads

The software and tools we use to deploy our ipads The software and tools we use to deploy our ipads We use Apple Configurator (AC)! Under 90 days Apple suggests AC instead MDM (Mobile Device Management)! We use Apple s VPP (Volume Purchasing Program)

More information

eschoolpad for ipad INSTALLATION GUIDE v3.0 Prepared by: Avrio Solutions Company Limited

eschoolpad for ipad INSTALLATION GUIDE v3.0 Prepared by: Avrio Solutions Company Limited eschoolpad for ipad INSTALLATION GUIDE v3.0 Prepared by: Avrio Solutions Company Limited Content Version History... 2 Prerequisites for eschoolpad Installation... 3 Step 1: Supervision (for non-supervised

More information

ManageEngine Desktop Central. Mobile Device Management User Guide

ManageEngine Desktop Central. Mobile Device Management User Guide ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...

More information

Managing Mobility. 10 top tips for Enterprise Mobility Management

Managing Mobility. 10 top tips for Enterprise Mobility Management Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

Apple Configurator MDM Site - Review

Apple Configurator MDM Site - Review Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?

More information

Managing and Supporting ipads in the Classroom Clint Stephens Southwest Educational Development Center [email protected]

Managing and Supporting ipads in the Classroom Clint Stephens Southwest Educational Development Center clint@sedck12.org Managing and Supporting ipads in the Classroom Clint Stephens Southwest Educational Development Center [email protected]! Permalink: http://goo.gl/vv1uy http://sedcclint.com - ipad or SUECON tag Overview

More information

Mobile Device Management for CFAES

Mobile Device Management for CFAES Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Introduction to AirWatch and Configurator

Introduction to AirWatch and Configurator Introduction to AirWatch and Configurator Overview AirWatch integrates seamlessly with Apple Configurator to enable IT administrators to effectively deploy and manage Apple ios devices. Deploying a large

More information

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:

More information

Deploying Apple ios in Education

Deploying Apple ios in Education Solution Guide Deploying Apple ios in Education March 013 This document covers strategies for deploying, monitoring, and supporting ios devices in education environments. Table of Contents 1 3 4 5 6 7

More information

Harry Fike [email protected]. Frostburg State University Office of Information Technology Technical Services

Harry Fike hefike@frostburg.edu. Frostburg State University Office of Information Technology Technical Services Harry Fike [email protected] Frostburg State University Office of Information Technology Technical Services New Technologies Challenges Solutions What we do at FSU Apple has been gaining market share

More information

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES APPLE & BUSINESS ios ENTERPRISE SECURITY Apple have had an uphill battle getting into businesses for many years the Windows monopoly Phones provided another attempt Blackberrys and Windows Mobile were

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

ipad 2 Basic Setup Guide

ipad 2 Basic Setup Guide This document provides basic guideline for setting up your ipad 2, you may refer to the following online product manuals for detailed operation guides for the product. ipad - Getting Started http://www.apple.com/support/ipad/getstarted/

More information

SysAid MDM User Guide for Android

SysAid MDM User Guide for Android SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

MDM Mobile Device Management

MDM Mobile Device Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

The Future of Mobile Device Management

The Future of Mobile Device Management The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

LabTech Mobile Device Management Overview

LabTech Mobile Device Management Overview You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated

More information

Special Report. Choosing the right mobile device platform for your business

Special Report. Choosing the right mobile device platform for your business Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Mobile Device Management and Security Glossary

Mobile Device Management and Security Glossary Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes

More information

Apple Deployment InDEPth. Apple Management Nirvana Awaits!

Apple Deployment InDEPth. Apple Management Nirvana Awaits! Apple Deployment InDEPth Apple Management Nirvana Awaits! Who is this guy? Long-time Mac guy, former Apple employee, recovering sys-admin. Macjutsu apple Consultant Conferences March 11-14, 2015 Author

More information

Mobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User

Mobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User Mobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User Version 1.0 Contents Definitions... 1 Expected Time Taken to complete... 1 What do I need or need to

More information

Apple Deployment Programs Apple ID for Students: Parent Guide

Apple Deployment Programs Apple ID for Students: Parent Guide Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows

More information

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia

More information

Guidance End User Devices Security Guidance: Apple ios 7

Guidance End User Devices Security Guidance: Apple ios 7 GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can

More information

ios How to Back Up from icloud

ios How to Back Up from icloud ios How to Back Up from icloud How to back up from icloud icloud automatically backs up the most important data on your device using ios 5 or later. After you have enabled Backup on your iphone, ipad,

More information

Large ios Device Deployment Checklist Dave Pugh and Calvin Clark December 9, 2011

Large ios Device Deployment Checklist Dave Pugh and Calvin Clark December 9, 2011 Large ios Device Deployment Checklist Dave Pugh and Calvin Clark December 9, 2011 PLANNING Wi-Fi - coverage / capacity / density - authentication (wide-open or 802.1x preferred) - Bonjour (multicast) support

More information

Enterprise Mobility as a Service

Enterprise Mobility as a Service Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...

More information

User Guide. Mobile Device Management. Version 1.0. Published September 2011

User Guide. Mobile Device Management. Version 1.0. Published September 2011 User Guide Mobile Device Management Version 1.0 Published September 2011 CONTENTS Contents...2 Overview...3 Supported Platforms...3 Device Enrollment...4 Updates... 10 Establishing a PositivePro VPN Connection...

More information

Setting Up an ipad Cart with Apple Configurator

Setting Up an ipad Cart with Apple Configurator (This is not in any way an official Apple document and is being supplied as is, hoping it might prove helpful. Let me know if you find errors. You can share with others, but please don t post publicly.)

More information

AkrutoSync 4.0 User Guide

AkrutoSync 4.0 User Guide AKRUTO AkrutoSync 4.0 User Guide Welcome Thank you for choosing AkrutoSync. AkrutoSync can synchronize your Contacts, Calendar and Tasks between Outlook on your computer and your Windows Phone. AkrutoSync

More information

SysAid MDM User Guide for ios

SysAid MDM User Guide for ios SysAid MDM User Guide for ios Table of Contents Introduction Enrolling Your ios Mobile Device in SysAid MDM Unenrolling Your ios Mobile Device from SysAid MDM Have Any Questions? Introduction SysAid Mobile

More information

Mobile Configuration Profiles for ios Devices Technical Note

Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights

More information

McAfee Enterprise Mobility Management

McAfee Enterprise Mobility Management Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers

More information

PMDP is simple to set up, start using, and maintain

PMDP is simple to set up, start using, and maintain Product Datasheet IBELEM, SA ITS Group - 5, boulevard des Bouvets 92741 Nanterre Cedex - FRANCE Tel: +33(0)1.55.17.45.75 Fax: +33(0)1.73.72.34.08 - www.ibelem.com - [email protected] PMDP is simple to set

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

QuickStart Guide for Mobile Device Management

QuickStart Guide for Mobile Device Management QuickStart Guide for Mobile Device Management Version 8.5 Inventory Configuration Security Management Distribution JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made

More information

How to wipe personal data and email from a lost or stolen mobile device

How to wipe personal data and email from a lost or stolen mobile device IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or

More information

ENTERPRISE SECURITY. ios Security Lecture 5 COMPSCI 702

ENTERPRISE SECURITY. ios Security Lecture 5 COMPSCI 702 ENTERPRISE SECURITY ios Security Lecture 5 COMPSCI 702 APPLE BUSINESS Apple s ios-based devices have gained popularity among consumers 61.2 million handsets sold in Q1 (2015) More enterprises have started

More information

Deploying iphone and ipad Apple Configurator

Deploying iphone and ipad Apple Configurator Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected] Introduction 3 Why Windows

More information

GlobalProtect Overview

GlobalProtect Overview GlobalProtect Overview Whether checking email from home or updating corporate documents from the airport, the majority of today's employees work outside the physical corporate boundaries. This increased

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

QuickStart Guide for Mobile Device Management. Version 8.6

QuickStart Guide for Mobile Device Management. Version 8.6 QuickStart Guide for Mobile Device Management Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

An Intelligent Solution for the Mobile Enterprise

An Intelligent Solution for the Mobile Enterprise An Intelligent Solution for the Mobile Enterprise IntelliGO - An Intelligent Solution for the Mobile Enterprise BYOD and the mobile movement continue to gain momentum fueled by the explosive growth of

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Hosted Desktop for Business

Hosted Desktop for Business Your complete guide to Hosted Desktop Hosted Desktop for Business 1 Doc V1.0 Jan 2014 Table of Contents Hosted Desk- 3 Hosted Desktops today... 4 What is a hosted desktop? 4 How does it work? 6 How easy

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

What is Bitdefender BOX?

What is Bitdefender BOX? Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS

Secondary School 1/04/2015. ICT Service Specification by: Andrea Warburton ONE IT SERVICES AND SOLUTIONS 1/04/2015 Secondary School ICT Service Specification by: 1 Andrea Warburton ONE IT SERVICES AND SOLUTIONS SERVICE SPECIFICATION One IT Services and Solutions offer a one stop shop ICT support service,

More information

Aerohive and JAMF Software

Aerohive and JAMF Software Aerohive and JAMF Software Simplified & Powerful Management & Enrollment for Apple Platforms Partner Solution Brief Introduction The Aerohive and JAMF Software Solution Aerohive Cooperative Control Wi-Fi

More information

A guide for Purchasing and Syncing Apps on the ipad

A guide for Purchasing and Syncing Apps on the ipad A guide for Purchasing and Syncing Apps on the ipad All Apps for the ipad can only be purchased through the itunes Store. This can either be done via itunes on the designated MacBook or via the ipad itself.

More information

Using Devices. Chapter 3

Using Devices. Chapter 3 Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform

More information

Guidance End User Devices Security Guidance: Apple OS X 10.9

Guidance End User Devices Security Guidance: Apple OS X 10.9 GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform

More information

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in

More information

Microsoft licensing for the Consumerization of IT

Microsoft licensing for the Consumerization of IT Volume Licensing brief Microsoft licensing for the Consumerization of IT Table of Contents This brief applies to all Microsoft Volume Licensing programs. Summary... 1 What s New in this Brief?... 1 Introduction...

More information

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11 Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about

More information

company policies are adhered to and all parties (traders,

company policies are adhered to and all parties (traders, APPLICATION SECURITY OVERVIEW Users have access to additional layers of security that are controlled and determined by the company s ICE administrator. These are designed to ensure company policies are

More information

Accessing ios. Will Wade, ACE Centre Lisa Farrand, ACE Centre

Accessing ios. Will Wade, ACE Centre Lisa Farrand, ACE Centre Accessing ios Will Wade, ACE Centre Lisa Farrand, ACE Centre What do we mean by ios? Access to idevices Direct Indirect Managing Apps Review and categorisation of apps Purchasing Installing and Managing

More information

Zenprise Device Manager 6.1.5

Zenprise Device Manager 6.1.5 Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in

More information

Windows Phone 8.1 Mobile Device Management Overview

Windows Phone 8.1 Mobile Device Management Overview Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are

More information

Prerequisites Guide for ios

Prerequisites Guide for ios Prerequisites Guide for ios Prerequisites Guide for ios This document includes the following topics: Overview Apple Developer Membership Requirement Prerequisites for Mobile Device Management Prerequisites

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

E-Mail: [email protected] Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct

E-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources

More information

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones

More information

mobilecho: 5-Step Deployment Plan for Mobile File Management

mobilecho: 5-Step Deployment Plan for Mobile File Management mobilecho: 5-Step Deployment Plan for Mobile File Management Overview GroupLogic s mobilecho is the industry s first and only secure Mobile File Management (MFM) solution for ipads. mobilecho enables IT

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information